Resubmissions

22-05-2021 01:37

210522-5jdlvbbkha 4

22-03-2021 19:07

210322-cxjdwefjv6 10

Analysis

  • max time kernel
    104s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    22-05-2021 01:37

General

  • Target

    3440085.pdf

  • Size

    58KB

  • MD5

    548c9fb16317023983983f0042bd6471

  • SHA1

    a1ea30d71d7282926d243ceba8d5326369cb81f5

  • SHA256

    ac0358c2bfc7566f191527a248641dd32bdd2e17115c7999e068c2e31db4b593

  • SHA512

    f1659f8d3b4ccfd2f7c21fd8284cb0c20a1ad8e7b044729bef19a065a4c478f036bfb2d720884f3ae65d064bbacf11041732af3007ba29457a93b112756b222a

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\3440085.pdf"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1100
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://cctraff.ru/wb?keyword=glasgow%20underground%20map%20.pdf
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1248
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1248 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:576

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/576-62-0x0000000000000000-mapping.dmp

  • memory/1100-60-0x0000000075AF1000-0x0000000075AF3000-memory.dmp

    Filesize

    8KB

  • memory/1248-61-0x0000000000000000-mapping.dmp