Resubmissions

07-12-2021 21:17

211207-z5fszsfhh7 4

06-12-2021 19:12

211206-xw12fshha2 4

Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-en-20211014
  • submitted
    06-12-2021 19:12

General

  • Target

    2021-2022 DOL BID PROCEDURE.pdf

  • Size

    332KB

  • MD5

    0e3612118f3398baa0096f45db420a89

  • SHA1

    31cfb490faab1d20fd22a7f8de5075d2514f756b

  • SHA256

    4beb397ea49948dfead829e3744ade15310b7b55d44dfcd17001924f23e107e3

  • SHA512

    6f043285c0a7a6ab4bbb4d4f3dd482647d66b6dd65ffea606d3b6ec1c8410feef4f08020e993f28186a6d777f06349813b3cc3db04ea635e8d48fc2ea8597188

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\2021-2022 DOL BID PROCEDURE.pdf"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1088
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://us-dolbids.us/374645hdhd7847457
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1416
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1416 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1636

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\8C4LRX2U.txt
    MD5

    671090000bd8da75f5bfe63dd145a30e

    SHA1

    3e1c12733fc8b6c88a8e5de41682a3fb40bbdb24

    SHA256

    1dac49bc03f8a4b9ff8cf907abf9e82bfd51f158f23a01c7d0d77458c8877d09

    SHA512

    9a1b8114a37801f21cb82d4be0466e570c806075b6c7d04b170300c9693db2429207c5d7652afdf5a3a6af8653a7b8bcbd2ebccf8bb83df3a99241bd6207edec

  • memory/1088-55-0x00000000758C1000-0x00000000758C3000-memory.dmp
    Filesize

    8KB

  • memory/1416-56-0x0000000000000000-mapping.dmp
  • memory/1416-57-0x000007FEFC1F1000-0x000007FEFC1F3000-memory.dmp
    Filesize

    8KB

  • memory/1416-58-0x0000000002110000-0x0000000002120000-memory.dmp
    Filesize

    64KB

  • memory/1636-59-0x0000000000000000-mapping.dmp