Overview
overview
1Static
static
Micr/Micro...2.html
windows7_x64
1Micr/Micro...2.html
windows10-2004_x64
1Micr/Micro...62.xml
windows7_x64
1Micr/Micro...62.xml
windows10-2004_x64
1Micr/Micro...r.html
windows7_x64
1Micr/Micro...r.html
windows10-2004_x64
1Micr/Micro...ar.xml
windows7_x64
1Micr/Micro...ar.xml
windows10-2004_x64
1Micr/Micro...tom.js
windows7_x64
1Micr/Micro...tom.js
windows10-2004_x64
1Micr/Micro...min.js
windows7_x64
1Micr/Micro...min.js
windows10-2004_x64
1Micr/word letter.html
windows7_x64
1Micr/word letter.html
windows10-2004_x64
1Analysis
-
max time kernel
145s -
max time network
194s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
30-05-2022 22:24
Static task
static1
Behavioral task
behavioral1
Sample
Micr/Microsoft/assets/fonts/fontawesome-webfont5b62.html
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Micr/Microsoft/assets/fonts/fontawesome-webfont5b62.html
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
Micr/Microsoft/assets/fonts/fontawesome-webfont5b62.xml
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
Micr/Microsoft/assets/fonts/fontawesome-webfont5b62.xml
Resource
win10v2004-20220414-en
Behavioral task
behavioral5
Sample
Micr/Microsoft/assets/fonts/glyphicons-halflings-regular.html
Resource
win7-20220414-en
Behavioral task
behavioral6
Sample
Micr/Microsoft/assets/fonts/glyphicons-halflings-regular.html
Resource
win10v2004-20220414-en
Behavioral task
behavioral7
Sample
Micr/Microsoft/assets/fonts/glyphicons-halflings-regular.xml
Resource
win7-20220414-en
Behavioral task
behavioral8
Sample
Micr/Microsoft/assets/fonts/glyphicons-halflings-regular.xml
Resource
win10v2004-20220414-en
Behavioral task
behavioral9
Sample
Micr/Microsoft/assets/js/custom.js
Resource
win7-20220414-en
Behavioral task
behavioral10
Sample
Micr/Microsoft/assets/js/custom.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral11
Sample
Micr/Microsoft/assets/js/theDocs.all.min.js
Resource
win7-20220414-en
Behavioral task
behavioral12
Sample
Micr/Microsoft/assets/js/theDocs.all.min.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral13
Sample
Micr/word letter.html
Resource
win7-20220414-en
Behavioral task
behavioral14
Sample
Micr/word letter.html
Resource
win10v2004-20220414-en
General
-
Target
Micr/Microsoft/assets/fonts/fontawesome-webfont5b62.xml
-
Size
382KB
-
MD5
d7c639084f684d66a1bc66855d193ed8
-
SHA1
c0522272bbaef2acb3d341912754d6ea2d0ecfc0
-
SHA256
8e3586389bb4cd01b3f85bb3b622739bde6627f28bba63a020c223ca9cf1b9ae
-
SHA512
cd4c1d6756aa4d8e98ef4f7549ef2d73cc407bbba17a22ba31ddefbf74cd51de8a5c51a200db7f99e408f38988444a44156e7dc1136775b5cf6376972770ed29
Malware Config
Signatures
-
Processes:
IEXPLORE.EXEIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e07a78de9074d801 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0883A1C1-E084-11EC-8B7D-62D05D50A506} = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000358f16e0538341458b70f68dad1eafd400000000020000000000106600000001000020000000a1625ebf851671849262741e4c4fbab599036ae6803b558eb9065935aacccb7b000000000e800000000200002000000094e0ec7164d5528a626f6a833c83ad97035d8c546f8f9078787cc3759d698402200000007f0023e1df062690679cdd320e8a2662464ee644965e2e060d17c87e6942031040000000e1b12ff2afc841827607299025e7b924ce75723b9c93f4c18adb123b4f447eddbae919bc1166418d5c751f46af17d43f4afa03f8075c5294e3ee0dd578d1fd75 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "360726809" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
IEXPLORE.EXEpid process 612 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
IEXPLORE.EXEIEXPLORE.EXEpid process 612 IEXPLORE.EXE 612 IEXPLORE.EXE 1760 IEXPLORE.EXE 1760 IEXPLORE.EXE 1760 IEXPLORE.EXE 1760 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
MSOXMLED.EXEiexplore.exeIEXPLORE.EXEdescription pid process target process PID 960 wrote to memory of 1076 960 MSOXMLED.EXE iexplore.exe PID 960 wrote to memory of 1076 960 MSOXMLED.EXE iexplore.exe PID 960 wrote to memory of 1076 960 MSOXMLED.EXE iexplore.exe PID 960 wrote to memory of 1076 960 MSOXMLED.EXE iexplore.exe PID 1076 wrote to memory of 612 1076 iexplore.exe IEXPLORE.EXE PID 1076 wrote to memory of 612 1076 iexplore.exe IEXPLORE.EXE PID 1076 wrote to memory of 612 1076 iexplore.exe IEXPLORE.EXE PID 1076 wrote to memory of 612 1076 iexplore.exe IEXPLORE.EXE PID 612 wrote to memory of 1760 612 IEXPLORE.EXE IEXPLORE.EXE PID 612 wrote to memory of 1760 612 IEXPLORE.EXE IEXPLORE.EXE PID 612 wrote to memory of 1760 612 IEXPLORE.EXE IEXPLORE.EXE PID 612 wrote to memory of 1760 612 IEXPLORE.EXE IEXPLORE.EXE
Processes
-
C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Micr\Microsoft\assets\fonts\fontawesome-webfont5b62.xml"1⤵
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome2⤵
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:612 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:612 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1760
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
604B
MD536b4602ecf60b28d8e00b11bb7eef0d0
SHA196a479099cd371a3711e0b4ab13ae0f286e55f90
SHA256f6838e374297eb1707f0285c69eefc27fa976e6ba5cef166b60e7757cb894b49
SHA512c9698c4d8c176cd0d3822258f683a9fe2ec2ffc5daa7dc729c46bfb8bfcc652c76cb06d436f4ded2ac139862518bf6f6036764873b2cbf40e7b0b6f0c6d173df