Analysis

  • max time kernel
    51s
  • max time network
    52s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    09-09-2022 15:52

General

  • Target

    Omnicell xt user guide.pdf

  • Size

    92KB

  • MD5

    401589aa390aa278997a0642b13bb2c1

  • SHA1

    cd0552f6684709025c87a55fccac29a48a1cd05a

  • SHA256

    884357ac6f038269ef76af9dc915e737f34d45a0d3cc674656f6779a5f4c2827

  • SHA512

    ab111b7db8869cd286856a35f8cedc2336a7a0a2b9c965c97cdb9d0cd382cce0f7db7599afc70450d463ceb877b7f8cee537ef49b83338ec175aeb29714cb0d9

  • SSDEEP

    1536:kxexCggrO/vfN2cUzxg+tDlJsMs+fKxqJn11ytyLgNSFrgk3Ur+82cDQb5lP4Wrp:EiXgrmfN2fO+twp+ixA72SJgk3cx2gYt

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 29 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Omnicell xt user guide.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1468
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://ketchas.ru/uplcv?utm_term=omnicell+xt+user+guide
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1536
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1536 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1128

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1468-54-0x0000000075211000-0x0000000075213000-memory.dmp
    Filesize

    8KB