Analysis

  • max time kernel
    134s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    19/08/2023, 16:23

General

  • Target

    PDFPatcher.1.0.0.4105/PDFPatcher.exe.xml

  • Size

    174B

  • MD5

    c91992beb0d5b85ad68dacdc99c65b12

  • SHA1

    fd4ffb46cbe78dda3abead72597dea8b36ce3ec0

  • SHA256

    dd18c327aea508becdb360c4ee706fa710c7f46d79737254164280d92b32e542

  • SHA512

    2abdd03091490f71a422e39ef8b50ce2dcc2105c820b213f2a17d3fc5adf34a116fe06cc76dd87271284488254ebcf3cd668dadbf2e9ab0ff5eb8e14b6472625

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\PDFPatcher.1.0.0.4105\PDFPatcher.exe.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2792
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2052
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2212
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2212 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:3012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f88ca2547768b8d07e4e874a5bf9e427

    SHA1

    c521e059f423ab2e6f42ccd54f9e7775118021e7

    SHA256

    90e5fdb9fd218c17000e3bb89e767c00c22bf9bea0d864b0ac68a05139786d7f

    SHA512

    1492cdfc4e215a475d905a43fd05cddb783c92e57730e89606e07f07bd84bc5cd761f7a6b56904a01223fff73b297ccf03cb2892951d4b48f7eeac9fbd0ed542

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    55d9983ce6f9981a756a1c042f49fd52

    SHA1

    29067156d8e5fba1f187ed308445d1f396601df5

    SHA256

    6d6bb909ee71057dc7e74dda1b81391ee0f8c4eeb83db0b0af789d1a3d0f3931

    SHA512

    67e00df9bb509518960c84aa2644511699fa5536fe3a98d05f93761177da699e638fd108f211f8b256f681e0ebfd03773a02d76a93b753773747aaacd916b133

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    66ef463c5fc72f0420f8b114e64f9de3

    SHA1

    13ea3bdb2b02cca63ba0f219a1476ea2266f343e

    SHA256

    cf0e09acfe96d4a5c64e8622b405e4558f060344859e6092de1fa4d0030e7664

    SHA512

    d8d84a7d88fe96cfd15f1ce4730f09106e882a73846a8b33a92ff74a98b966d9e71be818a826be315c71c23db025686b25384c9ad2942328067b69206c1828b3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6a323dc73e76ae69d7e6bceca4609f7b

    SHA1

    1435090d1df052a3977c8cceebb31a8c90ccb4e7

    SHA256

    930b14b97770bf26be541720e54b045f83a8f7c0cdc7642023841b633a74c689

    SHA512

    266c248c731d16f80d4c91d2f5aee7ca6479273c4adf799341f94b6ffbb04004bb2fc075502c3c1b64daf423dab92e983b8d5c7f5c9c153a900d49e2f404ad9a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    82cc94a817bdf4e7ad6c8896282bd0ee

    SHA1

    536475cba9e73050bb5d893a93be207b006e827f

    SHA256

    63850166e0558d17757366404ff93961b1f32b46f0d0aa66f8cb3e7c2ef017dc

    SHA512

    5be0a1c603e668cb5ea5ee7a3fa99f860aeff95e66ee0498119de44b2d2276251fd1d360dd63bb3e85c06e508fdc247b2812d3d688fedf70c5c20d4e456f2b06

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    60381866dddfb1008dbc579394664c46

    SHA1

    52dbf35cb829f26d1ceded69b748a478737d6ece

    SHA256

    5bbc56e342cd8366852fc4b6904c764cc1b8d4fb1d23a07b81f61752ce2971df

    SHA512

    d34d478c0383012b5c8f7cf3db3d7e22b4a5d7e4d441ecfeb1359a0323936ab56febaea6739449d4ef44435fb30b25271f2bb692e7d6a83eb801a506349e53bc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3f9a94337372bf5da396dd11f8fcce91

    SHA1

    0008ff5a89ba78c43f599da54da583acb03b055d

    SHA256

    9e69a777642776d324c76f6dd10c53c0f0b577cae1447310ba7f4edc6f365d7f

    SHA512

    244fe23d49285c8637317878ae2dc8bc7edc1549ed95d15bb1f80593df8a3afd47c2faff493ae0d8121cf15f204dd0841f6bb15ae616df297d84f0098613f19c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    45dc1cca14d1ea4ef7bf8aa7fc43bf02

    SHA1

    963ccb58fa501b7a83f81363f66eff82e1f52e0e

    SHA256

    59584d8223230f5aff132946f7aa7eb7caa2dac8ebc439d02d3d6de1ad4963a4

    SHA512

    26b97323794c074e17d89a35bbe1dfdd9bbf81f592551773ba97134e9ebb831e9e9d7e57c5509d80d7018e05b1cdc2a3a7c4162db1f588771c7e2b23cf8be354

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    80730365858bbd45b6a26de9bbc249bc

    SHA1

    9db699222cd5b050a7fe03f1ea96da189c770b83

    SHA256

    360654acb8e8a5baa3c4f490121f51164abfec9286a6df4b88f8a7cc4e47c465

    SHA512

    bc8f5ccedb2becb25c7e6d04f033e309b4da923e93149c235a7a354f1fb8bef88dec0630a31bc8a9f8268a9360e2e19606ff8a4fcef9d2852bd161f601d4d133

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    00b7d4c074e7cf0fb1d8d3cecef56b5c

    SHA1

    3e3d327404bdcd6885669353a7e6c2b081112e0f

    SHA256

    04aa983e4a3ca85c04b0850e12de674989bfaa66bcdc61d532c9588c9c14c295

    SHA512

    9b2225e89e1efb912bebf94141c0e3c0ed69aa606c14c4730a3b8931abee9c3a6ddcab615085a0daa2910b0e1c6d54a5dd40e4cd0119c5281e3725a151bf1614

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f4b60546c940779f3ab1616b0dc39ab2

    SHA1

    1c89e13417c4ff5736cdc32b603e59de3593919e

    SHA256

    6af5fe8bad30f76495a5e4d923f5960b70fb25326ce26dacd54460eba7af38d3

    SHA512

    98bcc5d980e456d3fed266345b6f0c8cb6bf08b6cd051e43fe03d4d94f2caa8b368457a1edaca43ea88f643fb219cc7f4dabaa8049a395d6e7c69959ec411459

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8776715e31edbcaf89393369a2d0bd12

    SHA1

    0fedc4cba262b2b894cf3a4c61f3513d3f50ce40

    SHA256

    27ff37b77ae23535876b80585067e551d1c6823d48eb92294d40cbe8de2862f1

    SHA512

    e26065fc314e0c7bd1915917ac926357ed6253976ee440464cc620fc1976a55ebe3888d3622f24c9a570b8fee2e35e5c52b3fa73cf6cf6ef5b4e4f30081cc3d9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8485e6df8fe2ec20016accc6ae224803

    SHA1

    6a6e8d52261598a080ee93bb9bb37ac3ebfc3620

    SHA256

    d84e5cae96cedc3b94e5d13a9b5c694db8e0991938040c3622ddfc04a7fbe7f1

    SHA512

    cdd36194303b68b19767832cee0a5e9fec64b55b71155b47218b4bca7d4dd2ac9ebdb04608de2158e8fa727c00f5708f149bb2d020ad6ae8f5f734ea0b03b18e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    da5122aa105d25d7acf247805826f6d9

    SHA1

    cb1dafb3bf60fc440dc5dd88b4784dd37a87b68a

    SHA256

    1d8da79b536634cf0f6cc09d0c80fde7bc16dc1598a5458120473a72ace367e4

    SHA512

    53e0d36309deefe86b28946b34e2fe0970bd70681c13817112ac4554c48493da4d02b2638c4067546c77f033999232eeab8cc9de6d5c554ecafa45bea84f1b36

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5188579d42c79b88c87c2f91b2e8bb30

    SHA1

    616cd0e27bdf7674078d893f5ab731e71aef7485

    SHA256

    f7505e48b5c8eba43355ea66e2b2088eb82324ea44110bbae55ec5413bb169d3

    SHA512

    e094d91a8b1cd6187130e7b5b55aabd58df845836235e8d0fd67f0966b0c4127b4fefa90b01833e20a0a4d4b15cb8fec40cc6429630895284b07be5e81f61c4b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e47cf759e4a48b211594782e292e9d13

    SHA1

    3172d165004e5afe5d88bb24f45ae24126b89e3c

    SHA256

    bb603f2caae2408509f67fbf4ca03e19225968f5dd0387e39f2cbc2cd8d89c79

    SHA512

    af048823800c1b1327d10778ddc5f04325bd1ef900ca6cb94ea17fa9bc00451f2c61f0882034df6cf2075e53fe4ce53cb94fa72b889016c612eeca858596ab10

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2b94b48de80f7b96f9414f837c2b6ed9

    SHA1

    c981d4dbc551a8adc462b386b7d7e46534065ffb

    SHA256

    cfec9a165ebf1f2534f1d45d95a726e52486dc453e411d95b5af2d9c6ea61d04

    SHA512

    781ad31c7a2d1c893112b78d5e1fb88d747970a1e88af40f27d9c4f04e4220af6783ba8186fbc2b4b1284cd9214fe64854eed9b0f914074be3a393b550c26bb5

  • C:\Users\Admin\AppData\Local\Temp\Cab99A3.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Tar9AB0.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27