Analysis
-
max time kernel
4294211s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
13-04-2022 16:24
Behavioral task
behavioral1
Sample
y25b13h7zd9..pdf
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
y25b13h7zd9..pdf
Resource
win10v2004-20220331-en
General
-
Target
y25b13h7zd9..pdf
-
Size
146KB
-
MD5
89e948ecffb86820c83af0bbdd334386
-
SHA1
5c7cdbe741a4cee6b3ce41d49afd1b6907f09484
-
SHA256
79271eecf576e09e248d66b5e07f26f0a13e061fafbf3fa51c52c6688e0ee46e
-
SHA512
4546ff7bb04ef97a18053f87e6184fdc8bc1cfa2c301901af46f24844af26454b47be4e3dbadaa50ad3c2fdc0d1a34d2996460854e8545a38321cbd71f0dd578
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{647EB0E1-BB46-11EC-9149-56C501B41E13} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7055392a534fd801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "356632129" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d8f8b5d2fcdd154fb512d53e64640bcc000000000200000000001066000000010000200000008e47761a7ab4882d21a82c6125148f3a89f496df52bacbd31475f1d828643709000000000e8000000002000020000000a66d641565748becbd3d7e49b55268618393dc197aaf91802fc3a431a1eaad23200000000b6c483785d00dbb9951dd5e581197bf14e707f7ce60c5f48447bb07164d3be740000000827327cdbd06e7260366a2a8afa94d1575aa4a5ae9ab6096f78bb1fb2b525fcd6b1f3564b62cf02e0affd37f983098d066675c139db3445b1eb052e50c9594fe iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 964 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 432 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
AcroRd32.exeiexplore.exeIEXPLORE.EXEpid process 964 AcroRd32.exe 964 AcroRd32.exe 964 AcroRd32.exe 964 AcroRd32.exe 432 iexplore.exe 432 iexplore.exe 1660 IEXPLORE.EXE 1660 IEXPLORE.EXE 1660 IEXPLORE.EXE 1660 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
AcroRd32.exeiexplore.exedescription pid process target process PID 964 wrote to memory of 432 964 AcroRd32.exe iexplore.exe PID 964 wrote to memory of 432 964 AcroRd32.exe iexplore.exe PID 964 wrote to memory of 432 964 AcroRd32.exe iexplore.exe PID 964 wrote to memory of 432 964 AcroRd32.exe iexplore.exe PID 432 wrote to memory of 1660 432 iexplore.exe IEXPLORE.EXE PID 432 wrote to memory of 1660 432 iexplore.exe IEXPLORE.EXE PID 432 wrote to memory of 1660 432 iexplore.exe IEXPLORE.EXE PID 432 wrote to memory of 1660 432 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\y25b13h7zd9..pdf"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://bit.ly/3je4mCR2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:432 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD564eb9ce803e39d4e3f607b088f82d059
SHA1cb234663e563c1a4bba71797bc71494f5c841783
SHA25658626bdffba52d62802672dab16f04fb53ceb86f84b983d539fc5cf90325f655
SHA51205c80fdeaeaac59f2e0b86ff73925893bb01e4cbf98403d65367b38938c9faeb78951fe539fd0b1020f6cabdc08357f55f61765f7695656bfb9a664220d20e04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5183759a230f4cc37bd42d766d03968b7
SHA1ddc42a89dfea3e9daf06678d4bd97f6a6adc3c66
SHA256d8feb3f4f2841f5f3d4fb22bf777b6f9b664eee79ddf928317166584b80a62b1
SHA512a7a91cf9fd12fd60594f0e2f938d7e6e3cd563a269c22ee1b9485b501a60702b57da9f3379de3f41a034d858761a1e45c38286d5393c3820f7b29417a0f45604
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357Filesize
242B
MD54d964ec1786a57b419145d272698a82d
SHA166ed8358f2f57eabed5a9c3d4ffdd85604d1cf7f
SHA256994b42eb50e96097170b1067c4118d7f54d043975baaec4bff2ce3ddc9434cb4
SHA51210a0e179ab20422afc22539977e6b29a1a9e836392c1ef85318fbb20ee9f4ce68cc7038e97c9011a57499f1440c9113ac56159cd760e96cf87dafa87eeaa0a42
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\GZ5RLT49.txtFilesize
608B
MD59326a71a9f6fee5ec9dd8901724d20b5
SHA1c2e56191106c87fd54473c93764f789d0781db86
SHA25603f17c1d06ba0d8204c663105ab6dd4819e57ac073bdbd16198296fcd66412ed
SHA512bbc5e1815038dbdc6f3d4cb64e1746524bc92d8dbca2b180f8d31efeac892bc6cdca80212cada0046d2e179a292bea1c66191fd83e2ee48e6b10b0e9c1166d5b
-
memory/964-54-0x00000000755A1000-0x00000000755A3000-memory.dmpFilesize
8KB