Analysis

  • max time kernel
    103s
  • max time network
    76s
  • platform
    windows7_x64
  • resource
    win7-en-20211014
  • submitted
    27-10-2021 08:34

General

  • Target

    rowariwudujiladekodazela.pdf

  • Size

    83KB

  • MD5

    74da5b7593809ee361b3f300d3cbb0ac

  • SHA1

    1795644dce1e83ac9d8663c2f2e0cd46f59b4857

  • SHA256

    83e1bc4abacb5929d391c758952323304acaa0a696cae11928fd190ee9871196

  • SHA512

    f9141f2714e3f71447ce8464597299127259d35cfbad14d7deb93f3b904f209f03e82ee07f6c63d9824f4cc5a304e59d60ae3f8ca5895283e0c06eff113aa8a7

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\rowariwudujiladekodazela.pdf"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1700
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://feedproxy.google.com/~r/1eyvgo/aqOO/~3/LPIa9PGmDLg/uplcv?utm_term=oet+warm+up+questions+and+answers+for+nurses+pdf
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:536
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:536 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1244

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    MD5

    dd189e08018a906c1e4227d795ddb29e

    SHA1

    55bd8d3d693ad8818f4d0972117bc74738312ca0

    SHA256

    e8e85240a829350224eb3059e0c7ce151901d796a38d91d52f2699f4fa1ac587

    SHA512

    5ec662d77e50baf2ab57ac99bb7128e500a26e9999d614f3e6c8af5be37978298c99dd2502f59807dc2f56323976abc3c200545e49218873b467906011936a8d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\7RK099HU.txt

    MD5

    94028c61a0447a700d4261065317b799

    SHA1

    99366a682204debd2c24d2aeb67ffc68e0d4e521

    SHA256

    215674324f25de252f8b075ef56532268926511e57d00b3ac4f268443b0e93ae

    SHA512

    9b5dcdc32f00017157ca13c01395e558bd4dd24e938dcf9020cee9d1a3960f0135185a622eef89ab5fde24193a5eab70c6476abac74e61bd903b80c092e26abe

  • memory/536-56-0x0000000000000000-mapping.dmp

  • memory/536-57-0x000007FEFBD61000-0x000007FEFBD63000-memory.dmp

    Filesize

    8KB

  • memory/1244-58-0x0000000000000000-mapping.dmp

  • memory/1700-55-0x00000000757E1000-0x00000000757E3000-memory.dmp

    Filesize

    8KB