Analysis
-
max time kernel
149s -
max time network
142s -
platform
windows10_x64 -
resource
win10 -
submitted
13/07/2020, 13:33
Static task
static1
Behavioral task
behavioral1
Sample
NEW ORDER APPROVED_PDF.exe
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
NEW ORDER APPROVED_PDF.exe
Resource
win10
0 signatures
0 seconds
General
-
Target
NEW ORDER APPROVED_PDF.exe
-
Size
368KB
-
MD5
c3782f33095e240a6c570b8d1265eaa4
-
SHA1
e40c6809253127c918848e2db3173205c12d3def
-
SHA256
6023812166224ffe7f3ff3efacddccd27c4ae1f09aa2dc9e2f5c8557d6bb4382
-
SHA512
9138e8059fe1b00d9a6522b984a5134a39508a45f2d4b4bfb89c9843cc8ca161f2960ab2aa4fee25c8cc8fc6398b9d00beddccf126432233d75fd40792681677
Score
10/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 3544 NEW ORDER APPROVED_PDF.exe Token: SeDebugPrivilege 4016 NEW ORDER APPROVED_PDF.exe Token: SeDebugPrivilege 3812 ipconfig.exe Token: SeShutdownPrivilege 2972 Explorer.EXE Token: SeCreatePagefilePrivilege 2972 Explorer.EXE Token: SeShutdownPrivilege 2972 Explorer.EXE Token: SeCreatePagefilePrivilege 2972 Explorer.EXE Token: SeShutdownPrivilege 2972 Explorer.EXE Token: SeCreatePagefilePrivilege 2972 Explorer.EXE Token: SeShutdownPrivilege 2972 Explorer.EXE Token: SeCreatePagefilePrivilege 2972 Explorer.EXE -
Executes dropped EXE 1 IoCs
pid Process 4016 NEW ORDER APPROVED_PDF.exe -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 4016 NEW ORDER APPROVED_PDF.exe 4016 NEW ORDER APPROVED_PDF.exe 4016 NEW ORDER APPROVED_PDF.exe 4016 NEW ORDER APPROVED_PDF.exe 3812 ipconfig.exe 3812 ipconfig.exe 3812 ipconfig.exe 3812 ipconfig.exe -
Adds Run entry to start application 2 TTPs 2 IoCs
description ioc Process Key created \Registry\Machine\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run ipconfig.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\XP3DUFWP = "C:\\Program Files (x86)\\K0bvhq\\lh58czg4tx.exe" ipconfig.exe -
description ioc Process Key created \Registry\User\S-1-5-21-2066881839-3229799743-3576549721-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 69 IoCs
pid Process 3544 NEW ORDER APPROVED_PDF.exe 3544 NEW ORDER APPROVED_PDF.exe 3544 NEW ORDER APPROVED_PDF.exe 3544 NEW ORDER APPROVED_PDF.exe 3544 NEW ORDER APPROVED_PDF.exe 3544 NEW ORDER APPROVED_PDF.exe 3544 NEW ORDER APPROVED_PDF.exe 3544 NEW ORDER APPROVED_PDF.exe 3544 NEW ORDER APPROVED_PDF.exe 3544 NEW ORDER APPROVED_PDF.exe 3544 NEW ORDER APPROVED_PDF.exe 3544 NEW ORDER APPROVED_PDF.exe 3544 NEW ORDER APPROVED_PDF.exe 3544 NEW ORDER APPROVED_PDF.exe 3544 NEW ORDER APPROVED_PDF.exe 3544 NEW ORDER APPROVED_PDF.exe 3544 NEW ORDER APPROVED_PDF.exe 3544 NEW ORDER APPROVED_PDF.exe 3544 NEW ORDER APPROVED_PDF.exe 3544 NEW ORDER APPROVED_PDF.exe 3544 NEW ORDER APPROVED_PDF.exe 3544 NEW ORDER APPROVED_PDF.exe 3544 NEW ORDER APPROVED_PDF.exe 4016 NEW ORDER APPROVED_PDF.exe 4016 NEW ORDER APPROVED_PDF.exe 4016 NEW ORDER APPROVED_PDF.exe 4016 NEW ORDER APPROVED_PDF.exe 4016 NEW ORDER APPROVED_PDF.exe 4016 NEW ORDER APPROVED_PDF.exe 3812 ipconfig.exe 3812 ipconfig.exe 3812 ipconfig.exe 3812 ipconfig.exe 3812 ipconfig.exe 3812 ipconfig.exe 3812 ipconfig.exe 3812 ipconfig.exe 3812 ipconfig.exe 3812 ipconfig.exe 3812 ipconfig.exe 3812 ipconfig.exe 3812 ipconfig.exe 3812 ipconfig.exe 3812 ipconfig.exe 3812 ipconfig.exe 3812 ipconfig.exe 3812 ipconfig.exe 3812 ipconfig.exe 3812 ipconfig.exe 3812 ipconfig.exe 3812 ipconfig.exe 3812 ipconfig.exe 3812 ipconfig.exe 3812 ipconfig.exe 3812 ipconfig.exe 3812 ipconfig.exe 3812 ipconfig.exe 3812 ipconfig.exe 3812 ipconfig.exe 3812 ipconfig.exe 3812 ipconfig.exe 3812 ipconfig.exe 3812 ipconfig.exe 3812 ipconfig.exe 3812 ipconfig.exe 3812 ipconfig.exe 3812 ipconfig.exe 3812 ipconfig.exe 3812 ipconfig.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3544 wrote to memory of 4016 3544 NEW ORDER APPROVED_PDF.exe 67 PID 3544 wrote to memory of 4016 3544 NEW ORDER APPROVED_PDF.exe 67 PID 3544 wrote to memory of 4016 3544 NEW ORDER APPROVED_PDF.exe 67 PID 3544 wrote to memory of 4016 3544 NEW ORDER APPROVED_PDF.exe 67 PID 3544 wrote to memory of 4016 3544 NEW ORDER APPROVED_PDF.exe 67 PID 3544 wrote to memory of 4016 3544 NEW ORDER APPROVED_PDF.exe 67 PID 2972 wrote to memory of 3812 2972 Explorer.EXE 68 PID 2972 wrote to memory of 3812 2972 Explorer.EXE 68 PID 2972 wrote to memory of 3812 2972 Explorer.EXE 68 PID 3812 wrote to memory of 3796 3812 ipconfig.exe 69 PID 3812 wrote to memory of 3796 3812 ipconfig.exe 69 PID 3812 wrote to memory of 3796 3812 ipconfig.exe 69 PID 3812 wrote to memory of 652 3812 ipconfig.exe 77 PID 3812 wrote to memory of 652 3812 ipconfig.exe 77 PID 3812 wrote to memory of 652 3812 ipconfig.exe 77 PID 3812 wrote to memory of 1028 3812 ipconfig.exe 79 PID 3812 wrote to memory of 1028 3812 ipconfig.exe 79 PID 3812 wrote to memory of 1028 3812 ipconfig.exe 79 -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3544 set thread context of 4016 3544 NEW ORDER APPROVED_PDF.exe 67 PID 4016 set thread context of 2972 4016 NEW ORDER APPROVED_PDF.exe 56 PID 4016 set thread context of 2972 4016 NEW ORDER APPROVED_PDF.exe 56 PID 3812 set thread context of 2972 3812 ipconfig.exe 56 -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\K0bvhq\lh58czg4tx.exe ipconfig.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\NEW ORDER APPROVED_PDF.exe"C:\Users\Admin\AppData\Local\Temp\NEW ORDER APPROVED_PDF.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
PID:3544 -
C:\Users\Admin\AppData\Local\Temp\NEW ORDER APPROVED_PDF.exe"C:\Users\Admin\AppData\Local\Temp\NEW ORDER APPROVED_PDF.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
- Executes dropped EXE
- Suspicious behavior: MapViewOfSection
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetThreadContext
PID:4016
-
-
-
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\SysWOW64\ipconfig.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: MapViewOfSection
- Adds Run entry to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
PID:3812 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\NEW ORDER APPROVED_PDF.exe"3⤵PID:3796
-
-
C:\Windows\SysWOW64\cmd.exe/c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V3⤵PID:652
-
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1028
-
-