Analysis

  • max time kernel
    67s
  • max time network
    68s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    17-05-2024 17:34

General

  • Target

    analisis.pdf

  • Size

    212KB

  • MD5

    f28baa94ff32d8a4b006004b3c9c4261

  • SHA1

    54677341b7e233d8c0b6dcd38dc5e9d1a58511ef

  • SHA256

    cc48d8c645c27dd850652c0a66e22dd2e1b62bbf6ad208f94b8f5847684a8d17

  • SHA512

    853dc19d16e4387210e63b3de74c044db802e429bf12d082e00b66f127bb64e742cad32e2b1f23661a11cb47341d7b34e249533b2fb15a3815ed81b677f64989

  • SSDEEP

    3072:cyu1+HubW8lW1Sn6WEQKLy0jSaMWyAKCxxDghhiR9j4BIIADNI63Cv3UOLn5ZVv1:cyu1PdWEHEQlWyA/7am9kBAJIECvv5bd

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 47 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\analisis.pdf"
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2416
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /Q /C %HOMEDRIVE%&cd %HOMEPATH%&(if exist "Desktop\informe_payload.pdf" (cd "Desktop"))&(if exist "My Documents\informe_payload.pdf" (cd "My Documents"))&(if exist "Documents\informe_payload.pdf" (cd "Documents"))&(if exist "Escritorio\informe_payload.pdf" (cd "Escritorio"))&(if exist "Mis Documentos\informe_payload.pdf" (cd "Mis Documentos"))&(start informe_payload.pdf) To view the encrypted content please tick the "Do not show this message again" box and press Open.
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2796
      • \??\c:\Users\Admin\Desktop\informe_payload.pdf
        informe_payload.pdf
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2572
        • C:\windows\winlogon.exe
          "C:\windows\winlogon.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          PID:2244
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
    1⤵
      PID:2624
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe"
      1⤵
        PID:2756
      • C:\Users\Admin\Desktop\informe_payload.exe
        "C:\Users\Admin\Desktop\informe_payload.exe"
        1⤵
        • Executes dropped EXE
        PID:2412

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Persistence

      Boot or Logon Autostart Execution

      1
      T1547

      Registry Run Keys / Startup Folder

      1
      T1547.001

      Privilege Escalation

      Boot or Logon Autostart Execution

      1
      T1547

      Registry Run Keys / Startup Folder

      1
      T1547.001

      Defense Evasion

      Modify Registry

      1
      T1112

      Discovery

      System Information Discovery

      1
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents
        Filesize

        3KB

        MD5

        6e4d3ad22d72101578d79e9d30f2a63f

        SHA1

        e94c1d61dddf0c447f9f0537c9433832a1b09560

        SHA256

        dbc9282d5aee52330f6d6d4e3e8aba02366ffcac87f231d90b284f871e4a9bc2

        SHA512

        e26a370a7c03256d9f1b716987e6def0784c888fdd53c0fdbe26467d8fe80909e55b8592396ea36ccc35f84fd6c69e42e1e8254b70e778e287343323bd69a910

      • C:\Users\Admin\Desktop\informe_payload.pdf
        Filesize

        32KB

        MD5

        8606faa60b008da0ce43437dc81be1e2

        SHA1

        13444f825362a6a946b3a91b13784d78fe3fc422

        SHA256

        4de3dde86d66424d79fcb561ace579d6b22919f52505aa177bd161bcf4157c4f

        SHA512

        e23e310399baf03034b51f1be445ea01a6ef2ec4f82da43af6c4639dc28834d49119ddb83f40019ff6c9b45124da637d579ef5289620a13a7078284c7fead33b

      • memory/2244-32-0x0000000000400000-0x000000000040D000-memory.dmp
        Filesize

        52KB

      • memory/2244-34-0x0000000000400000-0x000000000040D000-memory.dmp
        Filesize

        52KB

      • memory/2412-36-0x0000000000400000-0x000000000040D000-memory.dmp
        Filesize

        52KB

      • memory/2416-0-0x0000000004160000-0x0000000004162000-memory.dmp
        Filesize

        8KB

      • memory/2572-28-0x0000000000400000-0x000000000040D000-memory.dmp
        Filesize

        52KB