Analysis

  • max time kernel
    126s
  • max time network
    127s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    07-07-2020 09:08

General

  • Target

    PO#98765667.pdf.exe

  • Size

    549KB

  • MD5

    36b646875a393758bce6b40ac084b8fd

  • SHA1

    c259d2fbbad93dd55dd637c2adcf5ffd8c3204fa

  • SHA256

    2db7f75de0144ddcefea785a8d717f96107a0511568b3f27b49c1445164e828f

  • SHA512

    148f1a9527ba82282a873cad6c8cf9312cacc0b2d8f8ba552fa0742340c42aa46458afbd638cb38c637eaec57151766bd28bf53a51776703f833c9a4edc0be4e

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    @vision123

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\PO#98765667.pdf.exe
    "C:\Users\Admin\AppData\Local\Temp\PO#98765667.pdf.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious behavior: EnumeratesProcesses
    PID:3060

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads