Analysis
-
max time kernel
143s -
max time network
146s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
03-03-2022 17:20
Behavioral task
behavioral1
Sample
dda649191ed0536d0b9e588af732fdccf2061543081c2b9cef265fab41cc2711.pdf
Resource
win7-en-20211208
General
-
Target
dda649191ed0536d0b9e588af732fdccf2061543081c2b9cef265fab41cc2711.pdf
-
Size
441KB
-
MD5
cb40d2ea518a70294f2efb5dff8841df
-
SHA1
20a713a751deed2a49b18101f735e63ddabfd403
-
SHA256
dda649191ed0536d0b9e588af732fdccf2061543081c2b9cef265fab41cc2711
-
SHA512
6f0fbbbfff8b64c5d7e23541fd281eb25b392e99d53ba016edaf889189d89d2259ff66c042fe50050d0ea051131c815192bf4bdff3fae175acd82492f8e95f7e
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000f302f7a020b975438ea1f1f995ba97830000000002000000000010660000000100002000000002ca23c7a517f1534f8cda88a2b1e456af7d234d54af8055afec05a067bc70e3000000000e8000000002000020000000ec43a887e645ffeea8c5f74ade7ca2ee9980a488ee5e8d8f54ba551b8a76605b20000000d9f62deda5a1c52b2c5c2bd972663384273486b23e499692c8b86b77ad03d20a40000000fbe345a1edfbe7896f032f1fd374815cb0c1a2b9434999f0599296bbb2b73dda54e7beb80d6daac6bc2c7270f7432eca5af5e82e815b93d8119e1d0783ae5b2d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AEE92591-9B1E-11EC-AF5A-5267F457BC0C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80cc6a7d2b2fd801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "353096638" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
iexplore.exepid process 904 iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 1192 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 904 iexplore.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
Processes:
AcroRd32.exeiexplore.exeIEXPLORE.EXEIEXPLORE.EXEpid process 1192 AcroRd32.exe 1192 AcroRd32.exe 1192 AcroRd32.exe 1192 AcroRd32.exe 904 iexplore.exe 904 iexplore.exe 1672 IEXPLORE.EXE 1672 IEXPLORE.EXE 1672 IEXPLORE.EXE 1672 IEXPLORE.EXE 868 IEXPLORE.EXE 868 IEXPLORE.EXE 868 IEXPLORE.EXE 868 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
AcroRd32.exeiexplore.exedescription pid process target process PID 1192 wrote to memory of 904 1192 AcroRd32.exe iexplore.exe PID 1192 wrote to memory of 904 1192 AcroRd32.exe iexplore.exe PID 1192 wrote to memory of 904 1192 AcroRd32.exe iexplore.exe PID 1192 wrote to memory of 904 1192 AcroRd32.exe iexplore.exe PID 904 wrote to memory of 1672 904 iexplore.exe IEXPLORE.EXE PID 904 wrote to memory of 1672 904 iexplore.exe IEXPLORE.EXE PID 904 wrote to memory of 1672 904 iexplore.exe IEXPLORE.EXE PID 904 wrote to memory of 1672 904 iexplore.exe IEXPLORE.EXE PID 904 wrote to memory of 868 904 iexplore.exe IEXPLORE.EXE PID 904 wrote to memory of 868 904 iexplore.exe IEXPLORE.EXE PID 904 wrote to memory of 868 904 iexplore.exe IEXPLORE.EXE PID 904 wrote to memory of 868 904 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\dda649191ed0536d0b9e588af732fdccf2061543081c2b9cef265fab41cc2711.pdf"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://norin.co.za/XSRYdR1H?utm_term=live+sports+tv+apk+android2⤵
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:904 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:904 CREDAT:209947 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27MD5
4f32fbcf1ba3917e17be5ce51fd455a5
SHA1af1b7d8bda1825bfa3ee53ffff1ae367d81649da
SHA2562077d2a23ea0311e79acae14f0363173263e23f147046d1f6fe2ef1a8b3bb9db
SHA5121dd0c3c116752120923e7e2980b04acc3f51a3c1e22069f07154169b5149be3d949e43767e56654f230b1ee3a64387d97f5d2b4b6eb38c22cee3c30f238c43d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015MD5
637481df32351129e60560d5a5c100b5
SHA1a46aee6e5a4a4893fba5806bcc14fc7fb3ce80ae
SHA2561f1029d94ca4656a577d554cedd79d447658f475af08620084897a5523587052
SHA512604bfd0a78a57dfddd45872803501ad89491e37e89e0778b0f13644fa9164ff509955a57469dfdd65a05bbedaf0acb669f68430e84800d17efe7d360a70569e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27MD5
46ccf856fee9264a8af117b32786253a
SHA153193ce66a47b2315a59da85b5c5214f202974c5
SHA256a9da62f209f977ffe00e50d4965faaabbf223abec50f8e5799bd8f5f44f43669
SHA512b4d509dde77d9cd218705fcd35297b5ce6ff042868770f443b7f1e542b122dc0b3f6466971d06d391da29fe208486c87e220cf693a7cbbed3080582867c317d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015MD5
00cd875e4eaf710a80b13c8cf2944dc6
SHA18b0d1976db49e026f0dd9022b494bcfcdbbf19aa
SHA2569fde7678b944c89d3cd0dba29035438846bf79fb32d2c191c85132557dae9c31
SHA512821a9bb0cd1e5a616125ad34b35c7137b46f1fc6fec7206d0d4a0f98cc9f26b86db7b3780c893681659a15857f2abf07b0d5a4b95b1a9a4644588323010f6133
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015MD5
cf9e4066b2ea241b370ee9a9c9668044
SHA1c2d1a01e823ff293896415b3efa25ce046d00fe6
SHA2564ae509f435f0124323084c8e8e260e9821ff90bdbf6471e21c3677d6b2b4b355
SHA512a071f2b50393b5c52a40dade0e9ec919d9a5e8983cd6efb47e8cd1f1e684f2ecc19df45e7354ad2c62925c2afeb4b04f289b4091ac11cf7f6ad566420c78c6b2
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\7w612sw\imagestore.datMD5
315d37097e185e5ae8a89eef57c11565
SHA12e3b66fd10742a314399da4f339eecbd9e188694
SHA25695fea591197fb8e146406c8b565aa8a5da051960ab82caff9c2fc1ac725698b0
SHA51284e76bbd506040534160185f1c26499aaf7d4b9b3c88860b2eb63322da62d05717369f5df9e385b88bb006c7621e2ef1d4fca25e7784c479f349af8f21d20701
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\0WNLGKLR.txtMD5
80b036f7a31b025f9102571fd7157a17
SHA18388c564fc6e276a74a49fb714a68dbd5be9da47
SHA25602c18377f08d3a1259a535865fd627cdb6cb6c67551263ae3a267dd70fe667fb
SHA51222af520264553a045491d18e8172be79a795a4b6ea254b90f392eb4473514be1f9017ee0156877fd3e421948e172f516538555c7a0412879ad54996d00be89e3
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\SGQAZ8Q4.txtMD5
d2a065d8ab1a6e2935521010474db3f3
SHA1c961fc27acf058e2d1cba5f3e52e3edb67fc7ca0
SHA256802c636cbc6ea78e4bd5d933e2f97d472d0955f1d5bf46263a53c694b9eb634d
SHA51237467a50c12797ea8d399328b1b1b225360796e0a6b3a15f2f68b0d32f654b4dfdac51761b4ffa86895940f3abfac7b62f4aa4e0c4ea710e919356bb9cdd12a0
-
memory/1192-55-0x0000000075831000-0x0000000075833000-memory.dmpFilesize
8KB