Analysis

  • max time kernel
    137s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    10-05-2022 13:18

General

  • Target

    ACG Cloud Playground Security FAQ.pdf

  • Size

    284KB

  • MD5

    4bc58940faaba24fb293a9004512d124

  • SHA1

    30ffdb7c67d88c06345c6340be23f235031b37a6

  • SHA256

    70039e495eb175a6ac7231c771caa79e2b8f4b75af31abf4ad034cb397d9ab22

  • SHA512

    3064956cf85da49d28d64765744fdfdaa66d904bd32172c48ae8cb1a067f701428537855094f1217b9d0a2b450d38cb2055e8b3153fc125509e5fb4b9c95f98f

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\ACG Cloud Playground Security FAQ.pdf"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://acloud.guru/cloud-training-for-business/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1308
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1308 CREDAT:275457 /prefetch:2
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:576
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://acloud.guru/cloud-training-for-business/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1064
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1064 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1388

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{9E4B4ED3-D074-11EC-8873-66AE473A865F}.dat
    Filesize

    4KB

    MD5

    8caa76ebeafdd12e6393716442efc7a3

    SHA1

    3c29b01675d35a108bf2a69ab56ab0011d339313

    SHA256

    4994e98305d46248d88e16f0beb940eadca05be55c8d1d687121b4e64b7a439b

    SHA512

    8da28c33004842c72f347d6d06d55d63c707d6cb6e93525325adde1b4eedbf6375677c645b4049b76d810fffb56a19f7ea6a6e4101452edd3543b62d53b6901d

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Last Active\RecoveryStore.{700E4CF0-BBEF-11EC-BADF-F2122C6314CC}.dat
    Filesize

    5KB

    MD5

    df152093aa68851e1d5b7280b86780d5

    SHA1

    6969829b5c47cfb0e63101c94749d6ff517ff472

    SHA256

    ae21ba8e9a02f37bdb98bd38d6e56a20f06b3607aa945181f880ee0eef2dfb70

    SHA512

    b12e69dcb245cf0800cd146f9316bb11a042c23899bee312c316dadeaf26714b1612d99986ab5bcaf63d8e77d5fd6d3db106f8c94e6e40810b0edde0310ba79b

  • memory/1720-54-0x0000000075711000-0x0000000075713000-memory.dmp
    Filesize

    8KB