Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7 -
submitted
30-06-2020 13:31
Static task
static1
Behavioral task
behavioral1
Sample
INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe
Resource
win7
Behavioral task
behavioral2
Sample
INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe
Resource
win10
General
-
Target
INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe
-
Size
223KB
-
MD5
0b89e3e11d64e96a9eb841c297c3e795
-
SHA1
ee91492d04556958af32986a5f235a4c528c9178
-
SHA256
c8fbdfebce02c75b83f14b5706f8b874435c33d48cc868bf046f13fe3dfad98d
-
SHA512
d91acd5c4b45ef6b7f5a6a006c74e067e193bbac6beef17f5c8893fbed0e6f40d3cde335b21f1068a48f5ba6e4164616d568dcab58bb306c18a5fada16aed690
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
adobe.exeadobe.exepid process 1516 adobe.exe 1908 adobe.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
adobe.exepid process 1908 adobe.exe -
Drops file in Program Files directory 2 IoCs
Processes:
adobe.exedescription ioc process File created C:\Program Files\Microsoft DN1\sqlmap.dll adobe.exe File created C:\Program Files\Microsoft DN1\rdpwrap.ini adobe.exe -
Drops startup file 2 IoCs
Processes:
INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\programs.bat INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\programs.bat:start INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe -
NTFS ADS 1 IoCs
Processes:
INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exedescription ioc process File created C:\ProgramData:ApplicationData INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exepowershell.exeadobe.exepowershell.exepid process 608 INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe 608 INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe 1052 powershell.exe 1052 powershell.exe 1516 adobe.exe 1988 powershell.exe 1988 powershell.exe -
Modifies WinLogon 2 TTPs 4 IoCs
Processes:
adobe.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts adobe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList\taxcpId = "0" adobe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\AllowMultipleTSSessions = "1" adobe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList adobe.exe -
Drops file in System32 directory 1 IoCs
Processes:
adobe.exedescription ioc process File created C:\Windows\System32\rfxvmt.dll adobe.exe -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
Processes:
adobe.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\TermService\Parameters\ServiceDll = "%ProgramFiles%\\Microsoft DN1\\sqlmap.dll" adobe.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exepowershell.exeadobe.exepowershell.exeadobe.exedescription pid process Token: SeDebugPrivilege 608 INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe Token: SeDebugPrivilege 1052 powershell.exe Token: SeDebugPrivilege 1516 adobe.exe Token: SeDebugPrivilege 1988 powershell.exe Token: SeDebugPrivilege 1908 adobe.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exeadobe.exedescription pid process target process PID 608 set thread context of 1160 608 INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe PID 1516 set thread context of 1908 1516 adobe.exe adobe.exe -
Suspicious behavior: LoadsDriver 3 IoCs
Processes:
pid process 296 296 296 -
Suspicious use of WriteProcessMemory 50 IoCs
Processes:
INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exeINV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exeadobe.exeadobe.exedescription pid process target process PID 608 wrote to memory of 452 608 INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe schtasks.exe PID 608 wrote to memory of 452 608 INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe schtasks.exe PID 608 wrote to memory of 452 608 INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe schtasks.exe PID 608 wrote to memory of 452 608 INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe schtasks.exe PID 608 wrote to memory of 836 608 INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe PID 608 wrote to memory of 836 608 INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe PID 608 wrote to memory of 836 608 INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe PID 608 wrote to memory of 836 608 INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe PID 608 wrote to memory of 1160 608 INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe PID 608 wrote to memory of 1160 608 INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe PID 608 wrote to memory of 1160 608 INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe PID 608 wrote to memory of 1160 608 INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe PID 608 wrote to memory of 1160 608 INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe PID 608 wrote to memory of 1160 608 INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe PID 608 wrote to memory of 1160 608 INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe PID 608 wrote to memory of 1160 608 INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe PID 608 wrote to memory of 1160 608 INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe PID 608 wrote to memory of 1160 608 INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe PID 608 wrote to memory of 1160 608 INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe PID 608 wrote to memory of 1160 608 INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe PID 1160 wrote to memory of 1052 1160 INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe powershell.exe PID 1160 wrote to memory of 1052 1160 INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe powershell.exe PID 1160 wrote to memory of 1052 1160 INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe powershell.exe PID 1160 wrote to memory of 1052 1160 INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe powershell.exe PID 1160 wrote to memory of 1516 1160 INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe adobe.exe PID 1160 wrote to memory of 1516 1160 INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe adobe.exe PID 1160 wrote to memory of 1516 1160 INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe adobe.exe PID 1160 wrote to memory of 1516 1160 INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe adobe.exe PID 1516 wrote to memory of 1908 1516 adobe.exe adobe.exe PID 1516 wrote to memory of 1908 1516 adobe.exe adobe.exe PID 1516 wrote to memory of 1908 1516 adobe.exe adobe.exe PID 1516 wrote to memory of 1908 1516 adobe.exe adobe.exe PID 1516 wrote to memory of 1908 1516 adobe.exe adobe.exe PID 1516 wrote to memory of 1908 1516 adobe.exe adobe.exe PID 1516 wrote to memory of 1908 1516 adobe.exe adobe.exe PID 1516 wrote to memory of 1908 1516 adobe.exe adobe.exe PID 1516 wrote to memory of 1908 1516 adobe.exe adobe.exe PID 1516 wrote to memory of 1908 1516 adobe.exe adobe.exe PID 1516 wrote to memory of 1908 1516 adobe.exe adobe.exe PID 1516 wrote to memory of 1908 1516 adobe.exe adobe.exe PID 1908 wrote to memory of 1988 1908 adobe.exe powershell.exe PID 1908 wrote to memory of 1988 1908 adobe.exe powershell.exe PID 1908 wrote to memory of 1988 1908 adobe.exe powershell.exe PID 1908 wrote to memory of 1988 1908 adobe.exe powershell.exe PID 1908 wrote to memory of 1956 1908 adobe.exe cmd.exe PID 1908 wrote to memory of 1956 1908 adobe.exe cmd.exe PID 1908 wrote to memory of 1956 1908 adobe.exe cmd.exe PID 1908 wrote to memory of 1956 1908 adobe.exe cmd.exe PID 1908 wrote to memory of 1956 1908 adobe.exe cmd.exe PID 1908 wrote to memory of 1956 1908 adobe.exe cmd.exe -
Loads dropped DLL 8 IoCs
Processes:
INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exeadobe.exepid process 1160 INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe 296 1908 adobe.exe 1908 adobe.exe 1908 adobe.exe 1908 adobe.exe 1908 adobe.exe 1908 adobe.exe -
Adds Run entry to start application 2 TTPs 1 IoCs
Processes:
INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\microsoft.exe = "C:\\ProgramData\\adobe.exe" INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe"C:\Users\Admin\AppData\Local\Temp\INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pIIBrU" /XML "C:\Users\Admin\AppData\Local\Temp\tmp7D1B.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe"{path}"2⤵
-
C:\Users\Admin\AppData\Local\Temp\INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe"{path}"2⤵
- Drops startup file
- NTFS ADS
- Suspicious use of WriteProcessMemory
- Loads dropped DLL
- Adds Run entry to start application
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath C:\3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\adobe.exe"C:\ProgramData\adobe.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\adobe.exe"{path}"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Drops file in Program Files directory
- Modifies WinLogon
- Drops file in System32 directory
- Sets DLL path for service in the registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- Loads dropped DLL
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath C:\5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"5⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\
-
C:\ProgramData\adobe.exe
-
C:\ProgramData\adobe.exe
-
C:\ProgramData\adobe.exe
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_231c2208-0720-4eec-b9f1-8bba11abd9fa
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_235184f8-dcca-4459-ace7-181c154dff79
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_57c6647c-75fc-47bb-8ce4-3b8f0921c533
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_66b6971c-c0de-45de-825d-cc7d49ef1716
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_6d5fa298-996f-4fc9-9c01-b2226cbdaeba
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_71d6eae7-3380-4cb3-a8a0-b26738b9e2b7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_7d6878ec-2a8b-418c-8f2b-b6fcd4b50cf8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_de4eedb8-4762-4c56-b80c-203df3aa6fa8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_e43ce3f6-b60d-4b70-bed1-86e53bf07360
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_f17a3c81-b2fd-43f9-9679-dbe29e33f943
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_f9750d79-4871-47e8-88a8-1df956565712
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_fabbb9cf-9b8c-4b2f-b33d-0de7a9a3a10e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex
-
C:\Users\Admin\AppData\Local\Temp\tmp7D1B.tmp
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
-
\Program Files\Microsoft DN1\sqlmap.dll
-
\ProgramData\adobe.exe
-
\Users\Admin\AppData\Local\Temp\freebl3.dll
-
\Users\Admin\AppData\Local\Temp\mozglue.dll
-
\Users\Admin\AppData\Local\Temp\msvcp140.dll
-
\Users\Admin\AppData\Local\Temp\nss3.dll
-
\Users\Admin\AppData\Local\Temp\softokn3.dll
-
\Users\Admin\AppData\Local\Temp\vcruntime140.dll
-
memory/452-0-0x0000000000000000-mapping.dmp
-
memory/1052-5-0x0000000000000000-mapping.dmp
-
memory/1160-4-0x0000000000400000-0x0000000000554000-memory.dmpFilesize
1.3MB
-
memory/1160-2-0x0000000000400000-0x0000000000554000-memory.dmpFilesize
1.3MB
-
memory/1160-3-0x0000000000405A3D-mapping.dmp
-
memory/1516-7-0x0000000000000000-mapping.dmp
-
memory/1908-14-0x0000000000405A3D-mapping.dmp
-
memory/1908-16-0x0000000000400000-0x0000000000554000-memory.dmpFilesize
1.3MB
-
memory/1956-23-0x0000000000000000-mapping.dmp
-
memory/1956-22-0x0000000000180000-0x0000000000181000-memory.dmpFilesize
4KB
-
memory/1956-18-0x0000000000000000-mapping.dmp
-
memory/1988-17-0x0000000000000000-mapping.dmp