Analysis

  • max time kernel
    102s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    30-05-2022 22:24

General

  • Target

    Micr/Microsoft/assets/fonts/fontawesome-webfont5b62.xml

  • Size

    382KB

  • MD5

    d7c639084f684d66a1bc66855d193ed8

  • SHA1

    c0522272bbaef2acb3d341912754d6ea2d0ecfc0

  • SHA256

    8e3586389bb4cd01b3f85bb3b622739bde6627f28bba63a020c223ca9cf1b9ae

  • SHA512

    cd4c1d6756aa4d8e98ef4f7549ef2d73cc407bbba17a22ba31ddefbf74cd51de8a5c51a200db7f99e408f38988444a44156e7dc1136775b5cf6376972770ed29

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Micr\Microsoft\assets\fonts\fontawesome-webfont5b62.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4500
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Micr\Microsoft\assets\fonts\fontawesome-webfont5b62.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:876
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:876 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:5008

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    0eaec8b890892eb6f45b0022a6c5e366

    SHA1

    ec76b986b97e770ee53c0f5f8dee04277603554e

    SHA256

    e503b7264fb02e971a08cba4637c405ae0fff509b7947aed4b2f6fe9f96ad5fd

    SHA512

    93e851e272bd1a7a66e3153a062013ccdb161349dc9b73edc80c9eb01136287a3b5468070a3d9df8b5462c8341dc4968710939383dc8fb3510402337821d4cdf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    f7d823b046784d494441e830fdeac6cb

    SHA1

    5a93bf62bf60428677d15b45c2328b6ded4e434b

    SHA256

    dbc42f4231b8758fc5efb97f039a97694bf3dec8324cc88997d98448dcd9a99f

    SHA512

    8769bacc2ce61c2da26cb1121ca534834b99407edb0e0a214fbff7ef85d2c00c58c9e2e4ecfc1e396d391df8825a47d4f55df6964fe6d5e1949331321c8bd5a2

  • memory/4500-130-0x00007FFC95270000-0x00007FFC95280000-memory.dmp

    Filesize

    64KB

  • memory/4500-132-0x00007FFC95270000-0x00007FFC95280000-memory.dmp

    Filesize

    64KB

  • memory/4500-131-0x00007FFC95270000-0x00007FFC95280000-memory.dmp

    Filesize

    64KB

  • memory/4500-133-0x00007FFC95270000-0x00007FFC95280000-memory.dmp

    Filesize

    64KB

  • memory/4500-134-0x00007FFC95270000-0x00007FFC95280000-memory.dmp

    Filesize

    64KB

  • memory/4500-135-0x00007FFC95270000-0x00007FFC95280000-memory.dmp

    Filesize

    64KB

  • memory/4500-136-0x00007FFC95270000-0x00007FFC95280000-memory.dmp

    Filesize

    64KB

  • memory/4500-137-0x00007FFC95270000-0x00007FFC95280000-memory.dmp

    Filesize

    64KB

  • memory/4500-138-0x00007FFC95270000-0x00007FFC95280000-memory.dmp

    Filesize

    64KB