Analysis

  • max time kernel
    119s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-en-20211014
  • submitted
    15-11-2021 10:13

General

  • Target

    09c9d9827554bd4361be386c70a8db9f.pdf

  • Size

    30KB

  • MD5

    58c0e38e53d932eaf9b3461fee556171

  • SHA1

    b5690a1b9a0df83eac3ced67bf15930760aadc20

  • SHA256

    45588bd540c3664239a86e838628d0eb4c8304b1f27e41c3beca84473b737c35

  • SHA512

    365f2630d7ae81af270f937dce570d6f0387d34dd6d6db11a449fcf94885b35692d295f3bad982ad6fa8e524b1fb6a16b7b1d4accc6a442eef6512e33c9cb76b

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\09c9d9827554bd4361be386c70a8db9f.pdf"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1620
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://corporateestate.co/fefadrn/R3ZrNDLYuVKQaQILApkrOjlMcI8/ZFs1qPUFTEVhnhxvEa8JM9phXZaf/38xFhqspEhvuliDZnDbz1PDeWaQ/UCpSt5va2wWqTK0yABq5G0q1ikdw3irbaK?e=30QBKaz4HBgh6sBOClRWQhzZj2o9I6gpOOXllmBfAVwid8mrr98AwpvM2Borange2xEfVHdaU5EuyxD0VEe9cJN2dRRWuXZCdsD6L0zqAOc0nzuQFwxZN9u
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1448
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1448 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1608

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\BZ9GOOS7.txt
    MD5

    4efb961cc843708c667515cc72527bd0

    SHA1

    d258b9f8ec807984512f65c16a9193595e66bb3f

    SHA256

    d0435ec4961b59ab2d1da2aec2504af9bc6b87878a7dc8e244fb89ac0ae7b030

    SHA512

    efce28798d07a54c445c0c543ed70af9e2d607fa1d94ab094ff5f0c7d3bc9959676dadd2b0572782ccfdc218347a9b75a595448a228454232a6fc2e02591cf70

  • memory/1448-56-0x0000000000000000-mapping.dmp
  • memory/1448-57-0x000007FEFC481000-0x000007FEFC483000-memory.dmp
    Filesize

    8KB

  • memory/1448-59-0x0000000003A70000-0x0000000003A71000-memory.dmp
    Filesize

    4KB

  • memory/1608-58-0x0000000000000000-mapping.dmp
  • memory/1620-55-0x0000000075C21000-0x0000000075C23000-memory.dmp
    Filesize

    8KB