Analysis

  • max time kernel
    4294180s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20220311-en
  • submitted
    11-03-2022 12:45

General

  • Target

    564d295dfb8da90cf310878ecb2db331d1f7d69b8b171529126613859ae2ec3c.pdf

  • Size

    372KB

  • MD5

    c0afe5670891bcfff23434331a1cd566

  • SHA1

    3169e7c069b5cd40be11f68371bc0fc33be534eb

  • SHA256

    564d295dfb8da90cf310878ecb2db331d1f7d69b8b171529126613859ae2ec3c

  • SHA512

    5390fed9bb927607c7991ff471c2f280f663ce2a8e1a2f246a7932a25bc74285b478654f770ed465e51d28790bfd4665e0e3829af7e2944ba139d79d33eaaf7b

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\564d295dfb8da90cf310878ecb2db331d1f7d69b8b171529126613859ae2ec3c.pdf"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2032
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://yubit.co.za/XSRYdR1H?utm_term=grocery+list+template+free+printable
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1856
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1856 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1652

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    6810f49664720c6d2b993164b7613c61

    SHA1

    024a98a8523afa55561a11b782be8a15f82e0462

    SHA256

    7a0539a519cbedd4a0e6c565fe50d1a5473b69c90eb63dbf271eed9ebe403b8a

    SHA512

    27c0eb171ee6cfda0261d7aa55ed54c2f13250b53ffa3db39ed5dc7cc5b1dadae0951721f82a30915ddcff40fb718a0881cf0b1b7aaabb5554db10d3aa6df2c1

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\OZ20NJC1.txt
    MD5

    91e3f933ecbd7d3b8f044d7211990220

    SHA1

    e8dd33aea3c0a14f89266943138d2f8706958f76

    SHA256

    0704603296af7ce800c4f0f473fdf4b2038531a7d7c10570f2996a39d4110de7

    SHA512

    b391882b77df7979c180628815678d19e864460da2a1386d946b0865eae2a06bc7fd2f286e740c673a9464e88607ca0c655489bbf954087bb025365614fafeb4

  • memory/2032-54-0x0000000074C91000-0x0000000074C93000-memory.dmp
    Filesize

    8KB