Resubmissions

21-12-2022 08:26

221221-kbzlnsfa4y 6

21-12-2022 08:24

221221-ka6ctsfa4x 6

21-12-2022 08:09

221221-j16kvabh56 8

Analysis

  • max time kernel
    122s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20221111-de
  • resource tags

    arch:x64arch:x86image:win7-20221111-delocale:de-deos:windows7-x64systemwindows
  • submitted
    21-12-2022 08:26

General

  • Target

    Secure-invoice0212127370.pdf

  • Size

    709KB

  • MD5

    7387e5500468b797c0c4d0a9758348a6

  • SHA1

    ad0b0599a79ada31406364afb3a149d638f0d655

  • SHA256

    a65e1062954d0131389e3afc0a13d9992bc323442ed75137e4b7218f81089b80

  • SHA512

    478097d3929ecf069fc535e8ba90a66767fe986af2feff76b7e2259b059f703c08da90a4593d07d2b8a01c14627029de94f607e93c299298811064677c48a25b

  • SSDEEP

    12288:soC2gwsM24pGnDgE5SUZDYjiHNFZAencwTmor04yDUmwg0wMNSB1yjRDtSjRDAjW:soCXwskInz5UjiKecuDr0rKgoE6xtex3

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Secure-invoice0212127370.pdf"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1260
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://indd.adobe.com/view/ba067647-1eb9-4a79-a740-2fc1b1963f2e
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1508
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1508 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1824

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d5fb84757cdc4c25cc04d6f6071c15d0

    SHA1

    01c4d9f6403985eedf62d46db455abfe451a675b

    SHA256

    02b746488d0e5c13f4541067c8c90d3f75f846236f274dec1ab51184eb00a8cd

    SHA512

    fde83844d0b2804e5f5074d012485fe3f969bd3a53b1514a393dda882c3b9f4071e2241ddd12d177a7f54b85e82ea01c1b02f3fc91306edbd5e2a0e2dbce8eb4

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\mlf2v8h\imagestore.dat

    Filesize

    24KB

    MD5

    4d6c3a0e3f1eb41ad27fc1adf981b261

    SHA1

    4c597ee8c2a7101656f8aca4414c4ea2151dc6af

    SHA256

    547b1cba9adc6de00e9ada0ef8ea26282dea5c5ccde161746a6a64fe595bfa83

    SHA512

    1739ec9cb07853ba15253d516922b99332ec174ec4c700c31033951ed6e577af4e152dfa38c242f61ec33c4cfe74a9b3655c8538faa62599b7075ee635ebbe77

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\SXGNCOE8.txt

    Filesize

    608B

    MD5

    8a74eb0fbb6e2dfadac976dea3ca4c38

    SHA1

    2c7a1285cd5facce2bef8807e1be2f36e944d1a9

    SHA256

    dc326345fa651ba4e4a41302e33031850070069f5eb66fde69ff3eed8373656d

    SHA512

    e8ed6baf7eefc185a3be3d4dabf94e7d59671f30feac031ec33ca2f0148deed82f4aebd855fe581859e065ae9ef608603b74f1ea6972e834029299bfc9ab6d6a

  • memory/1260-54-0x0000000075AB1000-0x0000000075AB3000-memory.dmp

    Filesize

    8KB