Analysis
-
max time kernel
118s -
max time network
139s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
21-01-2022 05:29
Behavioral task
behavioral1
Sample
mamago.pdf
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
mamago.pdf
Resource
win10v2004-en-20220112
General
-
Target
mamago.pdf
-
Size
63KB
-
MD5
522a026230fda9e221eea0b74626389e
-
SHA1
28204a9fac09be3e7ceff80499200f7c3c83d47d
-
SHA256
c10e10cdf5f8b37ff02575408b51fe9b9415d9f62bcf22ffa17d11ca88ecc0b6
-
SHA512
bdaff677e460422121970b30cdd8a1679a1ff60905f6ba289289119aac3acc758e90665d92bb42958a424102f92a0d1c1d0bb46be189e791b911824e373f78a6
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "349507944" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000029a8fa03d77d0143b95f148165a5bc920000000002000000000010660000000100002000000027cd99bb13294b7e6a18c691d526524374230329c4919ed52658008b351457e7000000000e8000000002000020000000864221498677f9d57c23c6577c527048ba26d356c054023926e20198b5a893e020000000a0bbef6f76c9f8781651fbd650dea646abb52d5b626fe84f95dee2531b7717cb40000000d4fa359b8dfb4ed7025b1379e9aaf12e153a40047b9e48a5793aaf83901a7b53946dfbc6e568651936a057aece943bde30da8a45ddf290905efb41bcce263d04 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 508b0e05880ed801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1B3430B1-7A7B-11EC-8BCA-C2BDF263E411} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 1916 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1492 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
AcroRd32.exeiexplore.exeIEXPLORE.EXEpid process 1916 AcroRd32.exe 1916 AcroRd32.exe 1916 AcroRd32.exe 1916 AcroRd32.exe 1492 iexplore.exe 1492 iexplore.exe 1120 IEXPLORE.EXE 1120 IEXPLORE.EXE 1120 IEXPLORE.EXE 1120 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
AcroRd32.exeiexplore.exedescription pid process target process PID 1916 wrote to memory of 1492 1916 AcroRd32.exe iexplore.exe PID 1916 wrote to memory of 1492 1916 AcroRd32.exe iexplore.exe PID 1916 wrote to memory of 1492 1916 AcroRd32.exe iexplore.exe PID 1916 wrote to memory of 1492 1916 AcroRd32.exe iexplore.exe PID 1492 wrote to memory of 1120 1492 iexplore.exe IEXPLORE.EXE PID 1492 wrote to memory of 1120 1492 iexplore.exe IEXPLORE.EXE PID 1492 wrote to memory of 1120 1492 iexplore.exe IEXPLORE.EXE PID 1492 wrote to memory of 1120 1492 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\mamago.pdf"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://feedproxy.google.com/~r/1eyvgo/aqOO/~3/DOqCt-cVA4I/uplcv?utm_term=iec+60079+7+pdf2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1492 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357MD5
a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015MD5
0a13f902601bdb764ea170c2669f8cc0
SHA1ac297ddc5659437f2aae2b832dec51af1ba2ddb6
SHA256bb7dbd9d628838bbf955b467913df1e9cfb35e7de88d12b352ad037a9abd3ebe
SHA5125b04f38375b1f79d56347cb3ec8255fa72499a45300b0c2e396acd1330d638d8489b807687dcd112f9700e030f370f246a04bff3c7d2c78682429ccd9008e564
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357MD5
8e16ad63c8e838e309d682190d696707
SHA12820156bc4b191c3278c8ec763508436caed0324
SHA256d8a2d83d2ef3aacf9ddfff674463972c0d895e05b645d9e3fee022850a0a4e49
SHA5124be4143d7dbad26c4bfb5ccea2913da05030f6d26e88f9cb7c3ba41225dfb924bfeffc9b1a66feb401650146fa155286c069b9318cb7d9522cd9abca3bb5fd76
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\6RU0PBQS.txtMD5
37c156614b45cf8f0f25f2dc32febe5b
SHA1efb0641d792340c911cefe84552b752eb747fdf2
SHA2560cc803e0cf0a45bed9aaab808e6e51361192c5e2b7f959b53fd061f3b83bc6cf
SHA512b94dee83a6f9a991056b2d4d83c446fbaea9b0f0b9b83aff3b2eb121333839b5655b9f849159bbd03ed45542ff3e4da5f325473355a5158ecdaecfcee0acd2f8
-
memory/1916-54-0x0000000075F21000-0x0000000075F23000-memory.dmpFilesize
8KB