Analysis

  • max time kernel
    118s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-en-20211104
  • submitted
    11-11-2021 00:05

General

  • Target

    6f98ff0d1dffac9161eef00a0f06b024.pdf

  • Size

    120KB

  • MD5

    6f98ff0d1dffac9161eef00a0f06b024

  • SHA1

    3d8ffb5745592c7f97e94ab89bf5f1fcc5f1834d

  • SHA256

    c862931bec9852c007976dc8f55a8a777bc4b6d2cc4e9204b47d5d94871c76db

  • SHA512

    01653cf259bf8469039602e89973812a21e7488165ef095da8a81b14020da88ff2983aafd570e63512b0640bbf1320e063613655a9a77f75813ff224fa56b2ff

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 40 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 18 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\6f98ff0d1dffac9161eef00a0f06b024.pdf"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1412
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://allytemp.ru/uplcv?utm_term=doxycycline+for+pilonidal+cyst
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:364
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:364 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:976
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:364 CREDAT:209934 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1156
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:364 CREDAT:1061908 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2012

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751
    MD5

    54e9306f95f32e50ccd58af19753d929

    SHA1

    eab9457321f34d4dcf7d4a0ac83edc9131bf7c57

    SHA256

    45f94dceb18a8f738a26da09ce4558995a4fe02b971882e8116fc9b59813bb72

    SHA512

    8711a4d866f21cdf4d4e6131ec4cfaf6821d0d22b90946be8b5a09ab868af0270a89bc326f03b858f0361a83c11a1531b894dfd1945e4812ba429a7558791f4f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3FC55CA268311C2D98EBBE05755FE802
    MD5

    cb44a282a7fb0703a8ce9063975dda81

    SHA1

    dd54ca0d2f00f323f56d1b469df1236742b71d3b

    SHA256

    8e0fe8924d1d3478f71071a7c33e50f5c994604b6137327d7a03f5527da7ebd8

    SHA512

    7555c86d05a140ca7876d1ce76c942799758d8aa9a5c86eca18847ccfa2bb5294bc19a977472380e0a4b1a5240c4754b5b6680d331285dc917bf4baceede8a81

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\75CA58072B9926F763A91F0CC2798706_93E4B2BA79A897B3100CCB27F2D3BF4F
    MD5

    903bb99de322d5e71d7c3b45e26e2308

    SHA1

    2b74596d5aaf4a7fd06d96ba7c7c4d26c3b3cf74

    SHA256

    b109b0bd246fd68550f6eb0fe63d94edb16393feb24f0d8d86abb0348f88e65b

    SHA512

    69c51b109cae2d280f541337e8f11655adafe895806b3d6deeb991e20cb2691b69ec387e31e3ff52663f4ecd3d1df2958945193e6f8f6dc184d214781ec49d75

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A85637D1577085D4EBC6006CDA816672
    MD5

    66cf6aff091ea83e63440164e01b3e62

    SHA1

    abfdbf2c43d1baedeed9a55702914acb5bd817d7

    SHA256

    e29d57d137cb7efcd02002b29d47ef348100e9097268080ada4be33a82c0571b

    SHA512

    1be53424290cdb9facc404d082a0fa4c5ea9704733780cf7bb3eab1dd5472e25018d0fea6ea2c1b6be91207752167cc1487c7d4c29a60ba46b5b3434b63ebd44

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62
    MD5

    27c4210ee0d896fca9caec86136105ee

    SHA1

    6485a63e6cc194d3fe1b22d75633d51be516ccf8

    SHA256

    5f06f89fe51e44b13cb853c161888b7554d2d8195800d41a88d2cbadc051bec1

    SHA512

    b694c3191130cfd07c218d677b7493a3467984fb04d06f5b0de6e564dfef740fa3df5dbecb50c96404e3b88206a33f5c3abb560957d15eacadc57ffb87d09d94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894
    MD5

    aa96d682edfbdccdbe2acd5b1ca56c8d

    SHA1

    c0e90d620c088184e3c21b20c06d67481b159430

    SHA256

    6d87103091f120e547832d4a3cf19ca4141843669082084e0c9d0e4c3f972907

    SHA512

    06cef6aa95f1aa86bebf1dd0f8895e6cff686dc672c2f08fa7912de1078d4f6ba05e1eb52102bb341ee9de1cd0141f817e5bf08f9ceb012204cb5289d1cec8c3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\FC5A820A001B41D68902E051F36A5282_97C4333FDCD903CC9B4D784B1218B9AE
    MD5

    5953f64fd6683d7a255de465ab51c50b

    SHA1

    49cbcd3d30f56edf451a685f8ee2aab54e887187

    SHA256

    967469b5100571d7d8469a749df9d6dc4f9f8b0fdd0dd72434b3746d8ed52085

    SHA512

    3f62e52ff633203ffe2363d73bece0d6492f2820132e3027f6262189d4909f4f33f16927c91db1f9f4805c2b8e1fc5cd8a65e5c283a293c2bd44dffebcc84d66

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
    MD5

    106f6ac4593350dd3f89122434353ae5

    SHA1

    d3942190645eba32a5368253160084a6d21eaecc

    SHA256

    7b18b437433db674b06fab35f43392c84475e99d45722cb76e44b0d4f6760161

    SHA512

    e96a8decaf0d3e483d61f591db50e35bd64293c3c387753235f5c6b48d12392fa283489b1dd57cb73802a278abf3efc11e22cd0891afaf63eb1693ef19ed2067

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3FC55CA268311C2D98EBBE05755FE802
    MD5

    ddbc495832c52c68b4dd4af82fc335ed

    SHA1

    a353639bb9f11ca765ddcdbbd07b4bf166dbf0db

    SHA256

    270d4c38d7e430309f7fe74f0fb14dcfddc46508ef0e9c691d07d00958442ed9

    SHA512

    90af78eace927352f6d2baf32a18e4f3ed4c5c9bfbfb33d95b47369b8ca8e3d8cdd32f75039342fae9d409366c1b419cc0c29b0c81ce6d06b36e06ca8be4facd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\75CA58072B9926F763A91F0CC2798706_93E4B2BA79A897B3100CCB27F2D3BF4F
    MD5

    c858c21caa79612ac8b77cfe8d4ffe9b

    SHA1

    b3ec73d57ced385162af978bcfa25edca7a991cc

    SHA256

    2a1e4ab899f5025469fcd99a75d34c3af522cb29c7d7f26d5d5d960a773094ca

    SHA512

    9ccb34ac1e1d5488f966172c49f8e758b5edc8d9a928781f9302e67b531b2b43968678de3d6994bddd58984a261ec448fe206ea92b79d2eed0f1643a21198814

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    544c196a956b2f7285da51113d2c9c8c

    SHA1

    cbe255298aa1e66968cde64f290bcf759451e595

    SHA256

    8ecd13a604b30b510b35ca8d26b2db891577218471d16e4a8ba559881a83aaa2

    SHA512

    9cbf8d14cca9af0fa983c51f5f0573c602c90e6c8e2c8744bafd385a726a7acf1bec9e26282502e778ec6b8d46b7020eef4fc05293eebb916fd164457825a534

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    46cad4cfdd091ad489f3b0aa655cbbec

    SHA1

    a70cade7815f4187b5c088810258b9a614df53a2

    SHA256

    0e312f015c1eb9a1700a1ff13bfc0dde134e7c6bbaa1d1c59c3bcbc6fd4196b7

    SHA512

    cfe28faac636c72a79eaa11282c9868adc7e38f5442979ced7a2c514d507f7d11d548062f3f917524223c92b248f9d7d2cd8e861bf92f82fa848239e74c466eb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    dd846051f8f1d6314130d0134de28c46

    SHA1

    12319ae7b4b5a1843c32306b60721d273667d553

    SHA256

    cda6ebd4ebca37593b95948361c22df323fc05c86f8d69730e481567f8acadde

    SHA512

    5469e08a37e9d30bbdda335e4c5128528c9038b3de9012a888415b7313fdb20a27e0984906b96d51aaa4befb9cf638f37f6fb1edfa4e2ade5ea29ee2374ceb81

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A85637D1577085D4EBC6006CDA816672
    MD5

    cf9cc66840b3b9052cfe59d3cd610839

    SHA1

    9f6ed3babf93dfb7a2efb2a7f28f67c3ab4ab44f

    SHA256

    33a9045b4f40d3bcf253e66c1008e474873eb55c45dcc5c4c2767951f411f2b2

    SHA512

    d63ba9971bc9de4ddabbcc7e9b7d3cf29169c684a09faaf5bd6f74e9da004134434d9ea88bc548cfbabb4cf1c8bfb6f284d6343b46fa8a54840b99f13b8ed465

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62
    MD5

    a5412e009760939b3853b06facf29eae

    SHA1

    eccf3ed96ae1e4f67d6f781a2b0afa9cc31a40f8

    SHA256

    ce8436b96fa206f14ec7c71d7614d889a262317f6fd05155a509778fc8821f54

    SHA512

    5bb7e3ad933627028b0b52495d9a5017c853ba638fed09388f045cb1deca93774efbda35f2ec7844dd82fb4e46f9972e0602143a15c1418f9bd9303efde0cd04

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894
    MD5

    950039f42fdcf387324e25619d25462f

    SHA1

    3e8d38a5f8f6385345625cdbd8ea701c70cbbde2

    SHA256

    febf0f7f49b7a6209e61f8600304c19abb6dd97cadd9ef8b4caafb99b9f26a43

    SHA512

    8df45aabaea7b3df12d00416de04cf85e114bfd749b68e76e836f88637fc0fd6925b7213a55844b902303515729e73a0c751951e3eb58d1381bfe61fa22d309d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FC5A820A001B41D68902E051F36A5282_97C4333FDCD903CC9B4D784B1218B9AE
    MD5

    f0bd236d0f21170de12d8061ca94de87

    SHA1

    700ac8b09cbe7a5fd3747191c2b27a9dc9434343

    SHA256

    1f54433019312f62f448a52fe813d8435aef6f84f1c0b889671b66c72a8d3072

    SHA512

    a61a4b7e2548cc596a73c8d22dd5140b11adc82910661278e9075244ba7000a80b13a0d5b442c504f31ee5b261ae61863994a0b7936743d52d42194d46bf8586

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\232BQ5Q8.txt
    MD5

    9a09f9081cd368dc4e46285751d73fc2

    SHA1

    54c655f64385c52f9dd1e1ad15a7dc391ebb1e7b

    SHA256

    a1e037f276a73481dab5ed063e1c9bcbaea90c2eeabf8a76d7829aba20073ba0

    SHA512

    3a82c5931eedde800cb61331c1c9d1db52a1b9ceedfac14d026a1cd6a10742916f9e1cbbb9502620fc77591f9fae95ba5daa308f152898e8b35ebc8386e7c8af

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\S5MYEK6S.txt
    MD5

    cc1d4118697666c0019c12a0e61add84

    SHA1

    fe9341c16d72a5c02add2bb4d9286fbd9a531cc2

    SHA256

    8ff043367cd7b4cb2d00bedc6e9640f4992c0d1c6ad3fb00302bf50a177b3390

    SHA512

    fea96c64da861760c24e518848c51ce445e4ff0afe85e8d353646ae1b0b0b508c2a3c4b7796f7aa38bb82eccc296c24c64b89b51acf35fc9437728927e20228d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\SBV3HMVA.txt
    MD5

    474e64de8f90c474b7675998d000eb0b

    SHA1

    cfeab38108b1863be7781247eaeb0053e17bda95

    SHA256

    dafb214f16c47c38a8187e1c41ca92944af44d79eeb755913b8e89b141442925

    SHA512

    5910482504812114da93ef0c95609f8c22f3849ab2aae4b209428ac1cc92495d2c88669adf94ac9399ef411f8518597895b42c5eda2978de3dcea993807ecd43

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\YWPJOUTS.txt
    MD5

    6862439e2858f85674cf9372312a582f

    SHA1

    afdb567434645c3396913769fbfb3b8910e4ae15

    SHA256

    cd6b3377b8e8dd2ba0109520a98d3cefed5311ba64bf39a1884de97de5b993f1

    SHA512

    2cfd3fe84973f4e977c02a28d8c8cc51421cdc68f188aa5426be275eb303adc5f64a662d4a8235b4e0cb11dc85d8218e52a02cb43d92b728abcc9a1341fa6226

  • memory/364-56-0x0000000000000000-mapping.dmp
  • memory/976-57-0x0000000000000000-mapping.dmp
  • memory/1156-58-0x0000000000000000-mapping.dmp
  • memory/1412-55-0x0000000075141000-0x0000000075143000-memory.dmp
    Filesize

    8KB

  • memory/2012-67-0x0000000000000000-mapping.dmp