Analysis
-
max time kernel
4294180s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20220223-en -
submitted
26-02-2022 03:48
Behavioral task
behavioral1
Sample
fezolajavamiwozu.pdf
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
fezolajavamiwozu.pdf
Resource
win10v2004-en-20220112
General
-
Target
fezolajavamiwozu.pdf
-
Size
291KB
-
MD5
6f3e481c8125a4fd367ddfa7cb0fa258
-
SHA1
9e9b200e1a7cde4ea9e5ba7c326ffe80b1320caa
-
SHA256
e34006141c32e88bf9e7b9f42b69744a0a83d28cf1ae204bb82c1e15f468e865
-
SHA512
dc66cf3281ded870a181b5d2e2aff6e5b22fc21b0fbe653cae0b5d06c90aaab521ada1613a5991106c9c894e0768aa62205bce3e561f6bd24990ba4635d0c769
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\DOMStorage\ruleofyourprofit.life\ = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ab8535dea0c55241b6e6a02dc814678c00000000020000000000106600000001000020000000c699570629343a20d7c528d4d58038fd9c2f5d70ab4c7d3b5418ae26e54fb7a3000000000e8000000002000020000000ec3cf642a96f8ab3bbda6b472f409ff64861ee57b445ef669f9d4f0d31fb279720000000b249b14c39a0fa027070427a5e8c2da9c7b3839faf19960dcacde35a09c5c156400000007a456c2afdd76f825c95fb1424709614947982131ebf514326de04bf4f97e1e64542d9f818cd24137adf606b0061b1397c9beb9806bd581339747869da567955 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ab8535dea0c55241b6e6a02dc814678c000000000200000000001066000000010000200000004ed0eee88383bd7bf39781fc07a8680fc0edde500cbbdecca1e73544570b01cb000000000e800000000200002000000003bfeb1c4b0987fc409638b2602b314b8c8678ff012a53c4c7ab0d720f6206af90000000c5200d06790301d7d518e0f2a4e20091eab5ae47f83392391e6083a9d33a2409b714e674f1e10d7755dfbdaa67f1ef229438b1159182a072e0d5afe4eb30fbe74fdee818cbc85e00100763aae7839a8af7efbec1cd82cd776af0253eb5c3703f89d7c29ecc71ff712a4270c58140f8ebf8215956e3a750d61241abaa5731115aa59bb9fd26667f7d34d0a208b562a84a4000000017906c6bbaa3685a33f1c1f3c8737e657dc7f47a64329a0e9cb5c93fdc660e2fba587874dc739c3b75d81547267dde58a5e361a8ff75abb3eb3e66e935d3c6d5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\DOMStorage\ruleofyourprofit.life IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\DOMStorage\ruleofyourprofit.life\ = "16" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\DOMStorage\ruleofyourprofit.life\Total = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\DOMStorage\ruleofyourprofit.life\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "16" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\DOMStorage\ruleofyourprofit.life\Total = "16" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a01f29c7c32ad801 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "352612296" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FD6EEBD1-96B6-11EC-8FC0-4627DACA4082} = "0" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
iexplore.exepid process 1288 iexplore.exe 1288 iexplore.exe 1288 iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 1476 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1288 iexplore.exe -
Suspicious use of SetWindowsHookEx 18 IoCs
Processes:
AcroRd32.exeiexplore.exeIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEpid process 1476 AcroRd32.exe 1476 AcroRd32.exe 1476 AcroRd32.exe 1476 AcroRd32.exe 1288 iexplore.exe 1288 iexplore.exe 1112 IEXPLORE.EXE 1112 IEXPLORE.EXE 1112 IEXPLORE.EXE 1112 IEXPLORE.EXE 1900 IEXPLORE.EXE 1900 IEXPLORE.EXE 1900 IEXPLORE.EXE 1900 IEXPLORE.EXE 1568 IEXPLORE.EXE 1568 IEXPLORE.EXE 1568 IEXPLORE.EXE 1568 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
AcroRd32.exeiexplore.exedescription pid process target process PID 1476 wrote to memory of 1288 1476 AcroRd32.exe iexplore.exe PID 1476 wrote to memory of 1288 1476 AcroRd32.exe iexplore.exe PID 1476 wrote to memory of 1288 1476 AcroRd32.exe iexplore.exe PID 1476 wrote to memory of 1288 1476 AcroRd32.exe iexplore.exe PID 1288 wrote to memory of 1112 1288 iexplore.exe IEXPLORE.EXE PID 1288 wrote to memory of 1112 1288 iexplore.exe IEXPLORE.EXE PID 1288 wrote to memory of 1112 1288 iexplore.exe IEXPLORE.EXE PID 1288 wrote to memory of 1112 1288 iexplore.exe IEXPLORE.EXE PID 1288 wrote to memory of 1900 1288 iexplore.exe IEXPLORE.EXE PID 1288 wrote to memory of 1900 1288 iexplore.exe IEXPLORE.EXE PID 1288 wrote to memory of 1900 1288 iexplore.exe IEXPLORE.EXE PID 1288 wrote to memory of 1900 1288 iexplore.exe IEXPLORE.EXE PID 1288 wrote to memory of 1568 1288 iexplore.exe IEXPLORE.EXE PID 1288 wrote to memory of 1568 1288 iexplore.exe IEXPLORE.EXE PID 1288 wrote to memory of 1568 1288 iexplore.exe IEXPLORE.EXE PID 1288 wrote to memory of 1568 1288 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\fezolajavamiwozu.pdf"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://yoyep.co.za/XSRYdR1H?utm_term=fish+protein+gel+electrophoresis+lab+report2⤵
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1288 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1288 CREDAT:406535 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1288 CREDAT:2110483 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751MD5
54e9306f95f32e50ccd58af19753d929
SHA1eab9457321f34d4dcf7d4a0ac83edc9131bf7c57
SHA25645f94dceb18a8f738a26da09ce4558995a4fe02b971882e8116fc9b59813bb72
SHA5128711a4d866f21cdf4d4e6131ec4cfaf6821d0d22b90946be8b5a09ab868af0270a89bc326f03b858f0361a83c11a1531b894dfd1945e4812ba429a7558791f4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27MD5
7e09bfd67be7fcf715070199bf9dde69
SHA1ee2d12bfcc4ca5c84daec3dd9d334d1b7f305ff1
SHA25694f667703b5c55d8095b7d3ce203117959c3564a8cbec0e1c2f801b055b6a908
SHA512344e366cac382292edd0ee2eccaf3420d3a00bc2581a32ccacbf53cba9eb1b824b72db20e6cf0947dce42cc6e5af7720cd0d093b89257d5e5fa2928d676862f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015MD5
637481df32351129e60560d5a5c100b5
SHA1a46aee6e5a4a4893fba5806bcc14fc7fb3ce80ae
SHA2561f1029d94ca4656a577d554cedd79d447658f475af08620084897a5523587052
SHA512604bfd0a78a57dfddd45872803501ad89491e37e89e0778b0f13644fa9164ff509955a57469dfdd65a05bbedaf0acb669f68430e84800d17efe7d360a70569e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751MD5
4dec55939415ff2070caf96b506885d1
SHA1fa76f2311f774e94366c746cbebd0603f9d2b73d
SHA256622f901c331d736b88a458a972180893cca3aa544a895d29223798580effeec7
SHA5120ffff4f7233e37d0d9d83c73dd5a4a79311645afc03bcbf6c1ac89f2730707a207d681e18a40bc96858989e1fe4d690f9dbece8e9e2a838e6d952a8f2d4d59e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27MD5
79efae2a95c6516eeb08f64c1fa2fbff
SHA161f0fc174209ca42fb32f79459eb911d0ac7d123
SHA2562a5c2a3fb11aa6f2a6ad5f11e62d648f365fa7d9f4c583e62c4fac5ab144bbd1
SHA51253d56d9c452e541e07d9619487ea6f0c6d5641d3fe7c5574871aee15f2f19947c33313bb9765c93b56e72c5379dc211db7e50b5751c23211bfe6ad05a84eca0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015MD5
51f22437187dbc710221275ec7249d6f
SHA19b916994a0cd2f22cdd178f1bebbe3a4064e6934
SHA25652ee28a7b92f46cf1141c78c66c58185f5bc7000b51e6704a0e935bb69510e68
SHA512ac3bfc27f0315c669a63e45909df5f377e4ffb79e58cc3bb925904259ebff734b41008d6d71ea0af8f26e3bf35a28447d8a46222821d4b592388bc9cbcd545a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015MD5
944c9607d9466dec48efaa75525d79b7
SHA1f789f9c3021d5fa12a3713886547ac44cff2d70f
SHA256d4be8600b304ad50a962dbfd781e4e1f60de7b522fc5f1a8d7a2b86997e49a86
SHA512fc41abf2b389a4b402affcc0884149357d10773e3efc7cc058bc6efb67dba94e07715bfef86f44e2faabff3fbb2d683882fac7b6d2d1c0d1421c60c9ca7e6eef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015MD5
db19df1bf0dc5854935a428825e01fff
SHA1280ed535879ea79c85fcf016931f3cbd4dda575f
SHA2568c9656884f04d2574160e5f6e999cb70580bb27677a927c4e75e9c59861ed8d1
SHA512fb801ea60863c9b298c4a0a58e459d431fe1779e5b6b4ab0cf42c2f7823ec35ebefb7e7021e291bf11342e07dcbb8aef896e5817347e8ff8bce4dbe61e39d857
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\5WNZF8E5.txtMD5
d46d1ae157237ffdbb98260ada5c3de1
SHA1dcb9a9423963f336ffb74e581b6705c51d046a64
SHA2569c7626f9bbdf939876f91f85e5458983f581605542c8d374fdffb41aa05d268d
SHA512030f4f77af8cab05fc33dbea7f6ff07a299a794be540be93e224ad8fc49ae7d1cb50118a347aadb2a96b92ce42693996ae38c82a073ad94847baa4333f4c9a4d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\B31PA1V4.txtMD5
5b9ccb011d99bb6f8bae08612256757d
SHA1f95a4e4fe5a0117552585fe8b5b655fd3066679d
SHA256aefd88e709dd63145e9773b8559f60e89a15d6a5d7b5101bacd6f2d64476a01b
SHA512b94722ede776f6ab541584e3dbb8af0f94c095121a889600a83a23df22340d61c5431a5234b8ab1b1f4abb69194f6ec4b38d05ec60fa64c53dc55e18aadef137
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\UFKM38TD.txtMD5
9f460b7fefffe36d8a4fb4365a8df542
SHA1babdae55938970ecaf78a1eb5346e4370db4b8e2
SHA256c1300ab812ef1b0075ce1e4e047c25bf21a87f5346869acaf3585f1998a51abc
SHA512e04f4364f2f9f7e1ca352ddaa603b97d80c5171b3b955a9d33775c00639140239c19a4b2fdb2141872eadf580a71dfa7bbe652b2697dc19dff04d91d58052003
-
memory/1476-54-0x0000000075BE1000-0x0000000075BE3000-memory.dmpFilesize
8KB