Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 13:35
Static task
static1
Behavioral task
behavioral1
Sample
Roblox Doors (1).zip
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Roblox Doors (1).zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
DoorsDefinitiveRegularr.ttf
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
DoorsDefinitiveRegularr.ttf
Resource
win10v2004-20240802-en
General
-
Target
DoorsDefinitiveRegularr.ttf
-
Size
11KB
-
MD5
b8e3b34249df05b34cff88a88bd35827
-
SHA1
b2eddd97c54ed451c11c2c819b9e20b7202f553c
-
SHA256
19911e3d93a582c3c4263ffdbf3c29a2bbbee06adb7a709ce3ef1f4c700109e9
-
SHA512
48abb6fa9b62261c3b5bf454e26621586a3ce1e438a1d2e09c09ad9025c348dd6eeacd545a7ba9185d4f2dc6a0f5d096a27f802460d38e2f590e6dc6c2c1b156
-
SSDEEP
192:hkLgJg6k/EdgBPfkU1kQEjYgx2RxYLelaqQrZ6/0y3kz+2iJifWEnhH:+LAdQkUKQEJx2RlQqAW0y3TW9
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell fontview.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU fontview.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots fontview.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff fontview.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_Classes\Local Settings fontview.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2812 fontview.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2812 2692 cmd.exe 31 PID 2692 wrote to memory of 2812 2692 cmd.exe 31 PID 2692 wrote to memory of 2812 2692 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\DoorsDefinitiveRegularr.ttf1⤵
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\System32\fontview.exe"C:\Windows\System32\fontview.exe" C:\Users\Admin\AppData\Local\Temp\DoorsDefinitiveRegularr.ttf2⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2812
-