Analysis

  • max time kernel
    120s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20220331-en
  • submitted
    12-04-2022 18:29

General

  • Target

    XR67CT8V901.pdf

  • Size

    464KB

  • MD5

    970636e247ab9e38b38cfb4374d5f4ec

  • SHA1

    5355f05de1b482bf3e3c30ee3e2e7ed46bc4ce95

  • SHA256

    543db39787cae6fae4a682fa07e1fcf457993ca716c367d2ef9abd4ea0738ee1

  • SHA512

    62174aac377b4dca28e32c470bbde8a4b40d298ea69c165eddc73a55e62f6cc7802474b3f1dbc45765054461a6e783beaac6b0446f725c460d25ac17d8fd6fb0

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\XR67CT8V901.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1896
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://href.li/?https://vk.sv/QbWzT-
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1028
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1028 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:688

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    9ce4c8ada89e6fc8d61d9bcaae32b9d8

    SHA1

    a5f44cb98ca8ccc3900ce45b35aeef70060a50ab

    SHA256

    bc2994c6b6e36ee706a5982d4df9593d13e53633666418d809de75f41a3003bb

    SHA512

    221f1bb1163503e7f6e31a1d411a8b10ac6f07bce880ef717ed7096f87cb3351d389b490c8c6f8c6d69609ac74ba7cb3e0fd3035168d051b495bf555d9ef6314

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\b1rou5u\imagestore.dat
    Filesize

    21KB

    MD5

    b46012c1a976fe32bacdab210665639a

    SHA1

    9b49601d0a2c71b46a0dc2daa8f3e1800c68b6d4

    SHA256

    0ce00153504cd7c2f3ba87561cf6ab1307f0fb4450c477b58181c7b17150848d

    SHA512

    8e636c4dd8942e1dd9bd3132bbcaa1c31ab161424fa55fa7dc0862e3c5ce184c652401c6e56334f62ebd3c6a986ccd9feb536e0c63d50c84620744bd8e007e2d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\KGEMFX8V.txt
    Filesize

    604B

    MD5

    d234f20882462d3ab82dfc155a45a258

    SHA1

    34c9344f3c1102a47c4002a4a2e27751461488b5

    SHA256

    880f1d2822beb8216ccc2c5d6cd4c042ab8cf0b96391c8538b0527e558b66ce6

    SHA512

    122716c9d528aee8e355183dc1ca19ad2d4fa9c03eebe2de4fd1deb041fa5d413153abf20302f8416d3b4df7192e1758957703d3694a47e2457354a8f3c44f02

  • memory/1896-54-0x0000000075E41000-0x0000000075E43000-memory.dmp
    Filesize

    8KB