Analysis
-
max time kernel
111s -
max time network
113s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
20/04/2024, 02:14
Static task
static1
Behavioral task
behavioral1
Sample
AGENCYB.ttf
Resource
win11-20240412-en
4 signatures
300 seconds
General
-
Target
AGENCYB.ttf
-
Size
48KB
-
MD5
eb7813e51a5a7a422387b9e3ac3109f1
-
SHA1
4b9315ded87b10210f57a10710cf42fa522d4d61
-
SHA256
2d8367c5cca46dbde3dee122af1d75621e0a125a64d4615e07d26b8aec73e123
-
SHA512
a16f4222dc2bdae9bd9b5b19c03749fce3095febd65024e490fd9aecef95b7cc3878d45470326e897528049ed1fd22fbee423aa30a22a61e3762352c29fdeb75
-
SSDEEP
768:c/tbsuVhMSDa1dkev14hcd4Szk/FTBKAOV3OWSvQALiotjzA8zoOIP0qq9a7drn4:cZeku142TzETXfvQATtjk8Vu0qq44
Score
4/10
Malware Config
Signatures
-
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\Panther\UnattendGC\setupact.log UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\setuperr.log UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\diagerr.xml UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\diagwrn.xml UserOOBEBroker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3263309122-2820180308-3568046652-1000_Classes\Local Settings cmd.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4792 wrote to memory of 3096 4792 cmd.exe 80 PID 4792 wrote to memory of 3096 4792 cmd.exe 80
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\AGENCYB.ttf1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Windows\System32\fontview.exe"C:\Windows\System32\fontview.exe" C:\Users\Admin\AppData\Local\Temp\AGENCYB.ttf2⤵PID:3096
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:1352
-
C:\Windows\System32\oobe\UserOOBEBroker.exeC:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding1⤵
- Drops file in Windows directory
PID:2868
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exeC:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding1⤵PID:4908