Analysis

  • max time kernel
    90s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    21-05-2022 18:36

General

  • Target

    T6636_PDF.exe

  • Size

    1.2MB

  • MD5

    8ff2e665cfb3b37173fa0ad1126d081a

  • SHA1

    624fd5ca214e383b7c210f7792868f022b392260

  • SHA256

    99b3e1c6a5263c2d0b48f0e57ebf750b474ee28a8378af89750e8c154938faf6

  • SHA512

    d423def1ab53669e00234c8b6439d97238d93d638050a1b4fc2d5057b24da6eff768a8ea04127dfa605698e35d565b39b009bae27f35e9cd8eaa3acd836c3e0d

Score
1/10

Malware Config

Signatures

  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\T6636_PDF.exe
    "C:\Users\Admin\AppData\Local\Temp\T6636_PDF.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4208
    • C:\Windows\SysWOW64\dllhost.exe
      "C:\Windows\SysWOW64\dllhost.exe"
      2⤵
        PID:4444
      • C:\Windows\SysWOW64\dllhost.exe
        "C:\Windows\SysWOW64\dllhost.exe"
        2⤵
          PID:4800
        • C:\Windows\SysWOW64\dllhost.exe
          "C:\Windows\SysWOW64\dllhost.exe"
          2⤵
            PID:4856
          • C:\Windows\SysWOW64\dllhost.exe
            "C:\Windows\SysWOW64\dllhost.exe"
            2⤵
              PID:1480
            • C:\Windows\SysWOW64\dllhost.exe
              "C:\Windows\SysWOW64\dllhost.exe"
              2⤵
                PID:3280
              • C:\Windows\SysWOW64\dllhost.exe
                "C:\Windows\SysWOW64\dllhost.exe"
                2⤵
                  PID:1816

              Network

              MITRE ATT&CK Matrix

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • memory/1480-133-0x0000000000000000-mapping.dmp
              • memory/1816-135-0x0000000000000000-mapping.dmp
              • memory/3280-134-0x0000000000000000-mapping.dmp
              • memory/4208-136-0x0000000003710000-0x0000000003745000-memory.dmp
                Filesize

                212KB

              • memory/4208-137-0x00000000041B0000-0x00000000041E5000-memory.dmp
                Filesize

                212KB

              • memory/4444-130-0x0000000000000000-mapping.dmp
              • memory/4800-131-0x0000000000000000-mapping.dmp
              • memory/4856-132-0x0000000000000000-mapping.dmp