Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/08/2024, 05:34

General

  • Target

    Browser/fonts/NotoSansBamum-Regular.ttf

  • Size

    224KB

  • MD5

    f0b22427c3ddce97435c84ce50239878

  • SHA1

    a4a61de819c79dc743df4c5b152382f7e2e7168d

  • SHA256

    0282610e6923d06a4d120cff3824e829b4535a8c4c57c07e11dbe73475541084

  • SHA512

    ff2b22e58597d0ba19562c36f03cf83b5f327eee27f979c9ff84fe35a21b1fc9234f21fdb35fb95f933c79b9cf7760328d29b31480153da59a6576cf5f7f544e

  • SSDEEP

    6144:NNP99a3pfUJUpRm3tLrvg3Bq9cIIdXXjwdzdwRhChZhe:Xra3pp83hg3BbdXXo+hChZM

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Browser\fonts\NotoSansBamum-Regular.ttf
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3208
    • C:\Windows\System32\fontview.exe
      "C:\Windows\System32\fontview.exe" C:\Users\Admin\AppData\Local\Temp\Browser\fonts\NotoSansBamum-Regular.ttf
      2⤵
        PID:556

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads