Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/11/2024, 11:12

General

  • Target

    717d1bd6c39e77d5df1880a965a559adbb0245e5e6ef114e5996e8569eb641a1N.pdf

  • Size

    58KB

  • MD5

    467bf335e2fb2df502d459987cb0ac80

  • SHA1

    7f4ab40bef824ef104e37b22e875a82db0913c94

  • SHA256

    717d1bd6c39e77d5df1880a965a559adbb0245e5e6ef114e5996e8569eb641a1

  • SHA512

    f6985da9e003f48abd342b4b943a8b6b3ab56bc91d75f323cfa3df34f365456faa73ef9c072468795f2b2e8a2307ebf7e4199323f2a7d5ec8c417391b55718aa

  • SSDEEP

    1536:TLcUj55OPHjvXoKeScFB0wTZ7/pcZzyDI:TQUF5CDwKeScFBpZaZzyDI

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.0.172:4545

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Metasploit family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 31 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\717d1bd6c39e77d5df1880a965a559adbb0245e5e6ef114e5996e8569eb641a1N.pdf"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2380
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /Q /C %HOMEDRIVE%&cd %HOMEPATH%&(if exist "Desktop\form.pdf" (cd "Desktop"))&(if exist "My Documents\form.pdf" (cd "My Documents"))&(if exist "Documents\form.pdf" (cd "Documents"))&(if exist "Escritorio\form.pdf" (cd "Escritorio"))&(if exist "Mis Documentos\form.pdf" (cd "Mis Documentos"))&(start form.pdf) To view the encrypted content please tick the "Do not show this message again" box and press Open.
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2864
      • \??\c:\Users\Admin\Documents\form.pdf
        form.pdf
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2976

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    d18b1995819a3fa646cc65d5ee6a3fa9

    SHA1

    ccbcc5b332941edbb01a8c058be04818677a795b

    SHA256

    8eaf55d3ee71bcfa318800986827fbffb06d3604d39eebf222e452ca03ba8ed5

    SHA512

    c475b7082a8f0fccefea9a3c6fd0400ee2ac91794f54d5274ddef6b6fca5be11979bd685d5b44ceb6feef4038ad411365bf355b14acded761e549d9df0262926

  • \??\c:\Users\Admin\Documents\form.pdf

    Filesize

    72KB

    MD5

    681073dbdc490e3abc412b115fb1180a

    SHA1

    883222a0ca4ec3878ad79aee8f5ca03da8ad13eb

    SHA256

    059b321e972583822e539f4aa4420d86e0ff512d957522807c1b7ed020f43a99

    SHA512

    03c609077e4cfa0e56aaafcb0b9c71afe1b18a675098d164f7f23faef58cf860f165ddd778754651b7c5b3a828d4c22c208d23c22e7e63bd9a02c8af91ee9d6c