Analysis

  • max time kernel
    150s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220331-en
  • submitted
    11-04-2022 10:41

General

  • Target

    1abde26b9be3f80a014e6cbca07d2662b322e5c306af881b9100f6cd6fd3ecc1.pdf

  • Size

    4KB

  • MD5

    2351878a18e1c532299a59727a0f7257

  • SHA1

    c3c864d0ddeca3c793a88f075b56bcddf75e09e4

  • SHA256

    1abde26b9be3f80a014e6cbca07d2662b322e5c306af881b9100f6cd6fd3ecc1

  • SHA512

    351b70d20a3bbc4e7c70afe095d74c9f761ba87a9948b95c1afc71e6ea0aefa9bc2304ada22932d73e340fbd9402046cef6c6f98c521a2b1566a63fa0a71325a

Score
6/10

Malware Config

Signatures

  • Accesses Microsoft Outlook profiles 1 TTPs 5 IoCs
  • Drops file in System32 directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\1abde26b9be3f80a014e6cbca07d2662b322e5c306af881b9100f6cd6fd3ecc1.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1752
    • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
      "C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE" -c IPM.Note /m "mailto:test%25../../../../../../../../windows/system32/calc.exe%22.cmd"
      2⤵
      • Accesses Microsoft Outlook profiles
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • outlook_win_path
      PID:972

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/972-55-0x0000000000000000-mapping.dmp
  • memory/972-56-0x00000000711B1000-0x00000000711B3000-memory.dmp
    Filesize

    8KB

  • memory/972-57-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB

  • memory/972-58-0x000000007219D000-0x00000000721A8000-memory.dmp
    Filesize

    44KB

  • memory/1752-54-0x0000000075541000-0x0000000075543000-memory.dmp
    Filesize

    8KB