Analysis

  • max time kernel
    115s
  • max time network
    159s
  • platform
    windows7_x64
  • resource
    win7-en-20210920
  • submitted
    28-10-2021 18:44

General

  • Target

    Outstanding_Invoice_10_29.pdf

  • Size

    35KB

  • MD5

    6da9c25fd69786797262133f5ae5b13a

  • SHA1

    20665729a04ce87d38eddd780c13cbbc4f9aacfb

  • SHA256

    e831bd6213fa5b9e25b89f7c1142acc8615f1c48c74db37bcfaa707fd3169c52

  • SHA512

    e10f0ddf2fda98009c16ab485c4f6e554cdb9e0fc572eea4e5613c55c65ff0c6e7b4f1835d21f2d6ed251bd068530aa385166548ef78d789e2241ee6970d3263

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 58 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Outstanding_Invoice_10_29.pdf"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:760
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://s.id/IdJgJ
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1832
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1832 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1608
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://s.id/IdJgJ
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1880
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1880 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1116

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{BA76A6D1-381E-11EC-9BB7-5A6B47CA3C39}.dat
    MD5

    67c14989825cea23f0b029748b9f2596

    SHA1

    9c2e0f2da7c3a556762dcb06beb801acefbfe5b2

    SHA256

    c205de8f4160f7f511fc426dc00a8eac7ade48020c1b52c693355f3e57c31e0c

    SHA512

    9c8dea1e20a82ac37b0b63150d8961bb532999e599c10eac8b316c86d911c8afb73d9c9cfc4eb5c557488e4063df843cf8a533fbd79c83abdf83f24b1a2921a3

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\ZR0SJ214.txt
    MD5

    c2df564cca7d9f3c69b173917108b3ae

    SHA1

    3e9270cbbafb139173f33f460c33ceb78f4f231d

    SHA256

    8dbf0b8f22677b723f7c80422bef69e7e9781777d62286fcb623ab753d3a3fec

    SHA512

    f8ae1ff929c38e5d217426e2ed177f87139f7ccec6246f2025adbf4549d079eb605245860bad428c9f2518a1a55e5dacea6fd2575b47a2160fd178cfc50d72d1

  • memory/760-54-0x0000000076201000-0x0000000076203000-memory.dmp
    Filesize

    8KB

  • memory/1116-60-0x0000000000000000-mapping.dmp
  • memory/1608-59-0x0000000000000000-mapping.dmp
  • memory/1832-55-0x0000000000000000-mapping.dmp
  • memory/1832-56-0x000007FEFBB51000-0x000007FEFBB53000-memory.dmp
    Filesize

    8KB

  • memory/1832-57-0x0000000001F20000-0x0000000001F30000-memory.dmp
    Filesize

    64KB

  • memory/1880-58-0x0000000000000000-mapping.dmp