Overview
overview
1Static
static
Micr/Micro...2.html
windows7_x64
1Micr/Micro...2.html
windows10-2004_x64
1Micr/Micro...62.xml
windows7_x64
1Micr/Micro...62.xml
windows10-2004_x64
1Micr/Micro...r.html
windows7_x64
1Micr/Micro...r.html
windows10-2004_x64
1Micr/Micro...ar.xml
windows7_x64
1Micr/Micro...ar.xml
windows10-2004_x64
1Micr/Micro...tom.js
windows7_x64
1Micr/Micro...tom.js
windows10-2004_x64
1Micr/Micro...min.js
windows7_x64
1Micr/Micro...min.js
windows10-2004_x64
1Micr/word letter.html
windows7_x64
1Micr/word letter.html
windows10-2004_x64
1Analysis
-
max time kernel
111s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
30-05-2022 22:24
Static task
static1
Behavioral task
behavioral1
Sample
Micr/Microsoft/assets/fonts/fontawesome-webfont5b62.html
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Micr/Microsoft/assets/fonts/fontawesome-webfont5b62.html
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
Micr/Microsoft/assets/fonts/fontawesome-webfont5b62.xml
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
Micr/Microsoft/assets/fonts/fontawesome-webfont5b62.xml
Resource
win10v2004-20220414-en
Behavioral task
behavioral5
Sample
Micr/Microsoft/assets/fonts/glyphicons-halflings-regular.html
Resource
win7-20220414-en
Behavioral task
behavioral6
Sample
Micr/Microsoft/assets/fonts/glyphicons-halflings-regular.html
Resource
win10v2004-20220414-en
Behavioral task
behavioral7
Sample
Micr/Microsoft/assets/fonts/glyphicons-halflings-regular.xml
Resource
win7-20220414-en
Behavioral task
behavioral8
Sample
Micr/Microsoft/assets/fonts/glyphicons-halflings-regular.xml
Resource
win10v2004-20220414-en
Behavioral task
behavioral9
Sample
Micr/Microsoft/assets/js/custom.js
Resource
win7-20220414-en
Behavioral task
behavioral10
Sample
Micr/Microsoft/assets/js/custom.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral11
Sample
Micr/Microsoft/assets/js/theDocs.all.min.js
Resource
win7-20220414-en
Behavioral task
behavioral12
Sample
Micr/Microsoft/assets/js/theDocs.all.min.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral13
Sample
Micr/word letter.html
Resource
win7-20220414-en
Behavioral task
behavioral14
Sample
Micr/word letter.html
Resource
win10v2004-20220414-en
General
-
Target
Micr/Microsoft/assets/fonts/glyphicons-halflings-regular.html
-
Size
17KB
-
MD5
448c34a56d699c29117adc64c43affeb
-
SHA1
ca35b697d99cae4d1b60f2d60fcd37771987eb07
-
SHA256
fe185d11a49676890d47bb783312a0cda5a44c4039214094e7957b4c040ef11c
-
SHA512
3811804f56ec3c82f0bef35de0a9250e546a1e357fb59e2784f610d638fec355a27b480e3f796243c0e3d3743be3eadda8f9064c2b5b49577e16b7e40efcdb83
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D1973CD1-E083-11EC-8017-F2A7A8855ABA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "360726718" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1580 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1580 iexplore.exe 1580 iexplore.exe 2012 IEXPLORE.EXE 2012 IEXPLORE.EXE 2012 IEXPLORE.EXE 2012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1580 wrote to memory of 2012 1580 iexplore.exe IEXPLORE.EXE PID 1580 wrote to memory of 2012 1580 iexplore.exe IEXPLORE.EXE PID 1580 wrote to memory of 2012 1580 iexplore.exe IEXPLORE.EXE PID 1580 wrote to memory of 2012 1580 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Micr\Microsoft\assets\fonts\glyphicons-halflings-regular.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1580 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2012
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
607B
MD542449b2be51d3c4a6cb52ec5956c6ff4
SHA14b66ced585a328f701cb7ecfa3dc2fb62e63bd07
SHA256036a311ce525e3cef762eaaa78714dde8f00abd8a6195a869146dde737087380
SHA512703042b3f464a47a753f26a630f7ded51a2d524f53fbbec347610720668643c52a06208fbcd6e472807bdc6ea6107c67d1ee8ff1fbb9fbdf059d8890cc1d8f66