Analysis
-
max time kernel
140s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
25-08-2023 14:02
Static task
static1
Behavioral task
behavioral1
Sample
LenoStandard-Regular.ttf
Resource
win7-20230712-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
LenoStandard-Regular.ttf
Resource
win10v2004-20230703-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
LenoStandard-Regular.ttf
-
Size
13KB
-
MD5
b86a629390215cab91bca15bdf0bad72
-
SHA1
5071f863cff394efb4e2c84820612b7877bae7c6
-
SHA256
82858bdf8d7c9a6a0cc9541b07c66235daa5df1a0707fce7e1475fbe76ddad16
-
SHA512
f00e637447e6b79298887a6e8e2b1fc6ac43d7d97e7cd3873b78f8b7fa6a833b5958254e824727341a3adeca75d2b85870f33e8b544c8528f0cc6549c82a6e5d
-
SSDEEP
384:yBq+vUT/6hRNXSig4AV2wSbYKwUsbhjQwVMhxeG6CfY:yBqqY/6/NXXgH2wSb4rCwVrTCfY
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\Local Settings cmd.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1472 wrote to memory of 2300 1472 cmd.exe 81 PID 1472 wrote to memory of 2300 1472 cmd.exe 81
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\LenoStandard-Regular.ttf1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\System32\fontview.exe"C:\Windows\System32\fontview.exe" C:\Users\Admin\AppData\Local\Temp\LenoStandard-Regular.ttf2⤵PID:2300
-