Analysis

  • max time kernel
    152s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    07-02-2022 17:05

General

  • Target

    ca7ea5b16af2cf934a098a46e8d2c927dcb3de2cdfee9060ef9562606c584e91.pdf

  • Size

    22KB

  • MD5

    170bc0aadb6924206d14c90d361d0b21

  • SHA1

    d2dfedf8c90173e72af36828767cfdc433f74c13

  • SHA256

    ca7ea5b16af2cf934a098a46e8d2c927dcb3de2cdfee9060ef9562606c584e91

  • SHA512

    eb877906144f5a22b6f8680f4ca59fc0db334a2e5d5b1972cb892f692c2780cdb1988caabd0827c14307445f66b01dee75beb6453b6d1ccdf2575f865782f7dd

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\ca7ea5b16af2cf934a098a46e8d2c927dcb3de2cdfee9060ef9562606c584e91.pdf"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1060
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://a9m1x.icu/0302122/12457856.html
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1392
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1392 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:472

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\62ZMNYHK.txt
    MD5

    0335d8b4732858585fe70d4a40065523

    SHA1

    e661f838147b65aa3eb5f6c417e4ba8dbb055489

    SHA256

    405f3c12611266c039f1d3dc6b15c0290887c7cb85ea704aef557bf64a66d90e

    SHA512

    effdc2c719d9aad024b1d608099303364f5617d285ebb685c3f8d47c27878ece4387e8aa61bcb858b2ca67417a6006c01d3db8a8ebcf31ad79a9d9126b8439d7

  • memory/1060-54-0x0000000076421000-0x0000000076423000-memory.dmp
    Filesize

    8KB