Analysis
-
max time kernel
118s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
14-05-2024 13:17
Behavioral task
behavioral1
Sample
payment copy.pdf
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
payment copy.pdf
Resource
win10v2004-20240508-en
General
-
Target
payment copy.pdf
-
Size
76KB
-
MD5
ac3a8f618810c3680ce24a24252b5252
-
SHA1
658126c5d9a6a7424861c2aee07816ae5498c8c1
-
SHA256
77948e428ad7708bb79e23ec0dd199b4d25bed6c58813b1297eed1cd03251960
-
SHA512
d56a2b6678c88ee311b4189f1811ba14df22c5e536f89f253eaac570113a405057ec7005fc1fad087b01b056a59791693b5a18ecd2f3f24db181c839cf1b791d
-
SSDEEP
1536:yRNRvcJqzv+kafzNQDo8c2hlneYPJMpCJEM1qatanErV6Q7MyNCbbi1XEk:yRkJq5+J8zneQJMpCOZataExMyY3QXL
Malware Config
Signatures
-
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
Processes:
iexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = 30b2ce2001a6da01 iexplore.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421854542" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5DCB1751-11F4-11EF-8547-E6D98B7EB028} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 2172 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2540 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
AcroRd32.exeiexplore.exeIEXPLORE.EXEpid process 2172 AcroRd32.exe 2172 AcroRd32.exe 2540 iexplore.exe 2540 iexplore.exe 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE 2172 AcroRd32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
AcroRd32.exeiexplore.exedescription pid process target process PID 2172 wrote to memory of 2540 2172 AcroRd32.exe iexplore.exe PID 2172 wrote to memory of 2540 2172 AcroRd32.exe iexplore.exe PID 2172 wrote to memory of 2540 2172 AcroRd32.exe iexplore.exe PID 2172 wrote to memory of 2540 2172 AcroRd32.exe iexplore.exe PID 2540 wrote to memory of 2420 2540 iexplore.exe IEXPLORE.EXE PID 2540 wrote to memory of 2420 2540 iexplore.exe IEXPLORE.EXE PID 2540 wrote to memory of 2420 2540 iexplore.exe IEXPLORE.EXE PID 2540 wrote to memory of 2420 2540 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\payment copy.pdf"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://hosting.tempauto.ru/Adobe.rar2⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2540 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCCFilesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCCFilesize
252B
MD584fcb32a7c24e043d6b87c074796916e
SHA1857d37dee8103648b11e57adac4842245db5fcc1
SHA256771b673b117aad3e88f42b39b0b9519a374a90ea8693e3e579ec71bcd27cbb84
SHA512f93a10925df9d6f52768f6b124fb70af3c3c21a264b774648b5309b519a4044d7557954415c560dc77ca7f63e4bfda7ac8105ce435a7025f4d3b9632caa02905
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5037530dd432c3ac287da314854358d68
SHA1d092678ed6bba32d6b86263f2586a1d0be3e2263
SHA256b1514a8f5ce60a0c7a29791d9ed7d0ff6f62fb97d294040885498d08e3ad3315
SHA512de4ed0b59c1d450d1e5d7e19e616aea99bbb9d91d966aff32eb249ac375bdf8e01a1ce0cbe718fe4728f5e6c2c2a7000735fba27ae239afae71fd7db59c817d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51c05fbf23bfc6f2ead790c98151a370a
SHA10f2c51459b34cb3b5757a53b82160a8b931eb7a5
SHA256fa5ff3b67987d86944011068e2f3c19f6b012b74ae68c5132756b3d75e3c89ec
SHA512126c6c2e2a47c7ea134388ae126e2a1aaee19b5f842d3edb447e0ddb86db984ac922937bb06461cc103f235d07f8bd1e8882931531080b36770f7412d733e143
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD50a8512aa43377ec634e9ed743b92d907
SHA1d69f575c85068c40f5da0e3b58caf7e2352648e1
SHA2563eb96148e9277ba2c73dd389d962efcfd9245f2c4348300742144b6b2e7c1cb2
SHA512d288962e11b8c0436cb8113772efb43cfabe98e6398ad3e1e3bf6708a850b23089a3b73cf1a7e468b40758d6d974b0ba8530911f62d292d4809cc894717dacea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5e26a7a6f0edc29ca452f0fde0d3de6d4
SHA1db28a5cfc885989371a69f4cec94745934656223
SHA2568949e29f7a1e4c9eec30c82a24e36c54469eb5e1c5fee03dd94f38179d7195e8
SHA512bb5c7a23efa8f5cd6efea0623627f10bf99a4cfba791188cbea285b99d8e39ba73b4294cdb3ace5786cf6659395dee8e9ef5f4aa81ad072a1b201b06f4127995
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5793ca8133b70c6bfc5d8b524bb593b47
SHA1c484391b1e0a2eb8f86c93a041427b520dfd636b
SHA256cb735a76f4f0c82290ba61985186dfd56ea217a9fa7076225c5ec25bdc94a3cd
SHA512712545096970c68e051577610e876f71c85810ce84c06ad321ea06fb8ad5924af417b2d72d412aa5fff1bc40c7696497fb7f513377a0a4a4ab188d8fa83a590a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD55b5941c48fae50edae3b98544df6f567
SHA1251353cec07232e2a80c4c2017cf418841d00dfb
SHA256c6b49ebe08e4fc561ac3e6c219000bdaa3b47c4e8e98bcd60bf2ee43c5e868a5
SHA51283e8a4fdda6750a059e249b3160e7f765bf4c61cd532e3dd3d488e5a290a49ce4cdabc1180332742f3f2b0c1cb123bf87770d3961640462f8f80201f631bd268
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51105a4879d802918dc146e9f14da376e
SHA1c2bc65407c087778a694b27a09f0603ef1c38c4d
SHA256dd7869e67a3544b1af59556f7fa38a5797b23190779803b5fd085b0ad9d7b26e
SHA512abaf440a950f563fe81246f518a1dd4d0bb77983b3528e2498723f8cf96a1169e1fbd81175c3139e78fddcb4c113c7e89d01ba3d2e40e9a6f73834e92b7d60a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD56ee9b161872f11eeae1526fc7997b315
SHA1b2fdc1f8a67203b7738220d9f5d014965fe42824
SHA2567fca03ebe55576700408370170bcafa85580f107a82e54c10bb2e50f0145729f
SHA51203f340ae41e635473619264f8838febcbb28312d5a0bb274719e165cb870c00abea0d6fdf0ff9b566749f4ff1d4a6e58e842c176616fd14f22b5e0138bbfbc6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD52e3b34618c6c45a1cd9573be72b9e64c
SHA1baf690e650a942e35a55cd5eebab8cc6d03d0f37
SHA2569f612360587c7d7e89cd3a4e07443d1330fd0e033545400b13037ab475177bba
SHA5120ac59d94de444af66fb591729c36db49d21f1cc3f244c32d2fd39a8289c67c2a206285fe8fdbf2f7169e760dc7692b098c871598331930774a432255176ad57e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357Filesize
242B
MD503e4216ed59a6ab2401ec2e62d2dc919
SHA1db85e5e4e0bf9a349ebb5d216862e447430f4856
SHA2566e0577d2d6ebaba1b0cf358e984d7ab33f1d59d45cd1e82902aa5ba892b27668
SHA51279e2ef59ccd3000f2b1d560a2fbaf82b79136ba2f5e217ebdea23039703ab9c187b3a2bb22d821a06c23e419f9d8b12b4fc22201a773fe0b61182c32712b01f9
-
C:\Users\Admin\AppData\Local\Temp\Cab35A3.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\Tar35A2.tmpFilesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
C:\Users\Admin\AppData\Local\Temp\Tar374F.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEventsFilesize
3KB
MD55e6504267d1e6974c34a1bc09154e866
SHA14d4baa67818c17485a22d998414123caf7ad8b75
SHA2563dda26f17c55f0d3cad7130ee1164c10fb1108d55d0c1069efc990f3e8fb917c
SHA512fe981f390f69cb015a126252c0cba160169b03df8924986327fb8c9b46c1f90422738f0ecd2921f8bd343608a9c19318d987ba1c1b8c2167b8b2cd698ba11c67
-
memory/2172-0-0x00000000029E0000-0x0000000002A56000-memory.dmpFilesize
472KB