Analysis
-
max time kernel
148s -
max time network
142s -
platform
windows7_x64 -
resource
win7 -
submitted
07-07-2020 13:21
Static task
static1
Behavioral task
behavioral1
Sample
Approved July Order_PDF.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Approved July Order_PDF.exe
Resource
win10v200430
windows10_x64
0 signatures
0 seconds
General
-
Target
Approved July Order_PDF.exe
-
Size
378KB
-
MD5
63a7452dd99f28c47b4dcd821d219672
-
SHA1
9584f5dd645fb1367de3a046cd819692b412f37a
-
SHA256
4a6187dd467be22cbd3eab6807d368c37535c488af22442498423da8124f35fa
-
SHA512
34a3140fa917c04440a08e3c29ac752e5cfe82d018b895fe2ba73d48aceee6e5c4be1d13a7e11eb0d1d79e9ed4e4bb7edd70913f60c1c640b3ea6226136694ed
Score
8/10
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1156 Approved July Order_PDF.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 1480 Approved July Order_PDF.exe 1480 Approved July Order_PDF.exe 1480 Approved July Order_PDF.exe 1816 raserver.exe 1816 raserver.exe 1816 raserver.exe 1816 raserver.exe -
Adds Run entry to policy start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run raserver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\IZ7DEFLH6XS8 = "C:\\Program Files (x86)\\Qxrg4hxm\\audiodgtd_.exe" raserver.exe -
description ioc Process Key created \Registry\User\S-1-5-21-1131729243-447456001-3632642222-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 raserver.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1156 Approved July Order_PDF.exe Token: SeDebugPrivilege 1480 Approved July Order_PDF.exe Token: SeDebugPrivilege 1816 raserver.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 1156 Approved July Order_PDF.exe 1156 Approved July Order_PDF.exe 1156 Approved July Order_PDF.exe 1156 Approved July Order_PDF.exe 1156 Approved July Order_PDF.exe 1156 Approved July Order_PDF.exe 1156 Approved July Order_PDF.exe 1156 Approved July Order_PDF.exe 1156 Approved July Order_PDF.exe 1156 Approved July Order_PDF.exe 1156 Approved July Order_PDF.exe 1156 Approved July Order_PDF.exe 1156 Approved July Order_PDF.exe 1156 Approved July Order_PDF.exe 1156 Approved July Order_PDF.exe 1156 Approved July Order_PDF.exe 1156 Approved July Order_PDF.exe 1156 Approved July Order_PDF.exe 1156 Approved July Order_PDF.exe 1156 Approved July Order_PDF.exe 1156 Approved July Order_PDF.exe 1156 Approved July Order_PDF.exe 1156 Approved July Order_PDF.exe 1480 Approved July Order_PDF.exe 1480 Approved July Order_PDF.exe 1816 raserver.exe 1816 raserver.exe 1816 raserver.exe 1816 raserver.exe 1816 raserver.exe 1816 raserver.exe 1816 raserver.exe 1816 raserver.exe 1816 raserver.exe 1816 raserver.exe 1816 raserver.exe 1816 raserver.exe 1816 raserver.exe 1816 raserver.exe 1816 raserver.exe 1816 raserver.exe 1816 raserver.exe 1816 raserver.exe 1816 raserver.exe 1816 raserver.exe 1816 raserver.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1156 wrote to memory of 1480 1156 Approved July Order_PDF.exe 24 PID 1156 wrote to memory of 1480 1156 Approved July Order_PDF.exe 24 PID 1156 wrote to memory of 1480 1156 Approved July Order_PDF.exe 24 PID 1156 wrote to memory of 1480 1156 Approved July Order_PDF.exe 24 PID 1156 wrote to memory of 1480 1156 Approved July Order_PDF.exe 24 PID 1156 wrote to memory of 1480 1156 Approved July Order_PDF.exe 24 PID 1156 wrote to memory of 1480 1156 Approved July Order_PDF.exe 24 PID 1224 wrote to memory of 1816 1224 Explorer.EXE 25 PID 1224 wrote to memory of 1816 1224 Explorer.EXE 25 PID 1224 wrote to memory of 1816 1224 Explorer.EXE 25 PID 1224 wrote to memory of 1816 1224 Explorer.EXE 25 PID 1816 wrote to memory of 1808 1816 raserver.exe 26 PID 1816 wrote to memory of 1808 1816 raserver.exe 26 PID 1816 wrote to memory of 1808 1816 raserver.exe 26 PID 1816 wrote to memory of 1808 1816 raserver.exe 26 PID 1816 wrote to memory of 1168 1816 raserver.exe 31 PID 1816 wrote to memory of 1168 1816 raserver.exe 31 PID 1816 wrote to memory of 1168 1816 raserver.exe 31 PID 1816 wrote to memory of 1168 1816 raserver.exe 31 PID 1816 wrote to memory of 1168 1816 raserver.exe 31 -
Executes dropped EXE 1 IoCs
pid Process 1480 Approved July Order_PDF.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Explorer.EXE -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1156 set thread context of 1480 1156 Approved July Order_PDF.exe 24 PID 1480 set thread context of 1224 1480 Approved July Order_PDF.exe 20 PID 1816 set thread context of 1224 1816 raserver.exe 20 -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Qxrg4hxm\audiodgtd_.exe raserver.exe -
System policy modification 1 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer raserver.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
- Checks whether UAC is enabled
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\Approved July Order_PDF.exe"C:\Users\Admin\AppData\Local\Temp\Approved July Order_PDF.exe"2⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
PID:1156 -
C:\Users\Admin\AppData\Local\Temp\Approved July Order_PDF.exe"C:\Users\Admin\AppData\Local\Temp\Approved July Order_PDF.exe"3⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1480
-
-
-
C:\Windows\SysWOW64\raserver.exe"C:\Windows\SysWOW64\raserver.exe"2⤵
- Suspicious behavior: MapViewOfSection
- Adds Run entry to policy start application
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- System policy modification
PID:1816 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Approved July Order_PDF.exe"3⤵PID:1808
-
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1168
-
-