Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20220331-en
  • submitted
    11-04-2022 14:39

General

  • Target

    s62b96u4aw8..pdf

  • Size

    113KB

  • MD5

    1abde47738b218dd52056c1de16c8c80

  • SHA1

    1b003212c92d419aaa36380b555eb508735ec056

  • SHA256

    ca5c170acb6c302f880e2d403306effb3cfc39d2d21cbba2a786d261bef391d5

  • SHA512

    d0626b30bd42de780f0b703af484cc13b42bce1ce0be42cf2becfdc18b7b3ef416680147aab7df29ad6a29d47e9246299a74363a2ba992ebc96e88caf17d499c

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\s62b96u4aw8..pdf"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1396
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://bit.ly/3KpkBZI
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1236
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1236 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1772

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    535659415a8673dfb4238673666652de

    SHA1

    a828af1eee6e6c50d3c07a8fd80e9d3d89f17bce

    SHA256

    9273bc67c2e3067d526b58bde3eb56c408da6246f1e185529d4b0683ae0f14b0

    SHA512

    e553f76436ae255939e5fa7b3e61f0651a49e680e1187a02a004704223c4e9b5bcdf0faef3c13d369f6cad682777c488287e19d29971d231b206d498f30e7d6b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    0e2621d3510c6da7394fda8c26d6d760

    SHA1

    f2351a4f74cfa67d3c8798590a3373f759b50cd5

    SHA256

    b57ddd36aefde98fe713af7ded7674cf9dc6db8be0b53e1d44c111bb19fd8d58

    SHA512

    d839140eb45ac1bcb62f6d2d46d904416bf668c5800abeef5d94b2d28793eb6c0a976e5c412c6883ef11650da7eec145d38930d0bc006430d06840c1cd0c23c7

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\3J94RL27.txt
    Filesize

    608B

    MD5

    02c64742eab0e3e921069d09a50f951a

    SHA1

    43bf144261620f327e25fdb955e2be0b0c10355e

    SHA256

    44c531a2c7ed6a6b739d319fdd16687f95cf3992640a75597bb8ac9723512928

    SHA512

    be45ecf0673558529d2372e5221f38b3e2a4ea21127d3baabf7e614240a87370b922e28fa99ce63c03001470d920dd9f930073d4fc3a7271539ccafbe407fe32

  • memory/1396-54-0x0000000075C11000-0x0000000075C13000-memory.dmp
    Filesize

    8KB