Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20220331-en
  • submitted
    07-04-2022 15:34

General

  • Target

    PORCELANOSA Grupo Shared New Fax Documents With You.pdf

  • Size

    85KB

  • MD5

    1195f9ee2f39c2aaef05e888a6ccf322

  • SHA1

    a3716b622ace35b718caded71fbb62d473a4a55a

  • SHA256

    3a264b771372b9547f31dc1cb8b370a014610583dbc2c7a5b675f2775f563b95

  • SHA512

    1c6609f1bbf69fcf434d2643e86a558672a99de9e578ec0852e2dbfb22fa1f736ab1f64d4ebde09e375f628c22fe42200e04c4aa8c247fd1ee6c4fa51f20dff9

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\PORCELANOSA Grupo Shared New Fax Documents With You.pdf"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1968
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://laced-false-tibia.glitch.me/offcsmail.html
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1680
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1680 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:468

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    7e16d7264cb988bb0af8da8440613215

    SHA1

    6081d79a0df8ebcca751c94a322302147ade84ab

    SHA256

    e24a19d3b0cfc5f07c246eeb01ea20e3b0a6e80b481fec534b3354ec1ec9ac14

    SHA512

    d40def28118054620a19077f453374c64f42ca4daca3a55d5c8d59ebafc8550f2112d11207baeb62c0fcfc03e97cf277fa7209d4dcd7cb9971d367ae3cc61124

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\UW0DJ261.txt
    Filesize

    608B

    MD5

    ce283a6dfc4d2ba2916f6bf40a5a263e

    SHA1

    342b4f7aef26719227e819b54cd21de4013e0a94

    SHA256

    283e6019bc25d95d856fc6090a3cc488ecea34d363eeadd150914dfd5b1fdee9

    SHA512

    b68466fdc8171365f88f7f5b56fc6698929afe4adab6c023330a2173073f7000d956ef6adf362b2f1042a5adeed6652b11c143a0fd4b48c12a3b9cf573f3cd80

  • memory/1968-54-0x00000000754A1000-0x00000000754A3000-memory.dmp
    Filesize

    8KB