Analysis

  • max time kernel
    118s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    14-12-2021 09:02

General

  • Target

    commande 15545-56656.pdf

  • Size

    2.0MB

  • MD5

    2f34e45fdab67aa048b76f6500956f46

  • SHA1

    fb9aedab28de27e62be1813d72a5b999b7240b39

  • SHA256

    1ae689c455de332bf15e6768f2e42f8f4a4a75180b577f1fa083f30a0b3f2e84

  • SHA512

    f210302a3b3b277260f4135f0c97cf62b1f0c8a7a0b3f4bd57c6be7178e6634b7b4767a7ac598fe95038bc9ab2a284f05b3e4b3762257d64482ad0a0b0d670b0

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\commande 15545-56656.pdf"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:952
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://youngcapitalistrecords.com/ybellinger/docu10-SELFHOSTING
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:556
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:556 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1776

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\UN5Y4PRS.txt
    MD5

    0792710114377c188fd81afbebb46c9d

    SHA1

    3f0e64dbad7bbe5041153091164e06e1e10e0569

    SHA256

    ed0dfbfb54cda69c0dc697c19f9840485333e9df6ce6dfd53bf8bdc359fb9499

    SHA512

    0f9179b7659f2a3181163fc8ae95ad810edcfba492534aa9dddaa6e3a0bc40fed1c3257ad75d43d6f23973fb4d1566649d205756a83634a529d09ed187cd1fee

  • memory/556-55-0x0000000000000000-mapping.dmp
  • memory/952-54-0x0000000075B51000-0x0000000075B53000-memory.dmp
    Filesize

    8KB

  • memory/1776-56-0x0000000000000000-mapping.dmp