Analysis

  • max time kernel
    129s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    22-02-2022 09:04

General

  • Target

    temp.pdf

  • Size

    73KB

  • MD5

    93f1fa1d4b2a97bd05b388f25b49be91

  • SHA1

    93e79a2d89df31ed567c367728093d2e777aac36

  • SHA256

    74ce5573c142fee0052ddc7f9cc9963eab2e47fcccc0e6ec20462a95dc09c367

  • SHA512

    7eadc587da641e19e0982393e449041ef3d260c3c02bcfd7da00c21b5541d074b8abed74d88faeafbc11ebed20d05424ed6d75e09d982c4c1af177f051b13c99

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\temp.pdf"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1668
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://crophysi.ru/square?utm_term=c.+s.+lewis+the+four+loves+pdf
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1028
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1028 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1084

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    d0e3cc3f8f778fc8a778d2895cfa1ef5

    SHA1

    593d69df5852da5455f6a0279a46d57a2d6a63e4

    SHA256

    5ee773c8a27613da52db21f56083dfbe754b959258e1d8ce14ce6bea47002139

    SHA512

    654206f178e37d8c5b8ed6446bb8586b7c8438eb094a77a29b0b6c9e9c7ada561ca101fba3ebde771808660611b81b2b3892414b76027ec638fbbb5baf405a72

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\07BH7NLS.txt
    MD5

    6365d32887a4e2f17e04db9c9a939444

    SHA1

    6daf69bc592f8537aa19b2941b63dd07a068e489

    SHA256

    3fcd06e65db5b346223fdfa38bace305ed90ed9bae757374237c25da7ef131d0

    SHA512

    e7119cd4ef9057dd587de79fa0d04c1def4a092dd7cf03f0d8e87b5fe93004e2c7194ef76d2876f4f46051f6fb8a02904679f73ae9387ddf18e9a7a104a21c52

  • memory/1668-54-0x0000000075431000-0x0000000075433000-memory.dmp
    Filesize

    8KB