Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220331-en
  • submitted
    08-04-2022 21:21

General

  • Target

    DOC040720226860.pdf

  • Size

    90KB

  • MD5

    6971aa649ec13d96da8702bb478081c5

  • SHA1

    03bee9254c821125a6c29b29a0dc6aef77c06605

  • SHA256

    d70bf028f9f573338769826fb39cc3b0d50119b32425c807b09c1cc6d507b56c

  • SHA512

    bffb8a9b4b5ab631f2ef9f1bdea12687df28e8a5a3e421c758b3367f744aa7235291a0a5c2c1479187a4ad4883c5a3ca00f9bca5351cde6e2edfd1d3658d6d6c

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\DOC040720226860.pdf"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:760
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://ivcbdgrowers.com/AdobHtml/a/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2024
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2024 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1952

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\EIEOK0EJ.txt
    Filesize

    595B

    MD5

    36427e51a8b5c9d6fb7a37060ed3dc4b

    SHA1

    1cd717217bcf5d52cd230d7d3526e82f784b0b60

    SHA256

    bca12521c9291ea632403c66c55e7461def1e2588aa347d802a1ca3bf04deb6d

    SHA512

    a4afbb84dfe247da84b6c690972f513d43c99d19f0999b35fd1019d7ee1f95961cf1514141a27e52f797453a000c807d8e654c7280b5515229f2e34bc47748fb

  • memory/760-54-0x00000000769E1000-0x00000000769E3000-memory.dmp
    Filesize

    8KB