Analysis

  • max time kernel
    408s
  • max time network
    411s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    13-10-2022 06:23

General

  • Target

    Quotation.pdf

  • Size

    114KB

  • MD5

    abaf0b1f64bb5b4a2317839e3b704491

  • SHA1

    b39cc0e36b004c4c7d7e0865870dbcf141619354

  • SHA256

    54e6d9edfc464897c5a761bbab53ad6b7d2a881df2e4a13fb119578ab89b85bd

  • SHA512

    1ba0cf66c466a0d2a7293db4990592fce74e6283f160f4ec4cd8fcf503c7abd8540b1ca4e327e692f0a1b9be7b05bc9f5b5cf425d2802b758e5dc98cb7717cd8

  • SSDEEP

    3072:vgN6/rdYCDt72mDlgwRyBq0rrxNBBo1Va:vgN6jtJ7HZgFJHBq10

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Quotation.pdf"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:832
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://m.addthis.com/live/redirect/?url=https://storageapi.fleek.co/2ee61029-ea2e-45b4-9c41-a7327b42a611-bucket/onedrive/snow222/snow33onedrive/adobefinal/eadobefinal.html
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1336
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1336 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1984

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    340B

    MD5

    f4d44d96a4fa366491fc60b530371483

    SHA1

    f6a5bb0f1e2891d7c917a061cd2f4058372908c1

    SHA256

    102d6967459dd230606d0954244abd8062e1ecdf175fbd1a3de265e1939b2840

    SHA512

    08a44e787aac1b972a4be9a592c7db96d405893dd581130ed39402ea483165dbafbd97f951526ba9e019f34d9b4962f38724cb02b1fc6c7dd692cf166704fed8

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\RC8MJNNZ.txt
    Filesize

    598B

    MD5

    3ceb82065350d3321665f09420223fa7

    SHA1

    f59ede25c43173a574fe92ffe47a28d7baac3c0a

    SHA256

    caa947bb9af2b07bce92bd24f1dcb6fcdb12f5f682d6744a0dcf675d8ec05c83

    SHA512

    7da0588b3fdb0d6b0867ece9d47a73e1c6614c861db9cf3e91f9b7472e3111632700bae94a06f59818634caf6d38dd6eaf343ae6a3b4e5303978c265ee382c57

  • memory/832-54-0x0000000075091000-0x0000000075093000-memory.dmp
    Filesize

    8KB