Analysis
-
max time kernel
121s -
max time network
129s -
platform
windows7_x64 -
resource
win7-en-20211104 -
submitted
15-11-2021 17:41
Behavioral task
behavioral1
Sample
AVISO DE COBRO MESUALIDADES.pdf
Resource
win7-en-20211104
Behavioral task
behavioral2
Sample
AVISO DE COBRO MESUALIDADES.pdf
Resource
win10-en-20211014
General
-
Target
AVISO DE COBRO MESUALIDADES.pdf
-
Size
87KB
-
MD5
858f0402eba52523a2ebcb89bfe14f84
-
SHA1
501504ff6611cb7f4bd00a5ef118b9702153c3c4
-
SHA256
1b490b2d0459655c46522f7e31fbb40b32cb8e42b87325f3cde040cfa6ac2cf9
-
SHA512
16508dbd3733fc1d88b9b00650c61c8577736d0bb7e9dfc9003a66ea2f81ab21132b9f3610c3b3b28550d985eeee6aeb3e798e1be6310ae628613a684b3c02f0
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
Processes:
iexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = 60605bbc48dad701 iexplore.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\Main\DownloadWindowPlacement = 2c0000000000000000000000ffffffffffffffffffffffffffffffff4c020000c0000000cc040000a0020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F5BE9161-463B-11EC-B70D-7EBAD90671C6} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Modifies registry class 2 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
vlc.exepid process 940 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
vlc.exeAcroRd32.exepid process 940 vlc.exe 792 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 24 IoCs
Processes:
iexplore.exerundll32.exevlc.exepid process 516 iexplore.exe 516 iexplore.exe 516 iexplore.exe 1212 rundll32.exe 1212 rundll32.exe 1212 rundll32.exe 1212 rundll32.exe 1212 rundll32.exe 1212 rundll32.exe 1212 rundll32.exe 1212 rundll32.exe 1212 rundll32.exe 1212 rundll32.exe 1212 rundll32.exe 1212 rundll32.exe 940 vlc.exe 940 vlc.exe 940 vlc.exe 940 vlc.exe 940 vlc.exe 940 vlc.exe 940 vlc.exe 940 vlc.exe 940 vlc.exe -
Suspicious use of SendNotifyMessage 7 IoCs
Processes:
vlc.exepid process 940 vlc.exe 940 vlc.exe 940 vlc.exe 940 vlc.exe 940 vlc.exe 940 vlc.exe 940 vlc.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
Processes:
AcroRd32.exeiexplore.exeIEXPLORE.EXEvlc.exepid process 792 AcroRd32.exe 792 AcroRd32.exe 792 AcroRd32.exe 792 AcroRd32.exe 516 iexplore.exe 516 iexplore.exe 1028 IEXPLORE.EXE 1028 IEXPLORE.EXE 940 vlc.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
AcroRd32.exeiexplore.exerundll32.exedescription pid process target process PID 792 wrote to memory of 516 792 AcroRd32.exe iexplore.exe PID 792 wrote to memory of 516 792 AcroRd32.exe iexplore.exe PID 792 wrote to memory of 516 792 AcroRd32.exe iexplore.exe PID 792 wrote to memory of 516 792 AcroRd32.exe iexplore.exe PID 516 wrote to memory of 1028 516 iexplore.exe IEXPLORE.EXE PID 516 wrote to memory of 1028 516 iexplore.exe IEXPLORE.EXE PID 516 wrote to memory of 1028 516 iexplore.exe IEXPLORE.EXE PID 516 wrote to memory of 1028 516 iexplore.exe IEXPLORE.EXE PID 516 wrote to memory of 1212 516 iexplore.exe rundll32.exe PID 516 wrote to memory of 1212 516 iexplore.exe rundll32.exe PID 516 wrote to memory of 1212 516 iexplore.exe rundll32.exe PID 1212 wrote to memory of 940 1212 rundll32.exe vlc.exe PID 1212 wrote to memory of 940 1212 rundll32.exe vlc.exe PID 1212 wrote to memory of 940 1212 rundll32.exe vlc.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\AVISO DE COBRO MESUALIDADES.pdf"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://rebrand.ly/ack_recv_cobr_142⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:516 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EU9ERU9I\RECIBO DE COBRO_15D1.rar3⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EU9ERU9I\RECIBO DE COBRO_15D1.rar"4⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EU9ERU9I\RECIBO DE COBRO_15D1.rar.k75fdo2.partialMD5
e034ce0a98544efd39160c3ecbe3efe3
SHA11c47e66c260b800a8650b8a4839b45f02a3fcaf6
SHA2566cffab1cf391a16187a0ee30f76eeb935d5100d875415385a130c7e8bd8a9e36
SHA512d1df7b21d8585219355262cb68dbc819ad0639da21dd578529bc04ae4137e1d8e9bfa6a721de71934cda0eba44efbd8bff008675f0f3000a1b8031f4260835f2
-
memory/516-56-0x0000000000000000-mapping.dmp
-
memory/516-57-0x000007FEFB931000-0x000007FEFB933000-memory.dmpFilesize
8KB
-
memory/516-58-0x0000000002020000-0x0000000002030000-memory.dmpFilesize
64KB
-
memory/516-60-0x00000000020F0000-0x00000000020F1000-memory.dmpFilesize
4KB
-
memory/792-55-0x0000000074E51000-0x0000000074E53000-memory.dmpFilesize
8KB
-
memory/940-64-0x0000000000000000-mapping.dmp
-
memory/1028-59-0x0000000000000000-mapping.dmp
-
memory/1212-62-0x0000000000000000-mapping.dmp