Analysis

  • max time kernel
    105s
  • max time network
    195s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    29/10/2022, 15:17

General

  • Target

    resource/modules/licensing.module/html/id-dev/assets/css/libs/fontawesome/webfonts/fa-regular-400.xml

  • Size

    137KB

  • MD5

    26d8edc83280c58a277393d469e7b26f

  • SHA1

    b1770838c69926f591f162a574d6a99cca3cec0e

  • SHA256

    de676277b489040f2fb218e4be9d005f400b760a946c68613a148a9f27e01dbd

  • SHA512

    de8c7a8e765360199346575b7e130ea0adf7b51cdda7c5d456942f4f460bd6add0beca035afaa444c17944eed6d9e3177308b18c4f3b6040a6e43d589d07221f

  • SSDEEP

    1536:QhEy6KjvW39yyl4TJ6W3Ounnu/577edPbmUqzC0lWx:H+TJURmjvj

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\resource\modules\licensing.module\html\id-dev\assets\css\libs\fontawesome\webfonts\fa-regular-400.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1116
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1008
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1472
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1472 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:632

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\A81C9EKT.txt

    Filesize

    600B

    MD5

    e6e1a336b30b3ca13c981d4838251fe1

    SHA1

    d6233a97f08b7d85ecaafda54df131bca78f2fb7

    SHA256

    2d53f8f57cde82650992c47f3575f74def64b4ce8344f4e9692607cbe4bfa31f

    SHA512

    80c4d6b6e3b401858e992040182e4a3d08b33226693e83e48b513c415fc229acfe5c3e23f68c044a48e0ce14d47deb6081e3c29141c5c0e8b1f28723a16242c1

  • memory/1116-54-0x00000000758B1000-0x00000000758B3000-memory.dmp

    Filesize

    8KB