Analysis

  • max time kernel
    144s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    07-01-2022 09:23

General

  • Target

    Invoice to Approve.pdf

  • Size

    105KB

  • MD5

    260b691e864099d828631587be5445eb

  • SHA1

    d560fe474d6442a013508fa29429b397a36729cf

  • SHA256

    960819fad5679afb7c056bbe99f15507f0b4994249e4d21d739394a3e4a3ffa0

  • SHA512

    2b8b9199b9bc18315c2a8b2abdfc46d694418abb1337f2f0fd07bd42ce8c7bc848fbc759cdfe7e3e694c939a13378bd7d0ab3caf7cdb1998e66c33a66d6bf708

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Invoice to Approve.pdf"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1516
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://cloud.degoo.com/share/4q2CXPRvl7uRimoweumjzg
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1620
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1620 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1576
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:1768

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      MD5

      31e331bb3f1ed0af6aab841ac0ae8a62

      SHA1

      2441ca9693ba7effe9d25895bda724725c2f4b67

      SHA256

      993534698813b2008fd36c4989fe2995bfe2188cbdf32b8f75fab900cb40d2de

      SHA512

      b5d7273289db7ed72a80a8333fcd13ab0e1dcf57b9031168bcf3c61c58462f3c259993a09b1db600600c5445792b4474c26233678ecb49b554b98a5bdc71d5bb

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\3AI7S2SY.txt
      MD5

      2e70052f584018a20f09360ce31e8095

      SHA1

      519548379f7225a68abb6af2c1f4f783f861b98e

      SHA256

      32bad9ee646b79a7d4c7c004df4311826e196ce0be6d037c50b24a314c5c0f9c

      SHA512

      a1b7b26c47b1addae2bb0829b33caf0262e364a2ea8130101da6bae7eb9f49894e502c5815757ef7f130b56d00f022dd7f1556b1e6b17d0657cd116944e15e72

    • memory/1516-54-0x0000000075471000-0x0000000075473000-memory.dmp
      Filesize

      8KB

    • memory/1576-57-0x0000000000000000-mapping.dmp
    • memory/1620-55-0x0000000000000000-mapping.dmp
    • memory/1620-56-0x000007FEFB611000-0x000007FEFB613000-memory.dmp
      Filesize

      8KB

    • memory/1620-60-0x00000000046D0000-0x00000000046D1000-memory.dmp
      Filesize

      4KB