Analysis

  • max time kernel
    144s
  • max time network
    171s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2022 15:10

General

  • Target

    Uhaul_012835790.pdf

  • Size

    126KB

  • MD5

    97da98894a0bc85e4b1443519db3482f

  • SHA1

    3a09682143b07d201896fb10a4f600c7f5f3bf06

  • SHA256

    6ce91022d703bd582b3bdbd4f581f58044d2a377d4983916276b3f69207e3114

  • SHA512

    094b11d06eb0647bb3f6964f43e42cf4b91c340c2568034bfe42c9becac5462dc0d27b010f26666813bedda3d328f30f328736ee6ca2c4f66ec94f19a5bafcbe

  • SSDEEP

    3072:Nkgu/dRF2KCJP6xDrehTGjBblmz8HjBZbVBG8XgUg+00btW:OjdRKJyd+oBB8mt8Nb

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 58 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Uhaul_012835790.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:276
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://www.automoto-pantazis.gr/2837/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1724
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1724 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1924
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://www.automoto-pantazis.gr/2837/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1544
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1544 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1508

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{FE5342F1-4A50-11ED-8538-4A4A572A2DE9}.dat
    Filesize

    5KB

    MD5

    239ca5ada43da2e3a94ad66a6a01edc0

    SHA1

    4a3e9e1130356fc2c3ce33c8a71a33870a87d452

    SHA256

    93b690dcb0d967a275164aec1e47a9733ba8dab944e870d004e6bf59e38cdd1f

    SHA512

    7d7540f9693a4906fc76162a3d36038765e93aba20eaf55ae2413b0fd877409264e50bc5da603045086609bf31fdc0aee0ecf9b7745c60a7ea939545527ebf8e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\1ZWKWLYV.txt
    Filesize

    608B

    MD5

    a015ef8b1a0dc6f5e82970593bbb09a5

    SHA1

    55d9f60ea63079fce037fa16d50676697cdfca96

    SHA256

    ee77f697dbc4271ba01ffa9c5f14103f01bccc96f23e2bd81ce088acacfac209

    SHA512

    105810f31c42eabf5dd5b75c7e3bf9c511146c3f5f2f30c31165ac3b1aed5d26c218bc4bcfdef5292b94ec69d0cf2e77e6d72c796206a7899f6968b628b3285f

  • memory/276-54-0x00000000753C1000-0x00000000753C3000-memory.dmp
    Filesize

    8KB