Analysis

  • max time kernel
    133s
  • max time network
    151s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    11-11-2021 17:53

General

  • Target

    https://adobeacrobat.bookmark.com/

Score
5/10

Malware Config

Signatures

  • Detected potential entity reuse from brand microsoft.
  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://adobeacrobat.bookmark.com/
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3384
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3384 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1788

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_BACC6CD2B29F18349081C9FD2343833B
    MD5

    49c3142dab8cccf8a1883f556edff873

    SHA1

    78065d33a66ab0d73716218a51d94ae9cd1680b6

    SHA256

    e71385117577bd6a5128230f526b61f4d983aba5919aeb2ede0624b44c06566e

    SHA512

    c715fd356ddb2e0d587871036afd0cafabfb2870efc9c2ccf9a54c2799e75a786f980543bec38db62481f9b4900409feb6dd3b42439ae81d0167e860b31e4c6c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
    MD5

    4ad27e9078a9494c52aec3fe00f3c9b2

    SHA1

    b94ce5b171dd07c179a28f25888f079fea148392

    SHA256

    18dab0d9cbea9878c7c67d67f11e0d42557e97454fc306e7aa32a319cdf88e0a

    SHA512

    3c3d3334009dc0f77f18d725097a7f8318e826796e6d1f305f5ff48d030790e2d819ddc5d23e7e9b72e7edf707a741a06fec3866ecc4884b48ca8000742ca99a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\72BA427A91F50409B9EAC87F2B59B951_51D4168A3E588FEE362C2AF1D15F9951
    MD5

    eebce2c70004e4101ddb4f5f676ab489

    SHA1

    72fe26d0bd247115d008ce7bc86b4835618892d5

    SHA256

    06493af8b39f05c4e09dd342b4800ae6eae42f434cd3a15ba6302f1365398c8e

    SHA512

    c650c04469ef10c4cdcabd0b529f5da4a6d829f2fad892664791404ac7d847278f01d4016a726a8fecccc690b8058b58471597009dab733979774d60a4c7c6eb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_4643E2F01AB2AF262C11881642F53436
    MD5

    f900c5822e86ce44d60e830fd53dc1a6

    SHA1

    9b57f9169316b71e9bcbc2588b97364dc3ccbf7c

    SHA256

    c30067e2b84a1f2b3acdd0f7e146055d979852ad73ef51aee05bee98ca6892d9

    SHA512

    ba9eeb2b93e379d1789abf5f06e817c9b703dd3038415c17fece3b72123f5c2dc189c1e89d5718807c0b3ef30d3bb3a66c95086f71a81cd4a320db7e96224448

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
    MD5

    c026f0cefed02193d3bf7078c32c1f4b

    SHA1

    74357c790437e708d6152492f14f9a308a41c1ee

    SHA256

    a2293aa5e0cba820827fe6cbecf5d053a12c5cd625971c6470a5fc5079b95d8e

    SHA512

    f0e718e04dbd20c150659251786bd363f5aceb0a789f6e03b84e43405aebd3487e682a9fdfaf68c9f55e260a632fde553d0c85f317dd80960aec547632f6874a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
    MD5

    64e9b8bb98e2303717538ce259bec57d

    SHA1

    2b07bf8e0d831da42760c54feff484635009c172

    SHA256

    76bd459ec8e467efc3e3fb94cb21b9c77a2aa73c9d4c0f3faf823677be756331

    SHA512

    8980af4a87a009f1ae165182d1edd4ccbd12b40a5890de5dbaea4dbf3aeb86edffd58b088b1e35e12d6b1197cc0db658a9392283583b3cb24a516ebc1f736c56

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_BACC6CD2B29F18349081C9FD2343833B
    MD5

    f25b0fed459155651228fd80f87a84e5

    SHA1

    3e50b921e3d8851842dc5e881e462a128976e3fb

    SHA256

    ae98778f95fe893af10bea0fe1454dfe94b71cf4e706e5673500e75db58c3060

    SHA512

    68143a53555ff80b130b8c682ed1baac7764761a4035e02de8da35497afd7234f66e28b385a1b956224aa9e2d9fce4ae2350fb81a339e629392497cdf65ac8c2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
    MD5

    5f627bf7f71368a96292a817ecd3f523

    SHA1

    c19b91a3ea44ac8408d6f044e268a81ac275e1d6

    SHA256

    d867d77472adf03a015f31cf556629c53d87cdb042da4b6426cec3244bc82e9c

    SHA512

    0e129c4109a0bda7eda7b3c8c2088d97841f52382652a24c8119c4bb552b5fe36b2b5e28c168f7fb5e50e79be32f3bced752f8dc56b7d58603bfe68dc0453912

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\72BA427A91F50409B9EAC87F2B59B951_51D4168A3E588FEE362C2AF1D15F9951
    MD5

    00e3f6dfa54d0dc54e20cae1742fd9d9

    SHA1

    7521fbd8d0519d5bc52124c2ec67e2a26f0b66cb

    SHA256

    9a00943a5c1e237e6cddf81deeccbf19b021786a9a57c7b9f78c30aaa135e0dc

    SHA512

    d3f19be5919857e7c361cb9a562026e615091efbef8777951ad5157a8899b4308cceb160f3ddfa8198da6f77a138b66b94d44320359746efc989e8736ac4a94a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A16C6C16D94F76E0808C087DFC657D99_4643E2F01AB2AF262C11881642F53436
    MD5

    1e09cf0d3eac7a1f0144d83ee649ab7e

    SHA1

    7a012f7ad46d915321620febf19b8d7c834bd5fa

    SHA256

    f619146880372053044e2f9a72991c1d95a529f4177158f2e6580bd4811528a7

    SHA512

    76d79af73e678ab6bce3d7097c69b5f74cd0bd45b467c9999ed258b6c021fdcbdc4b949d7e13cd922203fc124b9305f810d1d3389995f9b38b3c6caf00fe4253

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
    MD5

    a2664650cf4915bab97c992dd80225b6

    SHA1

    4f20be98cfd08f86746f2d85249b32eed64ce44c

    SHA256

    db9d3213fc5efd6f93b5704fde82950aa360e0e6ef1f7f9c46ca12958ca04cb3

    SHA512

    30c8a3ded0e58ade18d79c010ad1093afd9a18afa5f45c21db20c0915ad7653750ae3300cbe1c0626c92f1a2a9ac115be057d6a8ceef52288ac213e8f7004eaa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
    MD5

    1220ef78accfe38685ea1baf19750b36

    SHA1

    eea7a37cd6e7fa8358678037235867228521c65c

    SHA256

    7509a9aa3462782117dabed775869c6cba9abd4ea3be230d1ba75d83cadf50f6

    SHA512

    e65f6823b0685ae8a609b526ffcc9abaa4073b3e14fe4e190d421ee8f6d6f3f4c1e94f98e66ee432559b7c9b9c56e0e0dc7d76b7498a8f9ca7288461c47d8aa5

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\3NQ551MA.cookie
    MD5

    c54d77b6e8fd01b92306ebe655e103a0

    SHA1

    0a245e905dafe1e8e4fa9f1e2ec34c7662649dc9

    SHA256

    13901fbdd3db5571f9a976caf16f5d806b7dc961f5d6b709414807703392f2ae

    SHA512

    2428ed629d52f892b80d419309730946b1d8c1a02ac84f916e9be84ecdd16aac94a1a563cd1457bd8c5e0aed8190d4785eaf00b3105204960e82952c35ecdd78

  • memory/1788-140-0x0000000000000000-mapping.dmp
  • memory/3384-151-0x00007FFA8B3D0000-0x00007FFA8B43B000-memory.dmp
    Filesize

    428KB

  • memory/3384-166-0x00007FFA8B3D0000-0x00007FFA8B43B000-memory.dmp
    Filesize

    428KB

  • memory/3384-135-0x00007FFA8B3D0000-0x00007FFA8B43B000-memory.dmp
    Filesize

    428KB

  • memory/3384-136-0x00007FFA8B3D0000-0x00007FFA8B43B000-memory.dmp
    Filesize

    428KB

  • memory/3384-137-0x00007FFA8B3D0000-0x00007FFA8B43B000-memory.dmp
    Filesize

    428KB

  • memory/3384-138-0x00007FFA8B3D0000-0x00007FFA8B43B000-memory.dmp
    Filesize

    428KB

  • memory/3384-133-0x00007FFA8B3D0000-0x00007FFA8B43B000-memory.dmp
    Filesize

    428KB

  • memory/3384-141-0x00007FFA8B3D0000-0x00007FFA8B43B000-memory.dmp
    Filesize

    428KB

  • memory/3384-142-0x00007FFA8B3D0000-0x00007FFA8B43B000-memory.dmp
    Filesize

    428KB

  • memory/3384-144-0x00007FFA8B3D0000-0x00007FFA8B43B000-memory.dmp
    Filesize

    428KB

  • memory/3384-145-0x00007FFA8B3D0000-0x00007FFA8B43B000-memory.dmp
    Filesize

    428KB

  • memory/3384-147-0x00007FFA8B3D0000-0x00007FFA8B43B000-memory.dmp
    Filesize

    428KB

  • memory/3384-149-0x00007FFA8B3D0000-0x00007FFA8B43B000-memory.dmp
    Filesize

    428KB

  • memory/3384-150-0x00007FFA8B3D0000-0x00007FFA8B43B000-memory.dmp
    Filesize

    428KB

  • memory/3384-115-0x00007FFA8B3D0000-0x00007FFA8B43B000-memory.dmp
    Filesize

    428KB

  • memory/3384-155-0x00007FFA8B3D0000-0x00007FFA8B43B000-memory.dmp
    Filesize

    428KB

  • memory/3384-156-0x00007FFA8B3D0000-0x00007FFA8B43B000-memory.dmp
    Filesize

    428KB

  • memory/3384-157-0x00007FFA8B3D0000-0x00007FFA8B43B000-memory.dmp
    Filesize

    428KB

  • memory/3384-163-0x00007FFA8B3D0000-0x00007FFA8B43B000-memory.dmp
    Filesize

    428KB

  • memory/3384-165-0x00007FFA8B3D0000-0x00007FFA8B43B000-memory.dmp
    Filesize

    428KB

  • memory/3384-164-0x00007FFA8B3D0000-0x00007FFA8B43B000-memory.dmp
    Filesize

    428KB

  • memory/3384-134-0x00007FFA8B3D0000-0x00007FFA8B43B000-memory.dmp
    Filesize

    428KB

  • memory/3384-167-0x00007FFA8B3D0000-0x00007FFA8B43B000-memory.dmp
    Filesize

    428KB

  • memory/3384-168-0x00007FFA8B3D0000-0x00007FFA8B43B000-memory.dmp
    Filesize

    428KB

  • memory/3384-169-0x00007FFA8B3D0000-0x00007FFA8B43B000-memory.dmp
    Filesize

    428KB

  • memory/3384-170-0x00007FFA8B3D0000-0x00007FFA8B43B000-memory.dmp
    Filesize

    428KB

  • memory/3384-171-0x00007FFA8B3D0000-0x00007FFA8B43B000-memory.dmp
    Filesize

    428KB

  • memory/3384-174-0x00007FFA8B3D0000-0x00007FFA8B43B000-memory.dmp
    Filesize

    428KB

  • memory/3384-175-0x00007FFA8B3D0000-0x00007FFA8B43B000-memory.dmp
    Filesize

    428KB

  • memory/3384-131-0x00007FFA8B3D0000-0x00007FFA8B43B000-memory.dmp
    Filesize

    428KB

  • memory/3384-129-0x00007FFA8B3D0000-0x00007FFA8B43B000-memory.dmp
    Filesize

    428KB

  • memory/3384-128-0x00007FFA8B3D0000-0x00007FFA8B43B000-memory.dmp
    Filesize

    428KB

  • memory/3384-127-0x00007FFA8B3D0000-0x00007FFA8B43B000-memory.dmp
    Filesize

    428KB

  • memory/3384-125-0x00007FFA8B3D0000-0x00007FFA8B43B000-memory.dmp
    Filesize

    428KB

  • memory/3384-124-0x00007FFA8B3D0000-0x00007FFA8B43B000-memory.dmp
    Filesize

    428KB

  • memory/3384-182-0x00007FFA8B3D0000-0x00007FFA8B43B000-memory.dmp
    Filesize

    428KB

  • memory/3384-123-0x00007FFA8B3D0000-0x00007FFA8B43B000-memory.dmp
    Filesize

    428KB

  • memory/3384-122-0x00007FFA8B3D0000-0x00007FFA8B43B000-memory.dmp
    Filesize

    428KB

  • memory/3384-121-0x00007FFA8B3D0000-0x00007FFA8B43B000-memory.dmp
    Filesize

    428KB

  • memory/3384-120-0x00007FFA8B3D0000-0x00007FFA8B43B000-memory.dmp
    Filesize

    428KB

  • memory/3384-119-0x00007FFA8B3D0000-0x00007FFA8B43B000-memory.dmp
    Filesize

    428KB

  • memory/3384-117-0x00007FFA8B3D0000-0x00007FFA8B43B000-memory.dmp
    Filesize

    428KB

  • memory/3384-116-0x00007FFA8B3D0000-0x00007FFA8B43B000-memory.dmp
    Filesize

    428KB