Analysis

  • max time kernel
    132s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    17-12-2021 11:14

General

  • Target

    speciment.pdf

  • Size

    60KB

  • MD5

    8189bc8fdbc82d23fa2739d94be36fe3

  • SHA1

    b3f69446f59ca51cb0bbca3a35045dbaafb377f9

  • SHA256

    4a78765b8c9d35ecbf739ed56e991db8fb692a4e6f3ed5ab7dbf9fcca148dd03

  • SHA512

    bcae9d413be18444aa95693bc9073ee307492af18cf307af4f9b09377074617ea8ba8c3902fc83aca9cf049f9720ab303619e02f77f6f0753c4c356fdfc3dbe8

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 29 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\speciment.pdf"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1824
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://ttraff.club/123?keyword=manual+instrucciones+frigorifico+teka+nfe+320
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1352
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1352 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1132

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1132-55-0x0000000000000000-mapping.dmp
  • memory/1352-54-0x0000000000000000-mapping.dmp
  • memory/1824-53-0x0000000075431000-0x0000000075433000-memory.dmp
    Filesize

    8KB