Analysis

  • max time kernel
    143s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    06-01-2022 16:14

General

  • Target

    04c3ad45ad3bb02725b729ac7f04ec422155db5cff44605863540011bcde0b85.pdf.000.pdf

  • Size

    468KB

  • MD5

    3d1d598b3ab9e5e78a0718d6ffd6a6d4

  • SHA1

    e6996880b71ae34913bd243851b0028e949ea560

  • SHA256

    04c3ad45ad3bb02725b729ac7f04ec422155db5cff44605863540011bcde0b85

  • SHA512

    91a2c8b71df0704f5903c2ac7b6e50164317808edbe445eef4a487fdcfc6840b1c40e5524025257c090cd7677816a44ed9d23b2db092faca7d812aca8b5dfae3

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\04c3ad45ad3bb02725b729ac7f04ec422155db5cff44605863540011bcde0b85.pdf.000.pdf"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:836
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://web-redirectmailsrvc.cloudns.ph/ZLqRbGY
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1188
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1188 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:752

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\Z3N7S58S.txt
    MD5

    7e5de2f33fecd43d1b2b32c183e141bb

    SHA1

    06efc9ccc1cc7e90c8c6f3a9fc35336467a17e8f

    SHA256

    aa283f1f4bbc88261303f8f0462b2f89f2df6aefa2d492e4ecb83ff08f0b06db

    SHA512

    34445fa1c5a999064fcc0bd054fe806f19c2a5c38ad48eb262a624810bc374e5325f481e3a1eb1bdaad20de85041b6966674a2dac04ce7d6a6e6abf01b421cbf

  • memory/752-58-0x0000000000000000-mapping.dmp
  • memory/836-55-0x0000000076641000-0x0000000076643000-memory.dmp
    Filesize

    8KB

  • memory/1188-56-0x0000000000000000-mapping.dmp
  • memory/1188-57-0x000007FEFC401000-0x000007FEFC403000-memory.dmp
    Filesize

    8KB