Analysis

  • max time kernel
    148s
  • max time network
    44s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    07-09-2022 15:45

General

  • Target

    POLITIEINTERPELAREGN09332.pdf

  • Size

    997KB

  • MD5

    09629cd52b39117285be35bf01b1d680

  • SHA1

    592c0843890901b5d686ed628e4a6f48840d67a8

  • SHA256

    2a5f90ea205b239f02b4afd1886906cd8d5fceca48a7479da27c55d0a18bf560

  • SHA512

    29e71e1990893a684f25c89e1c2b0d7c8a262457d2bf13919043fc4ad9c92c8e9d7a521c7468e9b546f83468e9036000c02e854484f77639cdfa19fa639545ba

  • SSDEEP

    24576:TemXjoowTcQH954fWxJoos0LMlP+muikO+BG5jsJ:T5TxQH9m8XLMs95

Score
6/10

Malware Config

Signatures

  • Accesses Microsoft Outlook profiles 1 TTPs 5 IoCs
  • Drops file in System32 directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\POLITIEINTERPELAREGN09332.pdf"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
      "C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE" -c IPM.Note /m "mailto:[email protected]"
      2⤵
      • Accesses Microsoft Outlook profiles
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Suspicious behavior: AddClipboardFormatListener
      • outlook_win_path
      PID:944
    • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
      "C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE" -c IPM.Note /m "mailto:[email protected]"
      2⤵
        PID:784
      • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
        "C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE" -c IPM.Note /m "mailto:[email protected]"
        2⤵
          PID:952
        • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
          "C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE" -c IPM.Note /m "mailto:[email protected]"
          2⤵
            PID:1984
          • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
            "C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE" -c IPM.Note /m "mailto:[email protected]"
            2⤵
              PID:1640
            • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
              "C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE" -c IPM.Note /m "mailto:[email protected]"
              2⤵
                PID:1644

            Network

            MITRE ATT&CK Matrix ATT&CK v6

            Defense Evasion

            Modify Registry

            1
            T1112

            Collection

            Email Collection

            1
            T1114

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/784-57-0x0000000000000000-mapping.dmp
            • memory/944-55-0x0000000000000000-mapping.dmp
            • memory/944-56-0x0000000070EA1000-0x0000000070EA3000-memory.dmp
              Filesize

              8KB

            • memory/944-59-0x000000005FFF0000-0x0000000060000000-memory.dmp
              Filesize

              64KB

            • memory/944-60-0x0000000071E8D000-0x0000000071E98000-memory.dmp
              Filesize

              44KB

            • memory/952-61-0x0000000000000000-mapping.dmp
            • memory/1640-65-0x0000000000000000-mapping.dmp
            • memory/1644-67-0x0000000000000000-mapping.dmp
            • memory/1984-63-0x0000000000000000-mapping.dmp
            • memory/2036-54-0x0000000076151000-0x0000000076153000-memory.dmp
              Filesize

              8KB