Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
10/07/2020, 07:01
Static task
static1
Behavioral task
behavioral1
Sample
IMAGES-001-QUOTE REQUEST #21800176_354667485903 _09_07_2020PDF.exe
Resource
win7v200430
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
IMAGES-001-QUOTE REQUEST #21800176_354667485903 _09_07_2020PDF.exe
Resource
win10
0 signatures
0 seconds
General
-
Target
IMAGES-001-QUOTE REQUEST #21800176_354667485903 _09_07_2020PDF.exe
-
Size
504KB
-
MD5
c1b13db471da675d9887133f6de51d4d
-
SHA1
ee4185e2232581c17e45b5598a07a99f49887364
-
SHA256
8ea404b56d3341cbcc42c2f9b99c6cf8aa457d94b5319e19bee72859be9b1c32
-
SHA512
40076fb9f71a1c96be4883cc595a7cbee3da9701ad2633d20a31d125a19382ad14b43de18ff17eac96d211e2885137d61ee34065739c6b5967592a91c8050a65
Score
10/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1864 IMAGES-001-QUOTE REQUEST #21800176_354667485903 _09_07_2020PDF.exe Token: SeDebugPrivilege 1844 msdt.exe -
Adds Run entry to policy start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run msdt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\JPWDVZIX_JQ = "C:\\Program Files (x86)\\Uerddkzi\\mfchtmx.exe" msdt.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1492 set thread context of 1864 1492 IMAGES-001-QUOTE REQUEST #21800176_354667485903 _09_07_2020PDF.exe 26 PID 1864 set thread context of 1200 1864 IMAGES-001-QUOTE REQUEST #21800176_354667485903 _09_07_2020PDF.exe 20 PID 1844 set thread context of 1200 1844 msdt.exe 20 -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 1864 IMAGES-001-QUOTE REQUEST #21800176_354667485903 _09_07_2020PDF.exe 1864 IMAGES-001-QUOTE REQUEST #21800176_354667485903 _09_07_2020PDF.exe 1844 msdt.exe 1844 msdt.exe 1844 msdt.exe 1844 msdt.exe 1844 msdt.exe 1844 msdt.exe 1844 msdt.exe 1844 msdt.exe 1844 msdt.exe 1844 msdt.exe 1844 msdt.exe 1844 msdt.exe 1844 msdt.exe 1844 msdt.exe 1844 msdt.exe 1844 msdt.exe 1844 msdt.exe 1844 msdt.exe 1844 msdt.exe 1844 msdt.exe 1844 msdt.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 1864 IMAGES-001-QUOTE REQUEST #21800176_354667485903 _09_07_2020PDF.exe 1864 IMAGES-001-QUOTE REQUEST #21800176_354667485903 _09_07_2020PDF.exe 1864 IMAGES-001-QUOTE REQUEST #21800176_354667485903 _09_07_2020PDF.exe 1844 msdt.exe 1844 msdt.exe 1844 msdt.exe 1844 msdt.exe -
description ioc Process Key created \Registry\User\S-1-5-21-910373003-3952921535-3480519689-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 msdt.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1492 wrote to memory of 1864 1492 IMAGES-001-QUOTE REQUEST #21800176_354667485903 _09_07_2020PDF.exe 26 PID 1492 wrote to memory of 1864 1492 IMAGES-001-QUOTE REQUEST #21800176_354667485903 _09_07_2020PDF.exe 26 PID 1492 wrote to memory of 1864 1492 IMAGES-001-QUOTE REQUEST #21800176_354667485903 _09_07_2020PDF.exe 26 PID 1492 wrote to memory of 1864 1492 IMAGES-001-QUOTE REQUEST #21800176_354667485903 _09_07_2020PDF.exe 26 PID 1492 wrote to memory of 1864 1492 IMAGES-001-QUOTE REQUEST #21800176_354667485903 _09_07_2020PDF.exe 26 PID 1492 wrote to memory of 1864 1492 IMAGES-001-QUOTE REQUEST #21800176_354667485903 _09_07_2020PDF.exe 26 PID 1492 wrote to memory of 1864 1492 IMAGES-001-QUOTE REQUEST #21800176_354667485903 _09_07_2020PDF.exe 26 PID 1200 wrote to memory of 1844 1200 Explorer.EXE 27 PID 1200 wrote to memory of 1844 1200 Explorer.EXE 27 PID 1200 wrote to memory of 1844 1200 Explorer.EXE 27 PID 1200 wrote to memory of 1844 1200 Explorer.EXE 27 PID 1844 wrote to memory of 1824 1844 msdt.exe 28 PID 1844 wrote to memory of 1824 1844 msdt.exe 28 PID 1844 wrote to memory of 1824 1844 msdt.exe 28 PID 1844 wrote to memory of 1824 1844 msdt.exe 28 PID 1844 wrote to memory of 1652 1844 msdt.exe 31 PID 1844 wrote to memory of 1652 1844 msdt.exe 31 PID 1844 wrote to memory of 1652 1844 msdt.exe 31 PID 1844 wrote to memory of 1652 1844 msdt.exe 31 PID 1844 wrote to memory of 1652 1844 msdt.exe 31 -
Deletes itself 1 IoCs
pid Process 1824 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Uerddkzi\mfchtmx.exe msdt.exe -
System policy modification 1 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer msdt.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\IMAGES-001-QUOTE REQUEST #21800176_354667485903 _09_07_2020PDF.exe"C:\Users\Admin\AppData\Local\Temp\IMAGES-001-QUOTE REQUEST #21800176_354667485903 _09_07_2020PDF.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\IMAGES-001-QUOTE REQUEST #21800176_354667485903 _09_07_2020PDF.exe"{path}"3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1864
-
-
-
C:\Windows\SysWOW64\msdt.exe"C:\Windows\SysWOW64\msdt.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Adds Run entry to policy start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
- Drops file in Program Files directory
- System policy modification
PID:1844 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\IMAGES-001-QUOTE REQUEST #21800176_354667485903 _09_07_2020PDF.exe"3⤵
- Deletes itself
PID:1824
-
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1652
-
-