Analysis
-
max time kernel
118s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 11:59
Behavioral task
behavioral1
Sample
ffe16f397f9e6aed747a1fef03095d1d1a893d8f546a0c52fd55c580de72ee89.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ffe16f397f9e6aed747a1fef03095d1d1a893d8f546a0c52fd55c580de72ee89.pdf
Resource
win10v2004-20241007-en
General
-
Target
ffe16f397f9e6aed747a1fef03095d1d1a893d8f546a0c52fd55c580de72ee89.pdf
-
Size
95KB
-
MD5
c026badd6cce50061e0a46537348e2d1
-
SHA1
122190874cee714bf513543307a1faafce7b916d
-
SHA256
ffe16f397f9e6aed747a1fef03095d1d1a893d8f546a0c52fd55c580de72ee89
-
SHA512
8d070abf946ef0dcb01ab573fbbd96c9c6e6e1ef9f96f96081d21067034124333317aa5459e19a7374698d4bcdc25e65db0f03984e41240d089a15fcf49e62a0
-
SSDEEP
1536:gMDjPPPPPPW+CrxSpYku9iFO2ASHtbcAdI9uC5ZKtejllPa+2szpoG+JXd2aB:TjPPPPPPWfNStpAS5cAou2jniyk7
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f0000000002000000000010660000000100002000000078d93e53683214fb58f58404aa1f0df2873ea11bed51393208e65cbef4e89323000000000e80000000020000200000008167dcaa40371977bd35464da96f5ffe87cbfb95af995ea721e383260524425a20000000b3a2363659ab54eb7e5b5e02d027dd6f2744facc15ff2085c100109447f6a36440000000550ab6c6ad0bdf2ac7b930657b422e52224f9ef23b88f9ea6392dfabc004961dc197492c3238b6ec2f8879ec192ecfd01ac3ca1d7bd8d7f0caaf5c01f2f98b74 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 100efdff0c3cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1B803C71-A800-11EF-8673-F2BBDB1F0DCB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "438352270" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2136 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2372 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2136 AcroRd32.exe 2136 AcroRd32.exe 2136 AcroRd32.exe 2136 AcroRd32.exe 2372 iexplore.exe 2372 iexplore.exe 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2136 wrote to memory of 2372 2136 AcroRd32.exe 30 PID 2136 wrote to memory of 2372 2136 AcroRd32.exe 30 PID 2136 wrote to memory of 2372 2136 AcroRd32.exe 30 PID 2136 wrote to memory of 2372 2136 AcroRd32.exe 30 PID 2372 wrote to memory of 2800 2372 iexplore.exe 31 PID 2372 wrote to memory of 2800 2372 iexplore.exe 31 PID 2372 wrote to memory of 2800 2372 iexplore.exe 31 PID 2372 wrote to memory of 2800 2372 iexplore.exe 31
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\ffe16f397f9e6aed747a1fef03095d1d1a893d8f546a0c52fd55c580de72ee89.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://www.diamat.fr/wp-admin/imgz/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2372 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2800
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5cf61818a456cd23a64995ecc5e6befd5
SHA1d65ae1a0f5dcccdda66d46fb736c70d6e8cf59fb
SHA256d239a3044f2b480fe6876644427cea6ef17f04bef59b2f5418a425fcdf0c76f8
SHA5126845b5d17b6f8554c0cbebc6fdb8b285909c5a5ab07ade76512a33a8360bd9661778c53ba5b33fa5733927327692a819534859083e6df5f07d9c01bf787a132c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57736ca1809ac8e600b05b2ee3bf85e27
SHA158261756976bdf7150c6f0180a9b74cc5202a68b
SHA256880bb41e94597e3a55ac670476892580349d63434d894bde67984b9dc6e3d9ad
SHA5122dd640584bfccda678961b823f8086504e929f07258a5ea342460d045f6c69e60330c7d17310e23238b91998bbb47997a146425a202b5248bcf5f8c9dbdb129c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3d8ff09312c21e211594c66e7adbddd
SHA1557468317c038faa027ad51999d3c9dde555ad1c
SHA256403f1fb76eede9fec1201a826e543152b03e446727a7570db8412462046d819a
SHA512655643e494491d300bf83a8e2f50441f03bb6a67fb37561e68538c6aadbd78311b58f41c5f9869bc7101cdad3d4c969a3bf83b732b142d47d4af5ce502dcc78c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4ea33e3115308693b136258af793253
SHA1002d75e2bfa4c1b8dbd622e7388b600412cec33d
SHA256ce5238f7dc802b31f5837382b070c88d4bbee0689b5c8f6f4e1a149f9941e3c3
SHA5127041a6fb33b47816598a923c1914ba6b59693a73978e2e53e14ea0029103dda4e5c4fbb91eb2e2b4d3d71528c890a6a1bb696b1937197309c154fdf7cc8fbb77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cb057aad55b2c0e0f4496d13e357816
SHA1f059f81a33b7c0651ccb3a35011f417025b3e76d
SHA256b3cfff48ced388d53204b48c8e26f7a56bb56d0a2591f83b2b7df090c274e267
SHA5127781002bbb49b73f12407e5a9c21558e9ea267a6b302cd0bdd61655c6a94aecbc10770d4bd474c330378d6b748892cc74d7037d5ecf410fccc4d1896b5fe94c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588bfffa330130f94b5efa17c7cc675b2
SHA1967f802b91b0ff85397af440a10be1e468a18dc0
SHA256c1f52bdc1870ab13765ba31614144e1c72a1a234b3192910fbe9ce7c218c03fd
SHA512698310db2bd6e8a8b496dcc4de50d0f4e13287e15a494afc41434ae9648718a5fc2091acc0f82bf57a661839e31862a3875ac5faf5161a94cbe805c78d5c4b2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573dd95ea6cf1f9eb7cdc6b26738e07af
SHA17f9bb0e4f2a6a532f09630af3a87e83ec58800ce
SHA256bc2d23442bde973587d0f7b9aff888cf59ed9b5e72e784a33c716128fc3a6ccc
SHA512198c5388566e5d7e50c5cb0ae2d16cee32070d634becb5790dbaa04ffe326c9f59bad502bb96a513fe5a67f53c5b524963bf27f6d8b5e11ab28208efcf657bc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d0e956539e8accd9964cced3f31a314
SHA1a861b3064bd95fff0b2365f2f938ed465a471ca3
SHA25611831cfa68e71bd436076aaef4a45005590e683a4c16ed9448a6ade4d2148173
SHA512850d6f29a82727b23a976b5924aa206949a10d87a72ce0301b3997ce4b9da4cb6345e4456f3510efb76128d75a34b945e89add5293c7b3b375d46b7cba170b71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3cf5097ef4e4fbd7f11ee6b409d1ffb
SHA1b93e61b8e3644fb7f22684a01412daf1538e294f
SHA2568dfebd535048a79e9a4ced4047b42c3957816550407277583e6fcffae33d4bbc
SHA51204028ef14992c3278574372e320ea0aa9255ccbb64cacf2fe842a1e41550883d0803dba6273a2bdb89d041ec7193b8767d71653a1890b509cd085751bea9c5bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520b49619195632da0501a5ae04739b0f
SHA1829da8f082416059929222fc48263557ae0dfef9
SHA256911aa18c6fd86e3e37f824343a64a6b27907e8d041a5cd89b04c0cd89d85c63f
SHA5128c7ab9259e7fa93a747f3068df98548107f6ddbd871e418e0696fa7fd59ffe7f84305897526fa0481289ed84be1716a59480bd47621501ae0496596e98e6b533
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3139f0ffa92d13deb659e5a779dac48
SHA126705afde0b4212272ac35d24c6a8d5c22dc5e23
SHA256ffdd33d820db6cb63552ae5e92b1bcc10e023ceb29bc0818bd7353ce2543bc9f
SHA51253404cd3543e7e33f3f27cc4b5e4ab83eaee74bc571934dfe6113b4477d901e34bdfd3fda34078fdf530945545e975927cbbdc5f9e1fb19a1cb41d83c77124ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522ba30e4801a3435ebac22d1d9d185b1
SHA1917731b7ec1271d2f5204e21717807490d6a2f13
SHA256362808019ffc45fd99722dde3d040f6cc4bcb34eee17b36e676d0896d5171a72
SHA5121ea7d56853399b3fe140a6854952013ace9c94db7ed5ce4e54034ca7d57848467dbf429fbb354045a5d2cd786b4b8afd53fce1012b3bc7453904c544fbeec964
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c51dc0c4b8ee9695364084d23e09b048
SHA1e454e67ce35563bf9e22a5fb32b4630695fb0085
SHA256ec7c3c7ce7f58006d92dd2194540b2d8605826f75097719ef2559fe331ab7226
SHA5123a9862707d82c45a614518d2f2cefa141687f8e567483f06fb0dbf92d2a493dc0857dfa609dc538583923faa138a135ad8d0d055bc1b5c5eccb99850e838b8a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5aa05487b07d3e0154f0c648853a12ced
SHA15a0557380157f81e03c7635fdfb617a42fde8d99
SHA256894a0d92c98497f02133908734a09db1b2002a1957386f21205aac663f12756c
SHA51299e5ce6a9cd62cbab64657a43198ee2b24a543060597e25605559aa9db91a65cfa96e575ee4916b1f18ca262d350bc037cec9dd9d9785eee5d37a26d893b1863
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
3KB
MD55fb719fb905128e6cc4ec5e1f3592f5c
SHA1e951cb977d478f12c9f3c8303d0fb29ee229a6f0
SHA2566ff14f75beb86bc35b29d6156f8c00bef52c4d351d66e89a8971f52005abc36c
SHA512d8d49c54ba157d56d6ab27e2ac63b5427ac996e606b1270ee468bfa2076fa90992c4824937dd994405a5bd7578a6f8fb0fc44999e2879a1b47aa03ace885dcb1