Analysis
-
max time kernel
123s -
max time network
145s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
23-11-2021 23:55
Behavioral task
behavioral1
Sample
bd9d38ee53e6e4992bbd4c2ead2fa5ecd948912d5fefc02ad1ab05fc923c2371.pdf.000.pdf
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
bd9d38ee53e6e4992bbd4c2ead2fa5ecd948912d5fefc02ad1ab05fc923c2371.pdf.000.pdf
Resource
win10-en-20211104
General
-
Target
bd9d38ee53e6e4992bbd4c2ead2fa5ecd948912d5fefc02ad1ab05fc923c2371.pdf.000.pdf
-
Size
70KB
-
MD5
35603fa519d36f95d965e4c298635373
-
SHA1
a1a7e1fada146dbe66ee141cf83dab1f78a94c3a
-
SHA256
bd9d38ee53e6e4992bbd4c2ead2fa5ecd948912d5fefc02ad1ab05fc923c2371
-
SHA512
0bd236f8febeac719c5b1f2ba9c7a1305e40fedba7c06463cfbe0e6c35e3f28f7b1b0394f47c51c0cbe335dc12ba6be44e4c51d198b07f0b8a8a6cefdf96f446
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "344480565" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D2BD03E1-4CC1-11EC-9DDC-4E551F90B01D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 008125adcee0d701 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005bf5749d3a275447873d564a46cb193600000000020000000000106600000001000020000000ee1a620aa088ed9c4e92ea5cb744efa9137450bbc123a3fae42ee4e70bc92447000000000e8000000002000020000000160f03fa9992df201eed8145ab14fb4a6603ffdb100a82f61b307c755c8d15a020000000bf6536e65cd9bffbc3f72499c66d18b5297b8da4094cbdd7884fa3cc986ad173400000004409fb7625bb8c0a471ed1238b22fa8432693558618dd1468910936b4efc3ae855d1035bb573d0da61a61cf67a3fd674d28918a4d01ccec370537ef1abedf7d3 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 1600 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1532 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
AcroRd32.exeiexplore.exeIEXPLORE.EXEpid process 1600 AcroRd32.exe 1600 AcroRd32.exe 1600 AcroRd32.exe 1600 AcroRd32.exe 1532 iexplore.exe 1532 iexplore.exe 588 IEXPLORE.EXE 588 IEXPLORE.EXE 588 IEXPLORE.EXE 588 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
AcroRd32.exeiexplore.exedescription pid process target process PID 1600 wrote to memory of 1532 1600 AcroRd32.exe iexplore.exe PID 1600 wrote to memory of 1532 1600 AcroRd32.exe iexplore.exe PID 1600 wrote to memory of 1532 1600 AcroRd32.exe iexplore.exe PID 1600 wrote to memory of 1532 1600 AcroRd32.exe iexplore.exe PID 1532 wrote to memory of 588 1532 iexplore.exe IEXPLORE.EXE PID 1532 wrote to memory of 588 1532 iexplore.exe IEXPLORE.EXE PID 1532 wrote to memory of 588 1532 iexplore.exe IEXPLORE.EXE PID 1532 wrote to memory of 588 1532 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\bd9d38ee53e6e4992bbd4c2ead2fa5ecd948912d5fefc02ad1ab05fc923c2371.pdf.000.pdf"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://feedproxy.google.com/~r/skout/mBVl/~3/1KS0DP0cxss/uplcv?utm_term=jordan+peterson+book+12+rules+for+life+pdf2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1532 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015MD5
acaeda60c79c6bcac925eeb3653f45e0
SHA12aaae490bcdaccc6172240ff1697753b37ac5578
SHA2566b0ceccf0103afd89844761417c1d23acc41f8aebf3b7230765209b61eee5658
SHA512feaa6e7ed7dda1583739b3e531ab5c562a222ee6ecd042690ae7dcff966717c6e968469a7797265a11f6e899479ae0f3031e8cf5bebe1492d5205e9c59690900
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015MD5
0e1bd44c93e5fd009bd81b71a5bdb376
SHA1164ee78ad6c6d05d01a12fbd096056a9a55864b3
SHA2562de33d5a5239d6c59e3eb568ed9423e23a288eb1135878b415cdadc0e9fa7fb0
SHA512e0efcf21ecda2bd2ba34fffbd90e8340aca87e17b529d5f3717206da64531c4f347b7497d5d95f01aee066ed3bfe35cc690f396e2f17e6ceada251bc8ae6fc26
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\03AG2NCN.txtMD5
7e5da8e1bd7706b93ae10717cdfae0b9
SHA10491733dd62267d153134094c54b43746e4350d3
SHA2568f388ee999215e88e41ed3b2aabc76d431f80193ce923d124472903d8308014f
SHA512baf2ad55462ea789bb7e06c7172475f225f626fa30196b09a153a9b441d86214361c39fc6ef66c88f3fef1c8b68ff1c5b7da1d2199400ba2866521d738e16e6c
-
memory/588-58-0x0000000000000000-mapping.dmp
-
memory/1532-56-0x0000000000000000-mapping.dmp
-
memory/1532-57-0x000007FEFBD11000-0x000007FEFBD13000-memory.dmpFilesize
8KB
-
memory/1600-55-0x00000000754A1000-0x00000000754A3000-memory.dmpFilesize
8KB