Analysis

  • max time kernel
    145s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29-09-2022 15:32

General

  • Target

    Account#901285_Information.pdf

  • Size

    89KB

  • MD5

    2a32eb80f00e27ddae801a12318e261c

  • SHA1

    dfada169e50067738c9870137cc22e695ada695c

  • SHA256

    19b1438fd814c3627b5165061a20cc43dbb4df88805485232dd0bccee3e79641

  • SHA512

    6f56220c1f0e1043aaa032d8ea884f94f567a1bd02505679f7b3adf6ce6cf316cb4621f2cbcf3f237ca506507936433ce794e66b0dd15c9334c7fbbf24bca8a8

  • SSDEEP

    1536:UHqcrVHUyltzxzXzcz5SzMOloKzQQzNl9iStgvAWSBJZm8xn3o:UK9AzxzXzczMzTzz5zNl9tUApBC8x4

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 50 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Account#901285_Information.pdf"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1948
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://fasteraid.com/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1728
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1728 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1508
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:1728 CREDAT:406539 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:564

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    60KB

    MD5

    d15aaa7c9be910a9898260767e2490e1

    SHA1

    2090c53f8d9fc3fbdbafd3a1e4dc25520eb74388

    SHA256

    f8ebaaf487cba0c81a17c8cd680bdd2dd8e90d2114ecc54844cffc0cc647848e

    SHA512

    7e1c1a683914b961b5cc2fe5e4ae288b60bab43bfaa21ce4972772aa0589615c19f57e672e1d93e50a7ed7b76fbd2f1b421089dcaed277120b93f8e91b18af94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    f412228e47b911b28341910bb5c5b86a

    SHA1

    fa4ce6a07636ee79c7d2dd4ab165ba121fd53b71

    SHA256

    2e5f90772d0228c45d70df336fd23d9c28a4c24c6ac4d4e006fdbe0e9b206bc8

    SHA512

    4494eb1dd30356954605c4b27fe85e3819c3a6507e41c55fd6b289dc106252a9130efae35c3b2b7b425b18e1419647db700f22682bcf2ba88b2e00dc6ab53964

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\ZFWQANCJ.txt
    Filesize

    608B

    MD5

    842e303da9f0885fe745426e8ce9014a

    SHA1

    4e6a883bba14788d060ef61da1b20f8c8eba9a25

    SHA256

    09b69dbcab973e96c8dea54e8d3c41dde296f4d4ff790864ba9e1fa4109c52e6

    SHA512

    82534a9c4d888bd40e3f37f0c44fdc8d4b279e771f6137a28f1bd786a6eb73cdf5ef9cd8cd5845fe8bf95aa9710055347333c62bf17b371b5bc537e1e4a3b826

  • memory/1948-54-0x0000000076031000-0x0000000076033000-memory.dmp
    Filesize

    8KB