Resubmissions

06-10-2022 02:46

221006-c9sa9agdcr 3

06-10-2022 02:46

221006-c9bnhagbe8 3

Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06-10-2022 02:46

General

  • Target

    Tickets_boulvar.pdf

  • Size

    46KB

  • MD5

    9431eae3695eaae0842818524576f2d7

  • SHA1

    0136382b04712ee683f4f34936223c5c6b353a0c

  • SHA256

    fdf31dc4a95e2b2f06984166c1bdce3672f66a2f3bd09818366900227036a403

  • SHA512

    c9d3880d9397469ff559d23907a42addea5578b9e1c608b701aab934984f99137d89f10cad1a56f3ca8e92b6e054f3369be0a173cfc7bd0aad39dee7fde7a9c4

  • SSDEEP

    768:1ng9hNTGUeQa7JVUlgQXy6PPmTXbamif4hwfsP6/DlcL7CzNzxYZOeyo0/oJLS4m:+JRPRd4wEaNUyo0/C3i

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 46 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Tickets_boulvar.pdf"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1044
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://www.trybooking.com/events/contact?eid=971635&bookingUrlId=9353978f-2055-4dbe-afef-b43e216d9a6c
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1992
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1992 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1656

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    60KB

    MD5

    d15aaa7c9be910a9898260767e2490e1

    SHA1

    2090c53f8d9fc3fbdbafd3a1e4dc25520eb74388

    SHA256

    f8ebaaf487cba0c81a17c8cd680bdd2dd8e90d2114ecc54844cffc0cc647848e

    SHA512

    7e1c1a683914b961b5cc2fe5e4ae288b60bab43bfaa21ce4972772aa0589615c19f57e672e1d93e50a7ed7b76fbd2f1b421089dcaed277120b93f8e91b18af94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    118e890bf54debb8579ae49478ed5064

    SHA1

    69867cbe431d07968d49da3e87387335fd17796f

    SHA256

    9d7fc5bf0c3054330bac12889d6c333d9e9a8e31daff02977caa6f133d28a186

    SHA512

    ffa34dd795ea74dea37270890e4e16e20a0bee702137de0612ef311a31b0766ebf7d3b434e93069b5ae81fc78141065aeda0c2fb0bcae0533b7d4617b127007b

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\1evexod\imagestore.dat
    Filesize

    8KB

    MD5

    64e51e5344a4bbabf302d3190fe2642d

    SHA1

    9d1f8e674583afa2c45dae59446f0e1f61088c41

    SHA256

    41627a6b3784237a5728b0848f6c85215ba0d2f31a6f6d887bd03abc86acf2ac

    SHA512

    4c5a7aadd53b7530a61dd65695bd7a2e5fa4eb28de9300abe739f965f75ce7064ba26b58b9558f5b4d2651ab53612beb0589d04ec2d6afe80d5296a1453713f2

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\WGI2O9A0.txt
    Filesize

    606B

    MD5

    0e1a36e2117f720f651cbf4074abb578

    SHA1

    12a1cbb8ddf926075acbe50cb947d4d62d68c79b

    SHA256

    0ce7ac43f042e50cb89e6a6c1d7d8a0214f99c05511db99d1e0e6324b01998d8

    SHA512

    a85598d3a9412eee2dcb6c22a77caee1807652fcff0c49a21cd0a2c499ad590edeff2d9356ee5273868816b11d9d49e0417568fe89909adab7374d8e3fcc55ba

  • memory/1044-54-0x00000000756A1000-0x00000000756A3000-memory.dmp
    Filesize

    8KB