Analysis

  • max time kernel
    130s
  • max time network
    177s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    14-04-2022 13:56

General

  • Target

    PDF EmbeddedFile HTML.pdf

  • Size

    2KB

  • MD5

    8cc13c9fbff51ca84c3c1c033c3718c6

  • SHA1

    81a2357b761df7cc471c590683398d78d77b41f5

  • SHA256

    73fb9d94156c360334fc28cfa1ab6639f4f5d1e675734f5f200ad028dc66007c

  • SHA512

    e6549646f62894c108f5aa15da4eab7e0f0dc14dcc0917658f56e660661128298a62548edaefe94a3d27e1f53ffac7ed94c2d5f836f18dc4b4aae8dec4638a02

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\PDF EmbeddedFile HTML.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:964
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\A9RA759.tmp\HTML Javascript obfuscated.html
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1376
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1376 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:544

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\A9RA759.tmp\HTML Javascript obfuscated.html
    Filesize

    769B

    MD5

    6753e429e2a5fb32278e9614eadd3416

    SHA1

    4c64652ead8b010e94b267836bdf57b97fa52700

    SHA256

    b71ebf3c71bf7695e41f6a6a0498d651023c1dc705b6aa4b0fef1ae9bcfecf4d

    SHA512

    ce7d5ae038f39cd19f5bf9ee3a3ad095f3102b7277e65cf15cb99a93d8620a1e559418d823c4bc005b477dd5ea8b95d740697c7692077a4811e73c1d4245dc9b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\BZ8TBVE8.txt
    Filesize

    595B

    MD5

    99c185c447659404329dc5e1e7a2b449

    SHA1

    cca65fe1c745192dabb914972f28eeb6747bfa80

    SHA256

    883929a39aaa56dfe5fc8ca44822d1a6e37acb5e833e21de5ab1162d1677e392

    SHA512

    f4a51adf9f224194daf536a1e61f1271256e4ce0bdf20fb0213b133d3a86bb8e4601d2a859ecb37a2cb5e951faf3d8681211e471c04f423f18d28548ac118104

  • memory/964-54-0x00000000753B1000-0x00000000753B3000-memory.dmp
    Filesize

    8KB