Analysis

  • max time kernel
    78s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20220414-ja
  • submitted
    28-04-2022 09:31

General

  • Target

    22929436463.pdf

  • Size

    86KB

  • MD5

    27b42a05e5e4fcf404b6113cf0f18d23

  • SHA1

    b4fdb31518e046e08262a87c5fe1889ebb3f020d

  • SHA256

    b46b85501b0df5866c5433250c5debdab221ff21803df0923e9ae4169b411e45

  • SHA512

    5f20fc015a4d7957a0137c2016ec421244bece50fc63df80afb8b89104575fdda6eb7a6ffc92eb83379a3c124fa75b12c09ef67829aa8b8c5e6f17d5389fca02

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\22929436463.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1888
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://feedproxy.google.com/~r/skout/mBVl/~3/Om9ozkHLxGw/uplcv?utm_term=how+do+you+calculate+the+weighted+average+useful+life+of+an+asset
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1404
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1404 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1000

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    b0636f49fbbe86fa72dd0dc37f9fe4b8

    SHA1

    af787746749f930be3e0b6c12ccbecd9141e6ad8

    SHA256

    16b796e77e519bf16f70f79713c371a9404562378c2f79c2221abe9fedf85894

    SHA512

    2b832d69d2095bebad12331af7097f253e6a18e3185c0e82647fd4bee0795eafb91fe8ceedb696c6a5f80d0fc994d77f90aa18b651d4e856b8866ba6451acabb

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\RR9KWEA2.txt
    Filesize

    603B

    MD5

    a5ec9b2b0146f378bab12d76d242a26c

    SHA1

    f277fe853188420fe7e5764829beb0f60ee4f3eb

    SHA256

    e42d3bb64312ee6f5215d181d2018dc37931af6101cfaaa2d80c652904266aaa

    SHA512

    ad9c390ca03ba16f3180026700fc1ff7cc0098c336b976682382369d019698a3fa6b9f6d05431236a46de4a42b35af87dc583c2d4faabc1c68e0838d78012217

  • memory/1888-54-0x0000000075041000-0x0000000075043000-memory.dmp
    Filesize

    8KB