Analysis

  • max time kernel
    120s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 06:46

General

  • Target

    RFQ-7381 Offer No. 202419638.pdf

  • Size

    24KB

  • MD5

    c4c47a8c5badb2c1a2a23942f45eaac0

  • SHA1

    e6ee99a18df3abfe62f2387426ab9a00f19646c8

  • SHA256

    0acbfc24ab25784a0b6ee1e438e6cfd13647de9d564eec52b59a47731b1f748c

  • SHA512

    9cbe8d5e7c3c9b26a9569578143997197a3a73398c8d36fd8d10539a5f3d73f758741b57f3a1848312dd54c3660e26bcf68354a0f887aedf1b67ec9c21117a15

  • SSDEEP

    768:5Ab4CCU29fuh+0BIcmNk32ska+oH1586x:2b4DbJmIc9bR

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\RFQ-7381 Offer No. 202419638.pdf"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2188
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://tikawsi.com/RFQ-7381%20Offer%20No.%20202419638.zip
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3020
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3020 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2888

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3b3d5be365f2ab1c888b2d17e0fcdb28

    SHA1

    2cbf46e436f65dfe8d2ff7410debdf4743194a54

    SHA256

    2515bf11510b2a04a49921efb7180cc7e8a85c691cb6c90e4107a19a7ec3accc

    SHA512

    a8b393f40ec0b8acc0b69bd98cb7c90669175fc7172cbefed1a1443e12a9309a65674f182bd7bcaa66621df4db29c0e3d8a9828e8607a4f302d157dc04b2fd37

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    53e92ccb2b7453e0f5c2a9f3aa43af7c

    SHA1

    fcfebf107f32ab32ee559a329413da4b141369ba

    SHA256

    abcc08c27d62ff12a48e1ee18cdb10bc29839dfa22ee55d449fe0dbde23d3865

    SHA512

    574a0ccaa11508df55d2da91628865e5527d646f143c1c59c9a569f44a4933d1aaa28cd1fb6464158a30005e056c4fc968a9cf2b0e2b3c197fdc5dcb079fff4d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9b7c317640ef478e9c6f481743f66c78

    SHA1

    f048ca606d7a8a57281c69a5a61ea72e6d0d4a38

    SHA256

    71b099ba0ce6cc87698e53e3723b767eb7ff51159b17b8656bad6574bd4cefa0

    SHA512

    7c5b5b09e1d205b2b092a4234f01d7fcf2ec347ac3e606a7ff45f6ba6bf92fe0e5d09b392ebc5d542ade8ff1b078862c2b89bde9e4a2c89d3c06065963332579

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    01607b3b4d56b7be506e0313ba6f50bf

    SHA1

    24da1e9ade1553e604a1605aab2bc3eff969b23b

    SHA256

    ec8c2f0aea58d5675101114a029b3737fa173aad4e993eb45b24bf48b35832d8

    SHA512

    d9096886c8ffc440f8e57c8e7d6a875d86b616fa21eff5b745e3a0e8206e413ec7cb476877ec479786608cb33c7ebe0a77b0980857a3d27df930bf09c67fd516

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c65e6e18138eccc2f14193764e477772

    SHA1

    a38650c726882cc320e1994a52e33b906756e2e4

    SHA256

    4c8753f0c89bfb025f8442862692b93a0054b00dd8a600c39541f945a9ff8809

    SHA512

    4bd4108657f7aaa381b4986105b1c09f38698bbc0f3c2b585a66f01439df8773c1a7621097046fd77ab8d93f514e1ad37baeccab500100367f06f3468acbb118

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    349b776bd10f4a41b4ccb37b42044b50

    SHA1

    9aa7a5a499de026d2893287a7a59a8c6678e1e60

    SHA256

    7e196dcab1fc7303d94a4e86577392af523b2f7872459ab18fc551793b873966

    SHA512

    2d98d884d2aedcfa6c166d88250ec8b79c15c5b22a3adda961b61749cbaf8ec02ae1129fe8815589b011eb51b57c046fe08a2fd38bfcf64d3aefe31926da3830

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    98ce19632a4d2cd6bfc0149047432e43

    SHA1

    f0c112c54e13bec0cdc5ff29e2a11938a9d6c7dc

    SHA256

    b58c37e855a36bf890b367ae852d03a42f0f26a543191db7c916cc8bb683d9cc

    SHA512

    f7d859cd5f8135311e0160d4f7e4983cc09b2b0bb390a4a696a0c3abae08faa8b2fb48fc48761f3bd9941718c54049810179dc280cb5a90d329ee8be64163d53

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    42cc47baf92aebe2180fe6b4c65af171

    SHA1

    b58ee7dd93328b3c12f396431aeb1d1b3d3f3e2a

    SHA256

    614d1663675360eec15d64f162327ff45bd3029be7016130ef8bb30bab33830f

    SHA512

    0580df51eb57f01f4dca3def781bad1fe849299da01db4d6ff26b42d80c53fdf7893163f16b92563c44f644b49112de6422a5814c1c6850b46c4eb6b0149ae5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    46a140e7c62b1d30fbc9edccf2325c74

    SHA1

    9f9cc15f71fc40627f6a55de2a1eb7c0b8a50bcc

    SHA256

    88030b5d4b77427516d87463dab7702ab9b68bb013d24efbfb6f0a62a5868617

    SHA512

    30bba6ef4b2f95edc07b0c92cdc8faa4b9256f0a0cc9c8e02c994f9161799f99a91ae6b6f4405b8153b18bfc0d8e0509f86ada2947d6bb71e170f67c1f78a4f3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8918377d8a21efb9882b097cb8c93207

    SHA1

    a59472ec7e15a97c17aa462329734217332bc7c3

    SHA256

    8e6d231be43458e36d3eea8efa383d23611d449cf01b895794253154c8cb48e7

    SHA512

    8add46915f2543a03ab00bfa07415d2aca5f393bc35d2a68c0db4fab775c5e6b53e510ddf072060cc70cce4339f8ca578af0c8b3c5c2b358f5c38268b0969483

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ecfc107c85e4f09e5daad6a1506daffc

    SHA1

    3f8b1d1e1cb8a8f1df32565e478bb4bb389362b4

    SHA256

    8105106a3b2fd5232c019cca38156eb6d758a2c2200e6ed50a1fa5a253e84118

    SHA512

    86ce94c7382ac934910dcbcad18b2d43808303fb38ba986e8466849c1484fe6e8de6f19281ecfa63cf9c4127bce7b257455f9d6f9f7cbf7058c5c7a0fd1d63b7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9ba7fb8ddd8cd5f24d04ccdfc8d11017

    SHA1

    cfcbbee76f6356acf0f90bb90c1357e75e5f0ae7

    SHA256

    b39b0b58262180d2b69747e640742d1628b307e3705d141552ae9592b0a8adf5

    SHA512

    c68cc181c4e2c5f5c7c96a81800b32f2859d130b086b3c57445c121b0237e1cfee8559cae503354180f2ef6b4d3ee213d23884ed00b4a6102247d2faa53a6166

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2a471ea0ea4d2f0eb53c6bc9d9075987

    SHA1

    462dce094925704c9aaddefb01fda74af9ece9db

    SHA256

    c3eb395ba95b0b8dd6505234f57565206cc81bd62869624d4b0fec286bdb127f

    SHA512

    8b75643883b67227f2e256279a0f8465a16db3c66e2b0f82c5c93817d9965c44bfd0308df388537bb8a8041103aabf36c0009a37354947c678857142f3b2ff2a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b275a490163e1a3fb2914f8a12eecba4

    SHA1

    7aed5686708f3c3a56880a0f52b7ecc1e85933a1

    SHA256

    b1f9acb0b7c132c1c42580afd8981b237ea511e23f73634c2d917397b10f49f1

    SHA512

    74ee081ba29720ee4241b87ae9ba02ba5204a6c38a3ead9654414a5dc198a721c35efadf43516f00943b6e8374ac2e95f0c57cbacdea0e5b5aa39a19abe5aa32

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fd1e2fc999b14dc819481618d21d4fc4

    SHA1

    d4b069458b8a95fb940559362c0188814ce36347

    SHA256

    72325d7333123bd02d3dfd1fa3b9a39eebab8dc1206d233d5a64837ae27ab4da

    SHA512

    c009ed6938d7170bf3aee8134847f040c5729eb7ae430727929245aed6dcf984ba440c53b2d7a2d367f97035c24749bb4b28561de4798a5c0e99651e4cd55784

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e2420155dbbe32359df87f8f6a2bf41e

    SHA1

    cf8c5afc29f8629ead3acb389fce64d627f1bf3d

    SHA256

    5ec760b6db8af22c366aa461aab064dbecb8405e68b7dd1e4af356e39b47a5a7

    SHA512

    f51b7d88d32b8435d9af90686c2ffb8d5c78359f954a5951e538465deed7ffc06f438ff959c15c33d587f1d97dd000e5096c6d31e3cdb7d097b1c9f261a8a032

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    296113b699b486cd109fecb44f636dda

    SHA1

    b7fb2ef0f6731853fb34d1c617ab7f8dd6d60cb4

    SHA256

    db00f83e47e7b4b7fa2b939a38a7838861e8a7049fe2b8c74a0de304d6050a9c

    SHA512

    382cfbb7be162063721c62948132b5589beb11b38308845d8b35b1514292b1b8b8bbf787037145f2103fdc73a64d1df630cdf436ffd814eb805714fa532a8668

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e25552a6ee8fc6cbdc729f412ffeb58f

    SHA1

    679b72de4117439ee82b7c8fb860904cdd2ce1d5

    SHA256

    fad659664d8c4c79e1035da9b4e9843924fde41a134916042122b642f4cdb6af

    SHA512

    b8c6c2dc52b7714cc5c967ec6000cb9b7b9ff5ea32722ae3b9aae2769bbe865067d1b3bf4f5880620162dc17731b88a054771c3b65a21817cd9e5b8d143e94d9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6035ed1e6393d3c99addbf6b284ca7cc

    SHA1

    b6eee6de175951c0e034c00e6eb65252032edc1e

    SHA256

    05cac2466dc4d1ae8ca51b54e8b5ecd1c5dd8670a512ace753e7756d1175ad37

    SHA512

    eb9820c5d4529dc077abdc3985f4df641386296732967e1f634e8ddb2852b4e8b651d55d1b640cf05a3eb78e569cceeccaa9dc1712979ca91a08745243f48d8a

  • C:\Users\Admin\AppData\Local\Temp\Cab1F7.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar267.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    408d37e6c41c13ab1abc6ac3c4f0e460

    SHA1

    09b7e2e23b13a1e310caa6f442ee1f687b8ed331

    SHA256

    10f3c915be53b40412cb3093aeb646a77fa694669dbf5a281f5193d5c7047a48

    SHA512

    eee00d6712f8c56282acdff9cd1dc8350037882601a7f4ed15717a60c84ba8f14c5890aabbd646c85b71751574043b48fa08ed82546ba7acac73d5d18ad0b3cc