Analysis
-
max time kernel
137s -
max time network
168s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
09/02/2023, 12:47
Behavioral task
behavioral1
Sample
Citadele1018.pdf
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Citadele1018.pdf
Resource
win10v2004-20221111-en
General
-
Target
Citadele1018.pdf
-
Size
72KB
-
MD5
4e9a48842158e4e906a737b3d388ed09
-
SHA1
b5f1d62457154f4acb224e27266b74cb1c739784
-
SHA256
f5765fc7ebec73760b00ed087dcb2e7dd91700ef13889b537cfb35dca73c03b7
-
SHA512
1daf2cdddafb52b1b59e3460223fd5ab2fc1a61f6524e5711a5d6cc47cd64b0dcd1e2f62cc78f6f51fc2dd40880b36d73380800729d51b812cd3cce89940a8cc
-
SSDEEP
1536:0Gd7qHFtOKZipQCTZ89YTVexztdT1pI0MLQF2C/hyli:1d7ibOkipQCTZ8mTVojT14VC/hf
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E694FF31-A880-11ED-8CB6-56A236AC5043} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "382715687" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1085bfec8d3cd901 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000256ed27e8919d04f83812f84ee5c95da00000000020000000000106600000001000020000000a17783f429ad47489d5fe25c8597ea9252fbe908f7cd75820819faebff046afc000000000e80000000020000200000005b37e99d5682e18edb53e5d51dc1d2e752573a1fe82d315900912dbccb82818f200000008450f9bd420166e659a1dca697b8426e81567491fba7fda668eadcb706b2e40a400000008e0f0f8d9e56c74fb5e8429def4efdbb09358883d524c824b76916476f58abf56b2853f19aa989bc30be1da44e52838eb3e09c406a6f38b04c95b1800974138e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2004 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1248 iexplore.exe 1160 msdt.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2004 AcroRd32.exe 2004 AcroRd32.exe 2004 AcroRd32.exe 2004 AcroRd32.exe 1248 iexplore.exe 1248 iexplore.exe 1972 IEXPLORE.EXE 1972 IEXPLORE.EXE 1972 IEXPLORE.EXE 1972 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2004 wrote to memory of 1248 2004 AcroRd32.exe 28 PID 2004 wrote to memory of 1248 2004 AcroRd32.exe 28 PID 2004 wrote to memory of 1248 2004 AcroRd32.exe 28 PID 2004 wrote to memory of 1248 2004 AcroRd32.exe 28 PID 1248 wrote to memory of 1972 1248 iexplore.exe 30 PID 1248 wrote to memory of 1972 1248 iexplore.exe 30 PID 1248 wrote to memory of 1972 1248 iexplore.exe 30 PID 1248 wrote to memory of 1972 1248 iexplore.exe 30 PID 1972 wrote to memory of 1160 1972 IEXPLORE.EXE 32 PID 1972 wrote to memory of 1160 1972 IEXPLORE.EXE 32 PID 1972 wrote to memory of 1160 1972 IEXPLORE.EXE 32 PID 1972 wrote to memory of 1160 1972 IEXPLORE.EXE 32
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Citadele1018.pdf"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://portaldoaluno.visaoportal.com.br/.well-known/pki-validation/z/aspx.php2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1248 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\msdt.exe-modal 65982 -skip TRUE -path C:\Windows\diagnostics\system\networking -af C:\Users\Admin\AppData\Local\Temp\NDF2149.tmp -ep NetworkDiagnosticsWeb4⤵
- Suspicious use of FindShellTrayWindow
PID:1160
-
-
-
-
C:\Windows\SysWOW64\sdiagnhost.exeC:\Windows\SysWOW64\sdiagnhost.exe -Embedding1⤵PID:1548
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5115f68a14061832d7ac7e1a997834789
SHA1ddfbbb34bca36d1e1b1667585cd9689144a01402
SHA25633000d2878168b14a21ac0ed6f24f784537dc3189e8b98dcf0d92e6af2450f7e
SHA512bcb4aeaef4d3657f08c7a1fac54f7e3a75e1b1b91d8d2d3e1a515aa0de45367a0abfc909956584df3094d9984b0d0f7c1ce42d19c46540a9178caa32fe032715
-
Filesize
3KB
MD54423a9556e457494c87c4911d5e75c71
SHA1ce5a38ae50ab8de73ebb52415239bcf14eefff23
SHA256d552c0c354bde01ec3f3e3f853bc4e6685a495d79efe539e865c7e1c9018b588
SHA5128dc1c3aa073159fc6006a79318c348da3eeff0d30ac11499c19f3d7bb4f6ff8b1614bcaad6b8ee366987a1807739d962f9056a6f486d6cef37cf592715b5a3ed
-
Filesize
605B
MD50d11d2e47d0c80eeaf0f0d8870d9583d
SHA161acc8b75ce9a472a390186cf5af77034c28af40
SHA256325e60eda094e2f54d3e48399e69273e9fe6af717d675914f7df56e42309e44b
SHA5127f38012ea1ee05abaede1098aa7d0c8b31fca625286ff76673dedb0e861f623a54569ef7893f049bc82a4970512e3431cd070fc52658142ae11929f2e4b275b1
-
Filesize
23KB
MD51d192ce36953dbb7dc7ee0d04c57ad8d
SHA17008e759cb47bf74a4ea4cd911de158ef00ace84
SHA256935a231924ae5d4a017b0c99d4a5f3904ef280cea4b3f727d365283e26e8a756
SHA512e864ac74e9425a6c7f1be2bbc87df9423408e16429cb61fa1de8875356226293aa07558b2fafdd5d0597254474204f5ba181f4e96c2bc754f1f414748f80a129
-
Filesize
52KB
MD52f7c3db0c268cf1cf506fe6e8aecb8a0
SHA1fb35af6b329d60b0ec92e24230eafc8e12b0a9f9
SHA256886a625f71e0c35e5722423ed3aa0f5bff8d120356578ab81a64de2ab73d47f3
SHA512322f2b1404a59ee86c492b58d56b8a6ed6ebc9b844a8c38b7bb0b0675234a3d5cfc9f1d08c38c218070e60ce949aa5322de7a2f87f952e8e653d0ca34ff0de45
-
Filesize
2KB
MD50c75ae5e75c3e181d13768909c8240ba
SHA1288403fc4bedaacebccf4f74d3073f082ef70eb9
SHA256de5c231c645d3ae1e13694284997721509f5de64ee5c96c966cdfda9e294db3f
SHA5128fc944515f41a837c61a6c4e5181ca273607a89e48fbf86cf8eb8db837aed095aa04fc3043029c3b5cb3710d59abfd86f086ac198200f634bfb1a5dd0823406b
-
Filesize
5KB
MD5dc9be0fdf9a4e01693cfb7d8a0d49054
SHA174730fd9c9bd4537fd9a353fe4eafce9fcc105e6
SHA256944186cd57d6adc23a9c28fc271ed92dd56efd6f3bb7c9826f7208ea1a1db440
SHA51292ad96fa6b221882a481b36ff2b7114539eb65be46ee9e3139e45b72da80aac49174155483cba6254b10fff31f0119f07cbc529b1b69c45234c7bb61766aad66