Analysis

  • max time kernel
    140s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-en-20211104
  • submitted
    25-11-2021 05:27

General

  • Target

    4e5babd52282234b954e5b9081e7fd60.pdf

  • Size

    78KB

  • MD5

    4e5babd52282234b954e5b9081e7fd60

  • SHA1

    62546eb9867a789aaa8058a31e30f69530f9feb6

  • SHA256

    06a008dbce17d3b8de0069ed613cf3b75efe781f68beeccfbc0cb5d497f0044a

  • SHA512

    6d992003079acaffe84ff94e105f8ac84b868aff0b974662dd13e988eb522215893e0d3d90e1b0d591cfafc3188ea4a765e8198ed778687d9235eb666999f047

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\4e5babd52282234b954e5b9081e7fd60.pdf"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://feedproxy.google.com/~r/skout/mBVl/~3/DOqCt-cVA4I/uplcv?utm_term=asme+section+viii+div+1+2010+pdf+free+download
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1920
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1920 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:740

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    28e453e75460c0a04c393a2eac4e915e

    SHA1

    0b02660951051c3a26083b9f85609933695d351a

    SHA256

    20db0cca2a417376cac9dc2c8996da1c2aee0485457abdd68d149b187731d350

    SHA512

    5cdd3424f235a1af38ad289a1ff22e7c9f1d838026205c38bae7c3e5a865ed03d6edf25f215f2595b57ff181245fa6b3514210e135c6d360bcec33e058b5f258

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\PNJNRZRD.txt
    MD5

    2247248eca93c4ced1990a207c43aa5c

    SHA1

    b327902c6efdfad1fe368979780ccd39e38f4dc6

    SHA256

    948acabe697882dfc5d589f05f92d7eda22a51114f1fc8a2ea48a3c55c76cc2a

    SHA512

    5d5021333b59521e522fdaedee58b95e695c27198557a102cfa3227956550db9dfcf16a74534a7664302f5941d5675ecea1ac939dad8762d4766fcd613fa9077

  • memory/740-57-0x0000000000000000-mapping.dmp
  • memory/1920-56-0x0000000000000000-mapping.dmp
  • memory/2036-55-0x0000000075881000-0x0000000075883000-memory.dmp
    Filesize

    8KB