Resubmissions

14-04-2022 15:20

220414-sqsqnsdbfr 3

14-04-2022 13:15

220414-qhknzsaadr 4

Analysis

  • max time kernel
    99s
  • max time network
    105s
  • platform
    windows7_x64
  • resource
    win7-20220331-en
  • submitted
    14-04-2022 13:15

General

  • Target

    Notificacao-Detran.pdf

  • Size

    119KB

  • MD5

    f927ebf5e6be9feb237a672e90aca5f6

  • SHA1

    b82500bd09a8784899a9e8a738ca789093869c9a

  • SHA256

    13daae9ca92e8952feb254fc468bfa33b862d305be099c4f4ad5be3296358deb

  • SHA512

    0dc93fd1033b5c4b97f7bf49ce00cc335217fc7c6d660515fa6aa51ddbf4cd2ff630eb62158b5246b75952ffa562b20c7c62df9de79cbb653957294778844e2d

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Notificacao-Detran.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1820
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://storage.googleapis.com/notificacao/Infracao.htm
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2020
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2020 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1676

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    2d844d57a8d795841f895b1f8b7e2515

    SHA1

    cf49fdb9e0ca034f46e101a845a03d0ec4cf8f57

    SHA256

    eb6f4fad27887b737563c6e4aadd32813f8dff7a6e1940f1d68297abe3ef7139

    SHA512

    d266b22f7d2d9865aab48c9148adae9dc6c9b622f79ffc0de473ea916a8ec1a612e9ea1192e96bde87b7adf7e2f115c57e42e38a7de336b2c722aedf044ea7f6

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\b1rou5u\imagestore.dat
    Filesize

    5KB

    MD5

    2654d67a127d00a52622f89fbd81365c

    SHA1

    63401f91926dd0afbbaf00b6eb4051cd2a6c84b4

    SHA256

    3ffac0df9eff922b91ca2a76d1fc84043bb3389e67f36e0d0d0310991fe91c1f

    SHA512

    f4e2e44e4cf5c5ebd38f0f53f722d96182b4f979d82660920d59423ae9817a6587a5d7701bbbe4eab20794741333e79c12ba2dfaf6307f813f1ccb57d495a72b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\LUBOTI5H.txt
    Filesize

    607B

    MD5

    870deb17c1edb4e1c3a313feb750007c

    SHA1

    3776c83be5fc1162d79c53ea66686a3151237903

    SHA256

    327b6a91887a243edd2ac1d81a2fa02c87f46117b213777cdab5c7d4be00b879

    SHA512

    ecccf17ef69b299e249c6be5526ecf472f1f181dae67bf6e500ce8eacc93ab953fd070b67a64edca8503336aa47c32e6ad4a22cb67d06c7d342378d735b3014b

  • memory/1820-54-0x0000000076641000-0x0000000076643000-memory.dmp
    Filesize

    8KB