Analysis

  • max time kernel
    76s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    14-05-2022 09:36

General

  • Target

    67db60f80efa8820633911b3ada48275.pdf

  • Size

    141KB

  • MD5

    67db60f80efa8820633911b3ada48275

  • SHA1

    46ce8e54e5b8b558f99e6d9ee257f01d51be1f6a

  • SHA256

    e404a4fef8a30815cdf6805f18c0022df2255d63e03bbce4da13ab9e0687fa13

  • SHA512

    aee6fd90c68c3f43053802e7c332f062bfcdcd161484ce37e932188ff4783804d3916ce502fb5fa215d2ff3ad21e9f80577505aa106a21cd642b70fd2f4881bf

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\67db60f80efa8820633911b3ada48275.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1000
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://cdn.discordapp.com/attachments/958234472795500567/974218477244137512/Quotation_for_Order.rar
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1760
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1760 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1728

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    bb13e3e4ddaf202e5e34864c23b9a6e5

    SHA1

    b89d6c6bb98fae2139db626fa857ddda8c6e7166

    SHA256

    01e9d03757fb0a90826f52a9c7e92ae71ab37232389191e1f3299b8c0c20ed81

    SHA512

    764b834b0b73ee90a9251d7e073b3a174024d3f320b845ec8ba6c72504380d5573557cb94e10e527152090caede6e29e1b2988886c336ae89234fc088b516933

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\5SGRENSW.txt
    Filesize

    598B

    MD5

    ee5707874e5b2ff2e874d5fef7274465

    SHA1

    38825a6420e2b9ce34814629fcea099821026a48

    SHA256

    18ee22975772c29b2b699bbb3725ba4ea2c1759b7b06d9299c3f800eaca8ceac

    SHA512

    cbfd86dd2d7a15403a5ec62d812681cd72f8b060654e81236e8cef475f9f6bcadc78b86181839cb274180873f1abed68382a9d12b42de62793b70d8f20da64d8

  • memory/1000-54-0x0000000075F21000-0x0000000075F23000-memory.dmp
    Filesize

    8KB