Resubmissions

07-12-2021 21:17

211207-z5fszsfhh7 4

06-12-2021 19:12

211206-xw12fshha2 4

Analysis

  • max time kernel
    122s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-en-20211014
  • submitted
    07-12-2021 21:17

General

  • Target

    2021-2022 DOL BID PROCEDURE.pdf

  • Size

    332KB

  • MD5

    0e3612118f3398baa0096f45db420a89

  • SHA1

    31cfb490faab1d20fd22a7f8de5075d2514f756b

  • SHA256

    4beb397ea49948dfead829e3744ade15310b7b55d44dfcd17001924f23e107e3

  • SHA512

    6f043285c0a7a6ab4bbb4d4f3dd482647d66b6dd65ffea606d3b6ec1c8410feef4f08020e993f28186a6d777f06349813b3cc3db04ea635e8d48fc2ea8597188

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\2021-2022 DOL BID PROCEDURE.pdf"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1540
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://us-dolbids.us/374645hdhd7847457
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1320
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1320 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:808

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/808-57-0x0000000000000000-mapping.dmp
  • memory/1320-56-0x0000000000000000-mapping.dmp
  • memory/1540-55-0x00000000754A1000-0x00000000754A3000-memory.dmp
    Filesize

    8KB