Analysis
-
max time kernel
129s -
max time network
134s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
22-02-2022 09:04
Behavioral task
behavioral1
Sample
temp.pdf
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
temp.pdf
Resource
win10v2004-en-20220112
General
-
Target
temp.pdf
-
Size
73KB
-
MD5
93f1fa1d4b2a97bd05b388f25b49be91
-
SHA1
93e79a2d89df31ed567c367728093d2e777aac36
-
SHA256
74ce5573c142fee0052ddc7f9cc9963eab2e47fcccc0e6ec20462a95dc09c367
-
SHA512
7eadc587da641e19e0982393e449041ef3d260c3c02bcfd7da00c21b5541d074b8abed74d88faeafbc11ebed20d05424ed6d75e09d982c4c1af177f051b13c99
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "352285638" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6D5F9A31-93BE-11EC-BA6C-CA93D16BBF84} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000029a8fa03d77d0143b95f148165a5bc9200000000020000000000106600000001000020000000fe5ac334ad9a646b2f91319952f45f279debd24ae056b2fb7414646fadfb5465000000000e8000000002000020000000eadf9c46493643caf707f24c4fb2815bc740170340ac0e06f5318f48c211a2b6200000004b4e6f816065f2f96f1abc120e95f12f672c0d59836d2fcf35511c9fb2f0619c40000000d66c7ca52751c833717f35215e5f2ace199992e8506c19ef25b0596591752c56064950a50479c5c6fdfb7e3c647ef720da1f4e42e08e709e6ea60a227a1ae001 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9011f636cb27d801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 1668 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1028 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
AcroRd32.exeiexplore.exeIEXPLORE.EXEpid process 1668 AcroRd32.exe 1668 AcroRd32.exe 1668 AcroRd32.exe 1668 AcroRd32.exe 1028 iexplore.exe 1028 iexplore.exe 1084 IEXPLORE.EXE 1084 IEXPLORE.EXE 1084 IEXPLORE.EXE 1084 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
AcroRd32.exeiexplore.exedescription pid process target process PID 1668 wrote to memory of 1028 1668 AcroRd32.exe iexplore.exe PID 1668 wrote to memory of 1028 1668 AcroRd32.exe iexplore.exe PID 1668 wrote to memory of 1028 1668 AcroRd32.exe iexplore.exe PID 1668 wrote to memory of 1028 1668 AcroRd32.exe iexplore.exe PID 1028 wrote to memory of 1084 1028 iexplore.exe IEXPLORE.EXE PID 1028 wrote to memory of 1084 1028 iexplore.exe IEXPLORE.EXE PID 1028 wrote to memory of 1084 1028 iexplore.exe IEXPLORE.EXE PID 1028 wrote to memory of 1084 1028 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\temp.pdf"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://crophysi.ru/square?utm_term=c.+s.+lewis+the+four+loves+pdf2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1028 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015MD5
d0e3cc3f8f778fc8a778d2895cfa1ef5
SHA1593d69df5852da5455f6a0279a46d57a2d6a63e4
SHA2565ee773c8a27613da52db21f56083dfbe754b959258e1d8ce14ce6bea47002139
SHA512654206f178e37d8c5b8ed6446bb8586b7c8438eb094a77a29b0b6c9e9c7ada561ca101fba3ebde771808660611b81b2b3892414b76027ec638fbbb5baf405a72
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\07BH7NLS.txtMD5
6365d32887a4e2f17e04db9c9a939444
SHA16daf69bc592f8537aa19b2941b63dd07a068e489
SHA2563fcd06e65db5b346223fdfa38bace305ed90ed9bae757374237c25da7ef131d0
SHA512e7119cd4ef9057dd587de79fa0d04c1def4a092dd7cf03f0d8e87b5fe93004e2c7194ef76d2876f4f46051f6fb8a02904679f73ae9387ddf18e9a7a104a21c52
-
memory/1668-54-0x0000000075431000-0x0000000075433000-memory.dmpFilesize
8KB