Analysis

  • max time kernel
    72s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    12-05-2022 10:07

General

  • Target

    c11542f7e88f1fb5daf4fe632a740ad7ed729f5fad075148ab80f616664bfef6.pdf

  • Size

    30KB

  • MD5

    d4b7e6305940220205ac14fe62823516

  • SHA1

    ab016e3bd926ea7b439c14e04a8fde195b401382

  • SHA256

    c11542f7e88f1fb5daf4fe632a740ad7ed729f5fad075148ab80f616664bfef6

  • SHA512

    5a8c7c97efa07a54b02492c70353c4f1fddf8067714f5da0ffa7f42ceca2ed12374013d224d6e43fee70d340718afead0beb274dd7501319c1e3c671c2c33f57

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 59 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\c11542f7e88f1fb5daf4fe632a740ad7ed729f5fad075148ab80f616664bfef6.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:916
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://taxfile.mediafire.com/file/z39lxqg942csz0c/Confirmation-3381633.ppam/file
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2020
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2020 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:896

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    60KB

    MD5

    b9f21d8db36e88831e5352bb82c438b3

    SHA1

    4a3c330954f9f65a2f5fd7e55800e46ce228a3e2

    SHA256

    998e0209690a48ed33b79af30fc13851e3e3416bed97e3679b6030c10cab361e

    SHA512

    d4a2ac7c14227fbaf8b532398fb69053f0a0d913273f6917027c8cadbba80113fdbec20c2a7eb31b7bb57c99f9fdeccf8576be5f39346d8b564fc72fb1699476

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    44d41651dace98ae52a1bc9e71095f0c

    SHA1

    1f7e3427e093ff51fd9b00abfa4e2284c07cc2b0

    SHA256

    a71d62ce5cd40633a59bb94ec351e30a1aea6206f580320bf7a55cebb672931c

    SHA512

    92f682e1c279d40691caa27c016a9b9563d49d6b64d0575de89ca20fb623e7bd638c6078baeceb77a1636e2fd984ae3b93f67b17aebdc49c2cf4eb62455d45f8

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\Q1VPFLCK.txt
    Filesize

    599B

    MD5

    c4c95202c91650600f710e9ff7a8f46d

    SHA1

    15e25f25694599106c33bbb0f98393e957b8228a

    SHA256

    71844a62c62288c00eced24c2c5a4381b5f326e331269ecbb2e6a0a7b8b32c63

    SHA512

    e23e4098d37d26f99f04626329cf1ca6e2ddc75a11135738621b86321d2c61c6810628a4782e9e17516d04a463800138235613c7db59277a9ce1b65e38b6cbac

  • memory/916-54-0x00000000753B1000-0x00000000753B3000-memory.dmp
    Filesize

    8KB