Analysis

  • max time kernel
    147s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    10-05-2022 10:38

General

  • Target

    0pEN 00c.pdf

  • Size

    390KB

  • MD5

    de7fba9b639fea8b4d0b0b4318976a39

  • SHA1

    f3455567345799a0ad70a04b3e914faef3447e42

  • SHA256

    2546bb27d077cac30b7ac9c0dcf4dca8d82251745f40651426a55e6ba844cc3f

  • SHA512

    64fe1983146a03c04a0a732bda344bec396ef59e17f189d781ef786a5e70dc6476f02989d470fe223c4adca86f754ab4d2a0692f33573fd05d118f0801cdb8f1

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 47 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\0pEN 00c.pdf"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:912
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://docs.google.com/drawings/d/1Yr7Ye4WExoVp5_qTUaZKvCoK3gCXoXheJjnKFdapNRw/preview?Nb
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1900
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1900 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1056

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    ce1be710d0eb45b0ae9154d6e1cb6fe4

    SHA1

    92df5405a093cb53c96076c322859ba470a1ab2f

    SHA256

    215d131495078991cac86bf5ab255128e1b81c4568bd0091f90ce9675a4f6112

    SHA512

    1b122c323ae237e55924b66cc9f7bbad0dfc8558b03b88682952a544e8e4abdcbf0fb4b7de4c0a26da3a1f904dc208448a0fa12a76b0f18bebca9e42f20b1910

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\9os4y76\imagestore.dat
    Filesize

    9KB

    MD5

    b21accceefb0be2ecf2ef1de409f127e

    SHA1

    9508292b9a4efc8fb47162a58d58d2ec37865478

    SHA256

    31e4275ac50db274cb3b558893e96217a5465df195036a1866237e1ad72e49c2

    SHA512

    a016c92e69ea9c6affb40a32ed34dfd941f46d1d87eff5f1d07ffe7ccfa63c03dc65ebadcef4a0c037a8dce1c11015b92a3169da86abc5f6c9005956b111c4f8

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\KQFIMTXB.txt
    Filesize

    599B

    MD5

    77f0cfc3aa722173ad4c21977012d4d7

    SHA1

    20cb000c09a10e634511b6a77a493f71ec07ae1b

    SHA256

    6dd1244daf42ba6a31b99d879513f294114cda7b10b08be16b779b32124f8c39

    SHA512

    59c9e2956e304e6961c606b539cf16e064612032bdb2c891088a7c0f72021cc8c98cf9a6c88c25a14d2d802ec58a640aee83977db283bdd902a316e0a372991a

  • memory/912-54-0x0000000075CF1000-0x0000000075CF3000-memory.dmp
    Filesize

    8KB