Analysis
-
max time kernel
75s -
max time network
137s -
platform
windows10_x64 -
resource
win10 -
submitted
30-06-2020 13:31
Static task
static1
Behavioral task
behavioral1
Sample
INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe
Resource
win7
Behavioral task
behavioral2
Sample
INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe
Resource
win10
General
-
Target
INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe
-
Size
223KB
-
MD5
0b89e3e11d64e96a9eb841c297c3e795
-
SHA1
ee91492d04556958af32986a5f235a4c528c9178
-
SHA256
c8fbdfebce02c75b83f14b5706f8b874435c33d48cc868bf046f13fe3dfad98d
-
SHA512
d91acd5c4b45ef6b7f5a6a006c74e067e193bbac6beef17f5c8893fbed0e6f40d3cde335b21f1068a48f5ba6e4164616d568dcab58bb306c18a5fada16aed690
Malware Config
Signatures
-
NTFS ADS 1 IoCs
Processes:
INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exedescription ioc process File created C:\ProgramData:ApplicationData INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe -
Suspicious use of WriteProcessMemory 35 IoCs
Processes:
INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exeINV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exeadobe.exedescription pid process target process PID 3820 wrote to memory of 3812 3820 INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe schtasks.exe PID 3820 wrote to memory of 3812 3820 INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe schtasks.exe PID 3820 wrote to memory of 3812 3820 INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe schtasks.exe PID 3820 wrote to memory of 3804 3820 INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe PID 3820 wrote to memory of 3804 3820 INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe PID 3820 wrote to memory of 3804 3820 INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe PID 3820 wrote to memory of 3804 3820 INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe PID 3820 wrote to memory of 3804 3820 INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe PID 3820 wrote to memory of 3804 3820 INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe PID 3820 wrote to memory of 3804 3820 INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe PID 3820 wrote to memory of 3804 3820 INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe PID 3820 wrote to memory of 3804 3820 INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe PID 3820 wrote to memory of 3804 3820 INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe PID 3820 wrote to memory of 3804 3820 INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe PID 3804 wrote to memory of 3960 3804 INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe powershell.exe PID 3804 wrote to memory of 3960 3804 INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe powershell.exe PID 3804 wrote to memory of 3960 3804 INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe powershell.exe PID 3804 wrote to memory of 1820 3804 INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe adobe.exe PID 3804 wrote to memory of 1820 3804 INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe adobe.exe PID 3804 wrote to memory of 1820 3804 INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe adobe.exe PID 1820 wrote to memory of 2128 1820 adobe.exe adobe.exe PID 1820 wrote to memory of 2128 1820 adobe.exe adobe.exe PID 1820 wrote to memory of 2128 1820 adobe.exe adobe.exe PID 1820 wrote to memory of 2132 1820 adobe.exe adobe.exe PID 1820 wrote to memory of 2132 1820 adobe.exe adobe.exe PID 1820 wrote to memory of 2132 1820 adobe.exe adobe.exe PID 1820 wrote to memory of 2136 1820 adobe.exe adobe.exe PID 1820 wrote to memory of 2136 1820 adobe.exe adobe.exe PID 1820 wrote to memory of 2136 1820 adobe.exe adobe.exe PID 1820 wrote to memory of 2444 1820 adobe.exe adobe.exe PID 1820 wrote to memory of 2444 1820 adobe.exe adobe.exe PID 1820 wrote to memory of 2444 1820 adobe.exe adobe.exe PID 1820 wrote to memory of 2484 1820 adobe.exe adobe.exe PID 1820 wrote to memory of 2484 1820 adobe.exe adobe.exe PID 1820 wrote to memory of 2484 1820 adobe.exe adobe.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exedescription pid process target process PID 3820 set thread context of 3804 3820 INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe -
Executes dropped EXE 6 IoCs
Processes:
adobe.exeadobe.exeadobe.exeadobe.exeadobe.exeadobe.exepid process 1820 adobe.exe 2128 adobe.exe 2132 adobe.exe 2136 adobe.exe 2444 adobe.exe 2484 adobe.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3008 3960 WerFault.exe powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
WerFault.exeadobe.exedescription pid process Token: SeRestorePrivilege 3008 WerFault.exe Token: SeBackupPrivilege 3008 WerFault.exe Token: SeDebugPrivilege 3008 WerFault.exe Token: SeDebugPrivilege 1820 adobe.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
Processes:
WerFault.exeadobe.exepid process 3008 WerFault.exe 3008 WerFault.exe 3008 WerFault.exe 3008 WerFault.exe 3008 WerFault.exe 3008 WerFault.exe 3008 WerFault.exe 3008 WerFault.exe 3008 WerFault.exe 3008 WerFault.exe 3008 WerFault.exe 3008 WerFault.exe 3008 WerFault.exe 1820 adobe.exe 1820 adobe.exe 1820 adobe.exe 1820 adobe.exe 1820 adobe.exe 1820 adobe.exe 1820 adobe.exe 1820 adobe.exe 1820 adobe.exe 1820 adobe.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Drops startup file 2 IoCs
Processes:
INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\programs.bat INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\programs.bat:start INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe -
Adds Run entry to start application 2 TTPs 1 IoCs
Processes:
INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\microsoft.exe = "C:\\ProgramData\\adobe.exe" INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe"C:\Users\Admin\AppData\Local\Temp\INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe"1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pIIBrU" /XML "C:\Users\Admin\AppData\Local\Temp\tmp7951.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\INV_QTYD33_of 2020-ASIA CITRA PRATAMA -AIRO 34-20_pdf.exe"{path}"2⤵
- NTFS ADS
- Suspicious use of WriteProcessMemory
- Drops startup file
- Adds Run entry to start application
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath C:\3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3960 -s 7004⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
-
C:\ProgramData\adobe.exe"C:\ProgramData\adobe.exe"3⤵
- Suspicious use of WriteProcessMemory
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
-
C:\ProgramData\adobe.exe"{path}"4⤵
- Executes dropped EXE
-
C:\ProgramData\adobe.exe"{path}"4⤵
- Executes dropped EXE
-
C:\ProgramData\adobe.exe"{path}"4⤵
- Executes dropped EXE
-
C:\ProgramData\adobe.exe"{path}"4⤵
- Executes dropped EXE
-
C:\ProgramData\adobe.exe"{path}"4⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\
-
C:\ProgramData\adobe.exe
-
C:\ProgramData\adobe.exe
-
C:\ProgramData\adobe.exe
-
C:\ProgramData\adobe.exe
-
C:\ProgramData\adobe.exe
-
C:\ProgramData\adobe.exe
-
C:\ProgramData\adobe.exe
-
C:\Users\Admin\AppData\Local\Temp\tmp7951.tmp
-
memory/1820-6-0x0000000000000000-mapping.dmp
-
memory/3008-16-0x0000000004D70000-0x0000000004D71000-memory.dmpFilesize
4KB
-
memory/3008-10-0x0000000004740000-0x0000000004741000-memory.dmpFilesize
4KB
-
memory/3804-4-0x0000000000400000-0x0000000000554000-memory.dmpFilesize
1.3MB
-
memory/3804-3-0x0000000000405A3D-mapping.dmp
-
memory/3804-2-0x0000000000400000-0x0000000000554000-memory.dmpFilesize
1.3MB
-
memory/3812-0-0x0000000000000000-mapping.dmp
-
memory/3960-5-0x0000000000000000-mapping.dmp
-
memory/3960-15-0x0000000000000000-mapping.dmp
-
memory/3960-13-0x0000000000000000-mapping.dmp
-
memory/3960-14-0x0000000000000000-mapping.dmp
-
memory/3960-11-0x0000000000000000-mapping.dmp
-
memory/3960-12-0x0000000000000000-mapping.dmp