Analysis

  • max time kernel
    120s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    28-01-2022 03:18

General

  • Target

    history_of_liquid_propellant_rocket_engines.pdf

  • Size

    96KB

  • MD5

    2f3a66f935b32d85f2b983fc2767bfb5

  • SHA1

    8f5ae992a350b851217247757781461df5f138a3

  • SHA256

    99c3586e83471b9e81882dcbac49a859fd45bc34351ddfa665d04f5d255c9b02

  • SHA512

    89eef695863dd3235c2fc42e6b4f0a7e3f869d95b780cf4e4dcd8cdac5778ecdf493e3e9fb666ea55a2070cf1e54050c0dde078bc162d5240741dc5c70410230

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\history_of_liquid_propellant_rocket_engines.pdf"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1736
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://feedproxy.google.com/~r/Infin/~3/3fYlV-OKy98/infin?utm_term=history+of+liquid+propellant+rocket+engines+pdf
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1472
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1472 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1036

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    fbb22ad1be5e51fe15b94ff55139c9ee

    SHA1

    0b202ee24946bb12ebb8327fbc8fedd5997d39bc

    SHA256

    3a20ed9bb0f7b9b66e2185f2f027b1f9f84aab959c3e27c3f80e78849a59fc2f

    SHA512

    737da2186695e22e002f33ff2fdfee11500e4c314fa6547a0b3d24a94d89eef2005b92d9c50521590af2ece1aa4eb24671d48d5b646c7eab90786c82c55c1b36

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\879DQQ9C.txt
    MD5

    f2b4e7e6e1c6a9388aa21a5a2bf5f248

    SHA1

    2b9013906593b3c86acf9e954498627ad677e400

    SHA256

    7b24deb107d57560e0e20dba8a04c7897ba34c571e5bfbe481fdf337831b1c2b

    SHA512

    f87e572cf9e89fdc923771159eff802c3666b635f4e7abccce0fd97c9f5f12c9bd46193fadb75441bcf38e8414409f140d52cb4b73f58556dd4215bcb43b0b32

  • memory/1736-54-0x0000000076911000-0x0000000076913000-memory.dmp
    Filesize

    8KB