Overview
overview
7Static
static
7Document.p...me.xml
windows7-x64
1Document.p...me.xml
windows10-2004-x64
1Document.p...gs.xml
windows7-x64
1Document.p...gs.xml
windows10-2004-x64
1Document.p...ng.xml
windows7-x64
1Document.p...ng.xml
windows10-2004-x64
1Document.p...ot.xml
windows7-x64
1Document.p...ot.xml
windows10-2004-x64
5Document.p...ys.xml
windows7-x64
1Document.p...ys.xml
windows10-2004-x64
1Document.p...ve.xml
windows7-x64
1Document.p...ve.xml
windows10-2004-x64
1Document.p...al.xml
windows7-x64
1Document.p...al.xml
windows10-2004-x64
1Document.p...in.xml
windows7-x64
1Document.p...in.xml
windows10-2004-x64
1Document.p...ce.xml
windows7-x64
1Document.p...ce.xml
windows10-2004-x64
1Document.p...ms.xml
windows7-x64
1Document.p...ms.xml
windows10-2004-x64
1Document.p...at.xml
windows7-x64
1Document.p...at.xml
windows10-2004-x64
1Document.p...me.xml
windows7-x64
1Document.p...me.xml
windows10-2004-x64
1Document.p...er.xml
windows7-x64
1Document.p...er.xml
windows10-2004-x64
1Document.p...er.xml
windows7-x64
1Document.p...er.xml
windows10-2004-x64
1Document.p...gs.xml
windows7-x64
1Document.p...gs.xml
windows10-2004-x64
1Document.p...ay.xml
windows7-x64
1Document.p...ay.xml
windows10-2004-x64
1Analysis
-
max time kernel
171s -
max time network
230s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-09-2022 11:23
Behavioral task
behavioral1
Sample
Document.pdf/About/AppXRuntime.xml
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Document.pdf/About/AppXRuntime.xml
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
Document.pdf/About/AuditSettings.xml
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
Document.pdf/About/AuditSettings.xml
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
Document.pdf/About/EventForwarding.xml
Resource
win7-20220901-en
Behavioral task
behavioral6
Sample
Document.pdf/About/EventForwarding.xml
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
Document.pdf/About/ExternalBoot.xml
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
Document.pdf/About/ExternalBoot.xml
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
Document.pdf/About/FileSys.xml
Resource
win7-20220901-en
Behavioral task
behavioral10
Sample
Document.pdf/About/FileSys.xml
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
Document.pdf/About/SkyDrive.xml
Resource
win7-20220812-en
Behavioral task
behavioral12
Sample
Document.pdf/About/SkyDrive.xml
Resource
win10v2004-20220901-en
Behavioral task
behavioral13
Sample
Document.pdf/About/WinCal.xml
Resource
win7-20220812-en
Behavioral task
behavioral14
Sample
Document.pdf/About/WinCal.xml
Resource
win10v2004-20220812-en
Behavioral task
behavioral15
Sample
Document.pdf/About/WorkplaceJoin.xml
Resource
win7-20220812-en
Behavioral task
behavioral16
Sample
Document.pdf/About/WorkplaceJoin.xml
Resource
win10v2004-20220901-en
Behavioral task
behavioral17
Sample
Document.pdf/About/en-US/ActiveXInstallService.xml
Resource
win7-20220812-en
Behavioral task
behavioral18
Sample
Document.pdf/About/en-US/ActiveXInstallService.xml
Resource
win10v2004-20220812-en
Behavioral task
behavioral19
Sample
Document.pdf/About/en-US/AddRemovePrograms.xml
Resource
win7-20220812-en
Behavioral task
behavioral20
Sample
Document.pdf/About/en-US/AddRemovePrograms.xml
Resource
win10v2004-20220901-en
Behavioral task
behavioral21
Sample
Document.pdf/About/en-US/AppCompat.xml
Resource
win7-20220812-en
Behavioral task
behavioral22
Sample
Document.pdf/About/en-US/AppCompat.xml
Resource
win10v2004-20220812-en
Behavioral task
behavioral23
Sample
Document.pdf/About/en-US/AppXRuntime.xml
Resource
win7-20220901-en
Behavioral task
behavioral24
Sample
Document.pdf/About/en-US/AppXRuntime.xml
Resource
win10v2004-20220812-en
Behavioral task
behavioral25
Sample
Document.pdf/About/en-US/AppxPackageManager.xml
Resource
win7-20220812-en
Behavioral task
behavioral26
Sample
Document.pdf/About/en-US/AppxPackageManager.xml
Resource
win10v2004-20220812-en
Behavioral task
behavioral27
Sample
Document.pdf/About/en-US/AttachmentManager.xml
Resource
win7-20220812-en
Behavioral task
behavioral28
Sample
Document.pdf/About/en-US/AttachmentManager.xml
Resource
win10v2004-20220812-en
Behavioral task
behavioral29
Sample
Document.pdf/About/en-US/AuditSettings.xml
Resource
win7-20220812-en
Behavioral task
behavioral30
Sample
Document.pdf/About/en-US/AuditSettings.xml
Resource
win10v2004-20220901-en
Behavioral task
behavioral31
Sample
Document.pdf/About/en-US/AutoPlay.xml
Resource
win7-20220812-en
Behavioral task
behavioral32
Sample
Document.pdf/About/en-US/AutoPlay.xml
Resource
win10v2004-20220812-en
General
-
Target
Document.pdf/About/en-US/AppxPackageManager.xml
-
Size
3KB
-
MD5
b182f0b429a84d7e97c3d50eadf154a5
-
SHA1
87dda04edcfe5e6c22f0224d9ee8375e0920b7f6
-
SHA256
5cd8b222aecbdeac3df2de6b774af7e02988981136f6e5e9cd3d12735c6a6416
-
SHA512
c42670fa053734c1b909fbb1ae189d4acf72b290679c1564d78276022bdf0afd279558c608f00953325e5aee47eb93df35c5afdbb29f698e5c8f808610db5055
Malware Config
Signatures
-
Processes:
IEXPLORE.EXEIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "370704653" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{862B0F91-3B43-11ED-9584-C22E595EE768} = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062e6ef0d45f4454ab79548c962d74cdf0000000002000000000010660000000100002000000099ea0af6a0305fb91b941aaa758def595e65edeec8bd8d840d6b7def616365e1000000000e800000000200002000000095f761aa637f29dd56da997a6dd5b53a81d881782651eb1042f0e662dfde25462000000092f5c70a6f1b448f33e7e212cce0c4fc0611366ff725569c811692f7e633975140000000ff76432ad9256f46cce86029d914f55b44fd3d82e054f205371e1834fa9102737e95fa7d7a1ec839ca5fc02dbbce7a4ef13fddf5df8f80230c36c4e41bd2047b IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20309b5b50cfd801 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
IEXPLORE.EXEpid process 336 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
IEXPLORE.EXEIEXPLORE.EXEpid process 336 IEXPLORE.EXE 336 IEXPLORE.EXE 516 IEXPLORE.EXE 516 IEXPLORE.EXE 516 IEXPLORE.EXE 516 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
MSOXMLED.EXEiexplore.exeIEXPLORE.EXEdescription pid process target process PID 1788 wrote to memory of 2020 1788 MSOXMLED.EXE iexplore.exe PID 1788 wrote to memory of 2020 1788 MSOXMLED.EXE iexplore.exe PID 1788 wrote to memory of 2020 1788 MSOXMLED.EXE iexplore.exe PID 1788 wrote to memory of 2020 1788 MSOXMLED.EXE iexplore.exe PID 2020 wrote to memory of 336 2020 iexplore.exe IEXPLORE.EXE PID 2020 wrote to memory of 336 2020 iexplore.exe IEXPLORE.EXE PID 2020 wrote to memory of 336 2020 iexplore.exe IEXPLORE.EXE PID 2020 wrote to memory of 336 2020 iexplore.exe IEXPLORE.EXE PID 336 wrote to memory of 516 336 IEXPLORE.EXE IEXPLORE.EXE PID 336 wrote to memory of 516 336 IEXPLORE.EXE IEXPLORE.EXE PID 336 wrote to memory of 516 336 IEXPLORE.EXE IEXPLORE.EXE PID 336 wrote to memory of 516 336 IEXPLORE.EXE IEXPLORE.EXE
Processes
-
C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Document.pdf\About\en-US\AppxPackageManager.xml"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome2⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:336 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\6VXCOJWI.txtFilesize
608B
MD5cb7a5baf90ccc91fe92034155a48a91e
SHA1f656dad75f52256e10f934191d227fa13e1507e5
SHA256b42a313a4da49617bad735246c33569e22cde4b70f3824d8a6f530a2080ab89e
SHA5125eb7f358d5ca68af00983aca29e7f2238bf2ca4ca5594adeb405bef78790cf908f0640ac22cab327ec045738e1af90b2fbc77631a85c2effe83ab60a789e4712
-
memory/1788-54-0x0000000075771000-0x0000000075773000-memory.dmpFilesize
8KB