Analysis
-
max time kernel
146s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03/07/2024, 20:49
Behavioral task
behavioral1
Sample
Kalb Edgar PM.pdf
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Kalb Edgar PM.pdf
Resource
win10v2004-20240611-en
General
-
Target
Kalb Edgar PM.pdf
-
Size
626KB
-
MD5
0adf70523b2c8d75538f5ccda3c9b898
-
SHA1
e3f39f6b75b6cc2917d060e095b08b1c17148c20
-
SHA256
9f7b647932a7c58819b1e8129377b23b64cb28b10c94caf2cb98bd43698ec1ab
-
SHA512
e907652b37ce319b12747d3465195b5fc64085f511fb70fa54428ce46a491141221cfbeb5bd9405a133b99bbf3d7e5318f246e19ea34c741d5e135c9d76c42e1
-
SSDEEP
12288:5NVdLthQZ055hZ9b0Gim30sywNrxiJPTV9eTap1mGn9ZJJJJJJJJJJJJJJJ4X2JX:5NVdLthT55f9KSyklilPeTaPJJJJJJJh
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1314E631-397E-11EF-B238-4AE872E97954} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000e241ab7b3db16489dcb5783c462c55d00000000020000000000106600000001000020000000f9d8e897e534fabd769bf475eee2cf3e036600692861e6960b3758ddf374a2c5000000000e8000000002000020000000f38005a894c7bbfae32527219940d117173e32864f152861985d45093a888db820000000fdd107f6a711de8fab8e8537b3a13ff5889b2454ea6497cde54af6279afe51c14000000049f7e7d0117c95f5cd544c249eee19a072db9c3f7e1448a6e0bab303b282079f896b21beda0e470d3c078e89e9a2be1d4ff8305436fb95ce8c100996a627c50e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50812cd78acdda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1848 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2360 iexplore.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 1848 AcroRd32.exe 1848 AcroRd32.exe 1848 AcroRd32.exe 1848 AcroRd32.exe 2360 iexplore.exe 2360 iexplore.exe 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2360 iexplore.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1848 wrote to memory of 2360 1848 AcroRd32.exe 30 PID 1848 wrote to memory of 2360 1848 AcroRd32.exe 30 PID 1848 wrote to memory of 2360 1848 AcroRd32.exe 30 PID 1848 wrote to memory of 2360 1848 AcroRd32.exe 30 PID 2360 wrote to memory of 2336 2360 iexplore.exe 32 PID 2360 wrote to memory of 2336 2360 iexplore.exe 32 PID 2360 wrote to memory of 2336 2360 iexplore.exe 32 PID 2360 wrote to memory of 2336 2360 iexplore.exe 32
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Kalb Edgar PM.pdf"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.linkedin.com/in/edgar-kalb-78aa6920/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2360 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2336
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5902b2649960caade0f1af5891941ad8e
SHA1e3507d4ce6062c2ae5811b872fd00b9a07d56bfb
SHA25633ba018e9e70c30c1d7c7ad3afcd68cb17f25595bcf8671e52e1d491adf9178a
SHA512440b6b13f87a1850e74406464bb60aecb122a9c0c1491cf38fae011ab697daf800373acf4633a09b3d11929b28eae1ebb6f29a929943409b4693a3e721d587b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c1c51811b5603fb309e6151daec69a2
SHA155c0da49d31413326697616559641f345da99a02
SHA25691de9dbfb02de87b118265bc9248983cf98b91002b496f659b1a15432c53d768
SHA51237a5b1757d577d9ba0e588deadfbd312af5ec0b279e3e5034d5d1da43926222c07dfb20620734c34e863d8b9ca7e96ff481cea38b64785b387964101f7a531d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589cc4986e3ebd5b1ab9311650e0ea20d
SHA11793ffa5f5e609a87106fa7401d763b7a6ec9d0d
SHA25675e5fdd3d071096cb50e0fdc8925ab2c4e56c874c3abe053e0d59fcf12d2083f
SHA51213766d87ba6bed6dbab01492954c09da6527d25625dfe6f999fa6a561947eb6875a89aa394a06f306a1af373d7b38a6463f6dec864f8ff6619c6d3a6b1762007
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f69918c6c9f5b50e61b3da9cf565f2d
SHA1c6c8cc9bae2e8cabe76115ce73f8386473d55616
SHA2568cc1c9de4ef7f079cb1d6094d6a215f063fd6b5807760ddc5b8c326f95d76926
SHA512ec8cf4c523dc7bcca68513f26ecbb2b288d0a4c2a68277a81feb64fb2358792820580ce495c57dfeaa0703ea31c958d627dd1defc8b780fd6f6a327f48d694f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d1ff3cbbf130b499c0e530a8843078d
SHA107c00ceb25139514c59d2d2b67c613429d71a370
SHA2563e38d780534bc957908c2b32b6579451e3c073dd72b470c6b9bc241f3c0aa1a4
SHA5129ec23c259a151f0a99289f30bd36b583cc1924d3ab6aa00994b854aa4002ee2af8c2e1a279ff6b6b4c1d15007b7e9cb30533e4ce68d027784498e8ed671589cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a587300d5651fa63814961fb5a15250
SHA1d99cf6e71cad90e6297968f7eb7ac92c38c09353
SHA256b60bb06c9f66b48d7a724964c3ad864deee0e75637f3281e79ae9b46cda74eea
SHA512a3e8d4de265d7c7e484e38200c8b742168d294adb1fcc955fccd7a8f37f21c88858bc27d3abff57d44e4158a0a1cbd019408df70da16111f17e1c476b7d39072
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4bb83c073baa7184628815a3d74fb24
SHA1b2f5406349688179a3bb15ebec3d0e48d10b9c4e
SHA256abad88799ff598ee8500c916cb7d3fc5be8f1399a09e97cbc0f18d52862e3567
SHA512b13acdde86d8a385277fa44a08bd9d4e3fbdabbfb2c30231263e07ec98fc0f99c997ed979a48b16606a59c023652d73cf89a34d9798cc7236142a5e359898d6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ecedd297052e42ca39bfdff93048d69d
SHA12f14033684ea6080b397ede0ff570e3b69054f32
SHA25664fb27c76586b53d65e3e3b6469181f8faf22cfafca8b1a058f81833f71c270c
SHA5120e7fff10810eea5c0edada609c00145570699b3a4e60f0a2ec1fc72321f1e2d2c82fb877d51a2652118230e85322cece92edbee4bf557ec411e4175b6855f217
-
Filesize
24KB
MD5c20b745b7507a787c0c15af303aa357d
SHA1c4387055a9c95589f850af6bd93c0b375e7c5c6b
SHA256a861a1971763d47b80e02889b53f62ae3dbfd7388b211424fe513d44ac591b1c
SHA5124b3601c5179483e9bda5ff0c4c75a8336f31f9df446299b6f568bc14394ee938e598edeabae9a058266400b786376a773033a35337ad01bbc1840bd93d0f8eaa
-
Filesize
49KB
MD58b83e07b51c6b11ae8c5a455afc4f218
SHA173ead09db3a768e810033ce3903bba9589f050be
SHA25610931e8e3894bbe85b3c7071385ba605c3a937378cf5219f8c0301b1809fa59c
SHA51284f35bd96c322db1f15f91a35a2c69ad4342bcae8a9e8b14eb42066ea5b0529d2e40b0274b775b3ff6562b3afd8ad8368fc2251b80f4f9b7c2f2daf9decc74bb
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EDQW9R5V\favicon[1].ico
Filesize24KB
MD5b2ccd167c908a44e1dd69df79382286a
SHA1d9349f1bdcf3c1556cd77ae1f0029475596342aa
SHA25619b079c09197fba68d021fa3ba394ec91703909ffd237efa3eb9a2bca13148ec
SHA512a95feb4454f74d54157e69d1491836655f2fee7991f0f258587e80014f11e2898d466a6d57a574f59f6e155872218829a1a3dc1ad5f078b486e594e08f5a6f8d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
3KB
MD5428da0954a3848bee941a9d47c427b9c
SHA12aaf88e6fe971d691cf407bef173a1007430b3b7
SHA2563110b11136b673c0d05e885cf5f4f7cc4a4e64868c862bf834d05ea5241cf8c9
SHA51266984cf9422b1452c23550bec617a412b26a77796f9b5002bdc8bb5fac3a12a1b06e77c731bdb20e42fe45e23412cad14cde7e35067388f8c987883db43b57f9