Analysis

  • max time kernel
    4294419s
  • max time network
    439s
  • platform
    windows7_x64
  • resource
    win7-20220223-es
  • submitted
    10-03-2022 20:59

General

  • Target

    FAC-DOC-2022-5KO6KTGI49FK4JFI5GTK59KII59FI4LO.pdf

  • Size

    120KB

  • MD5

    78f5bdeef40b898c9311e8eb3f6ffa99

  • SHA1

    a0fbfeea543b682b5786b8856ac62151f46bb12f

  • SHA256

    8c4838099234cfad14a8b74c268477d16e0d31d1eeee5c9a00d688ae1fbf7082

  • SHA512

    e19b7c423d5b82e7eaecc168d71867712222d781fc94ad691ebf3d14a9618a8806b55074884cc68c4bc67e436978f083ea0d178eac99eb37e9f7bc22c96587dc

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\FAC-DOC-2022-5KO6KTGI49FK4JFI5GTK59KII59FI4LO.pdf"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:688
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://clickmetertracking.com/doc-pdf-html-tgj39dk23is
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1104
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1104 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:420

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    9db186df017f7aa5b1734bba726da607

    SHA1

    31251dbb9bfc044a33aa054d3736b618075dd43e

    SHA256

    abe873fedf365c8efbacabb7ef23c87f33b8210c37792ceebbaa1b151835f431

    SHA512

    30a564ea062516fdb9b3fddc7e897c62fb21b40e619503b10f48e90b3b3da6b9626c6ca56773e6671f602284b92e3ec248525a78d189cad77022f752ea04e868

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\rx62z5k\imagestore.dat
    MD5

    b270efd52dc0a0d5bb6a95d47346567b

    SHA1

    a5d44a7710c1f560affffea76b6295f1ab46b7c0

    SHA256

    a4ae11fd906c8c2edb01faf6ba31f23ed64d06cc86c5070c27d22674878d93d1

    SHA512

    476421e8c12150a41ad9fb103190cadaa0a17f91aa64370d52adacf617a0ba32eea158b792e82fc87eed377f20469f050d87551968438a2cda7f2a20380d97f3

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\Z8K92S2R.txt
    MD5

    a9f02265e1ee6d13735d987ab7e6cc6a

    SHA1

    03996a62ad96070d4429a0a158ad196c2e007654

    SHA256

    dcc951aecb403bf0c251e9ac35e7213010ceb70c601cb24fda38dd951fbfc3bd

    SHA512

    34168cd99dbd79906843e34f5c2a6253f241c5581de80e39270ef5bf58ac49ba576bc5f4f89b55611220463e48bd5ba643d8460d4cbc820a99a26c802c104208

  • memory/688-54-0x00000000765E1000-0x00000000765E3000-memory.dmp
    Filesize

    8KB