Analysis

  • max time kernel
    119s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    19-12-2021 19:26

General

  • Target

    74298115367.pdf

  • Size

    88KB

  • MD5

    92ec88534143c5a0ccc61e7fdd6f98f8

  • SHA1

    baf99192584655e265a6f8d98171f4100535f758

  • SHA256

    8582c4343849266da86edab47060a15719a25ebd2ae44ba4d4c7013ceac747ff

  • SHA512

    2566c6324b8582118561f4b0e5abc5b737bdad37c5b5565a80dfa47b96741285a471ac876f57b12497521abcc652a227a78f45ccd0fa4bc1e8504427ece446e6

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\74298115367.pdf"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1292
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://coretry.ru/uplcv?utm_term=friend+sample+affidavit+of+bona+fide+marriage+letter+for+immigration
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:572
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:572 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:432

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    85255d4a3657b1eea62e1314260bc9e0

    SHA1

    d820e05e6d86ef226b2df237f78ee3d99f255dee

    SHA256

    c84877d9f313cc5c6e536b8c8ecbdd2edde21cae08a3168b66547b7d5efa916c

    SHA512

    b375da0f0f4956fefb063a06873df9e538fc169ab904a202d6ceafe55a0f9f9817c4c61df5f22b9ae3e17144b1854c772eb7494b83d5f7208a2131139f8a7bb7

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\GFDIC405.txt
    MD5

    7aac849d278e404884ddc62ee562914e

    SHA1

    506f8694eef27c5818c307b56d46206df3bc772b

    SHA256

    952e8139b6645cbde12f27679776b85eb14f24d82c91a680f948f3de06bf90e7

    SHA512

    c3f2d18a160412cf8ee7d18af6915ec62ae2919a6f4675cc92d28a44cd37d84e34fde9b45d9515f6c9a9bccc89e27b7ebbb20acaf3f1e21cab968154142cad59

  • memory/432-56-0x0000000000000000-mapping.dmp
  • memory/572-55-0x0000000000000000-mapping.dmp
  • memory/1292-54-0x0000000076151000-0x0000000076153000-memory.dmp
    Filesize

    8KB