Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    30-06-2020 19:27

General

  • Target

    PO570943.exe

  • Size

    850KB

  • MD5

    15b8b9017505c2a13e8a513e9a92b3e0

  • SHA1

    587304393a857e9f8feef26b5f44ac9d4cac5827

  • SHA256

    1c3d30d7637b1a6fb648b1cf1de6c7a8375337327cd243f87d525c109554db7d

  • SHA512

    7379421656a6640668399d8edb46bb34f6bbe386c50abc6fa07cf6c485dcba928a2a9a679234c6cecde34c7852ebb5698172caba6d0c7eb327872e417c28b84a

Malware Config

Signatures

  • Suspicious use of SendNotifyMessage 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs
  • Executes dropped EXE 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PO570943.exe
    "C:\Users\Admin\AppData\Local\Temp\PO570943.exe"
    1⤵
    • Suspicious use of SendNotifyMessage
    • Loads dropped DLL
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    • Modifies system certificate store
    PID:112
    • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
      "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp200423-2020501-pds-ostrichoo-ffp2-rdy.pdf"
      2⤵
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:1828
    • C:\Users\Admin\AppData\Local\Temp5900785.exe
      "C:\Users\Admin\AppData\Local\Temp5900785.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      PID:1868
      • C:\Users\Admin\AppData\Local\Temp5900785.exe
        "{path}"
        3⤵
        • Executes dropped EXE
        PID:1628

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp200423-2020501-pds-ostrichoo-ffp2-rdy.pdf
  • C:\Users\Admin\AppData\Local\Temp5900785.exe
  • C:\Users\Admin\AppData\Local\Temp5900785.exe
  • C:\Users\Admin\AppData\Local\Temp5900785.exe
  • \Users\Admin\AppData\Local\Temp5900785.exe
  • \Users\Admin\AppData\Local\Temp5900785.exe
  • \Users\Admin\AppData\Local\Temp5900785.exe
  • \Users\Admin\AppData\Local\Temp5900785.exe
  • memory/1628-11-0x0000000000400000-0x0000000000412000-memory.dmp
    Filesize

    72KB

  • memory/1628-12-0x000000000040C62E-mapping.dmp
  • memory/1628-14-0x0000000000400000-0x0000000000412000-memory.dmp
    Filesize

    72KB

  • memory/1628-15-0x0000000000400000-0x0000000000412000-memory.dmp
    Filesize

    72KB

  • memory/1828-0-0x0000000000000000-mapping.dmp
  • memory/1868-5-0x0000000000000000-mapping.dmp
  • memory/1868-10-0x0000000000000000-0x0000000000000000-disk.dmp