Analysis

  • max time kernel
    118s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    10-02-2022 12:39

General

  • Target

    Processo-0X7RVY_1529898.pdf

  • Size

    359KB

  • MD5

    35bd5b4df61bf52d807365c4a810ec36

  • SHA1

    dcac4cc4429c6c7d52d9ef93af8732d6503c3d0b

  • SHA256

    0d44129d366e4e9134b96a8db785fd10ac0558c271154acd30e54ba628d15eae

  • SHA512

    bb2a44e1316c2254cd482e1a83f8a1be77553a16f1a9b996209b8bcb2b39413cc410aa411b07e15a232054df1909e167e5acdc922af66d9290ee263138f883ed

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Processo-0X7RVY_1529898.pdf"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1684
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://objectstorage.sa-saopaulo-1.oraclecloud.com/n/grcpdlqdhzi1/b/processo203023948845/o/documento.html?iuhbuheiuhiuhf2f93u2hf93uh2f9u2hf921h039f8h238fh9028hf29783869236823728678723687r76dgfddf
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1800
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1800 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1652

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    a180774cd47d9b135926cd6e15f0a755

    SHA1

    5e6b604f525ca66ed895efd2d741aa867a0cfa8f

    SHA256

    cc9e25cc319cd0fd15707bb74258ad468d393d4a628bb8a699c38c7748595574

    SHA512

    3cf849db45f35ad6d52d192c9b0c599479662354e5cca62638881fae61c43d0f63bf13698be2dc4228291346f7991cb9c382ad039666092cb7296b0dfd6114e1

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\MO564IR8.txt
    MD5

    ce5b1f602f92c1d8477bb88bfc186833

    SHA1

    590ee0f2133d91ea585dda6c10b0b38bd66f6e34

    SHA256

    672736bc9b4324f3028b8f5e676964109aa1473da7d87e92c06f06f8ce2d3dea

    SHA512

    232df2299b75a44b708a99df87463e281ed15dcb4e70777a96b71e350e9ef582e56676ee0eef43a85cc237a5ecfe181215d914e019392d1f09538546549820f9

  • memory/1684-54-0x0000000075D51000-0x0000000075D53000-memory.dmp
    Filesize

    8KB

  • memory/1684-55-0x0000000002240000-0x00000000022B6000-memory.dmp
    Filesize

    472KB