Analysis

  • max time kernel
    120s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    20-11-2020 02:29

General

  • Target

    harden.pdf

  • Size

    31KB

  • MD5

    22a79180cb5003766143cedf02192abe

  • SHA1

    e43f9ef3dd7de0a77741d09b5cfd6a5038cbd25f

  • SHA256

    5af64b0bdfb44d5ec981abd1fd1edd5b6661b41754be37db5b14977d040f1068

  • SHA512

    4243bc6b47d506c728b5e007c3f3706734d19859578c79e152dc9e5735c3db853730c1d4c8305dfa49173488d57565eadacf399f24253dd1384aa023d414fc77

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 61 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\harden.pdf"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:240
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://abuklbl.red-ton.org/4d7614aa
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1236
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1236 CREDAT:340993 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1460
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1236 CREDAT:4207618 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1712
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://abuklbl.red-ton.org/4d7614aa
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1592
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1592 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:688

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    0650b1298871c15ea1c37d6f7d11afb4

    SHA1

    4eff7c8981caae3d60c5dfdcf25d140a0570c3a3

    SHA256

    01d864667e3620ad3a27b825aea450090de12d740eecab569b6ab05136ec4203

    SHA512

    f615e498616162efce591f710a67acb30a26cb8cc161754e1ffcafeeb1135d5d7d6fce5e207156b8069717aca42bee19edec03520f4df993ece4f3330d8a0548

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{BBED7701-2AD7-11EB-B13B-FE5A252B9BCD}.dat
    MD5

    17f298642b87b28e43ecf6ea85bde6f5

    SHA1

    86231ef1a99d3c627ce89caf1e0ce7b7e2fc844b

    SHA256

    6ae91491e3effa757ec0e05fcc72e741758455f0a45db90da38b12fd30ba8839

    SHA512

    ced00c18766daccde058e0dfe3fb02736a50a059407e43e56d18c58040b7bd622310a0a1252aef84517f89508ee5b504f257ca4d9eded7905e319b414fa89d4a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\DRUH5Q0M.txt
    MD5

    2fef79e28623f3c7cc7115fa88c32b73

    SHA1

    5f3821a3b3ad967c27a9895520e2df26fec0ad72

    SHA256

    23b9e497546a6a1c1f1bb1d4c39337bcc9d978b5d25bf77a76086dcfed187510

    SHA512

    6d929f7f2cb218d31ed72bd077845569d471723b07c177b1719d0a260e0c197664612cb4d0e1d36bffcfde6dbea8719a9ebeac5c96a2daaa620197af7f133581

  • memory/688-4-0x0000000000000000-mapping.dmp
  • memory/1236-0-0x0000000000000000-mapping.dmp
  • memory/1348-1-0x000007FEF7800000-0x000007FEF7A7A000-memory.dmp
    Filesize

    2.5MB

  • memory/1460-3-0x0000000000000000-mapping.dmp
  • memory/1592-2-0x0000000000000000-mapping.dmp
  • memory/1712-6-0x0000000000000000-mapping.dmp