Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows7_x64 -
resource
win7 -
submitted
13-07-2020 00:03
Static task
static1
Behavioral task
behavioral1
Sample
MV EVER DIADEM YOY 149E_pdf.exe
Resource
win7
Behavioral task
behavioral2
Sample
MV EVER DIADEM YOY 149E_pdf.exe
Resource
win10v200430
General
-
Target
MV EVER DIADEM YOY 149E_pdf.exe
-
Size
935KB
-
MD5
14e3a0848d049b549462fe90f204e0a2
-
SHA1
42272a41052942331ee7c8409c008cc63aacd14a
-
SHA256
336024c1299d7903a83d3dc3f1575349d747c883fcfd29d014931c3887101c45
-
SHA512
b4e9bbe4722791175270766a48a0e67dd1298eb98cf3b5af5839aee0cba4cd0b101ea959bec247cb0114a5c83e209f4e68b03544072774f601f73655f38dff7e
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
MV EVER DIADEM YOY 149E_pdf.execolorcpl.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 1084 MV EVER DIADEM YOY 149E_pdf.exe Token: SeDebugPrivilege 1068 colorcpl.exe Token: SeShutdownPrivilege 1324 Explorer.EXE -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1424 cmd.exe -
Adds Run entry to start application 2 TTPs 2 IoCs
Processes:
colorcpl.exedescription ioc process Key created \Registry\Machine\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run colorcpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\8PADHDZ0VV = "C:\\Program Files (x86)\\Vtd_\\taskhostk6qliv8.exe" colorcpl.exe -
Processes:
colorcpl.exedescription ioc process Key created \Registry\User\S-1-5-21-1131729243-447456001-3632642222-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 colorcpl.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
Explorer.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 31 IoCs
Processes:
MV EVER DIADEM YOY 149E_pdf.exeMV EVER DIADEM YOY 149E_pdf.execolorcpl.exepid process 1060 MV EVER DIADEM YOY 149E_pdf.exe 1084 MV EVER DIADEM YOY 149E_pdf.exe 1084 MV EVER DIADEM YOY 149E_pdf.exe 1068 colorcpl.exe 1068 colorcpl.exe 1068 colorcpl.exe 1068 colorcpl.exe 1068 colorcpl.exe 1068 colorcpl.exe 1068 colorcpl.exe 1068 colorcpl.exe 1068 colorcpl.exe 1068 colorcpl.exe 1068 colorcpl.exe 1068 colorcpl.exe 1068 colorcpl.exe 1068 colorcpl.exe 1068 colorcpl.exe 1068 colorcpl.exe 1068 colorcpl.exe 1068 colorcpl.exe 1068 colorcpl.exe 1068 colorcpl.exe 1068 colorcpl.exe 1068 colorcpl.exe 1068 colorcpl.exe 1068 colorcpl.exe 1068 colorcpl.exe 1068 colorcpl.exe 1068 colorcpl.exe 1068 colorcpl.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
MV EVER DIADEM YOY 149E_pdf.exeExplorer.EXEcolorcpl.exedescription pid process target process PID 1060 wrote to memory of 1084 1060 MV EVER DIADEM YOY 149E_pdf.exe MV EVER DIADEM YOY 149E_pdf.exe PID 1060 wrote to memory of 1084 1060 MV EVER DIADEM YOY 149E_pdf.exe MV EVER DIADEM YOY 149E_pdf.exe PID 1060 wrote to memory of 1084 1060 MV EVER DIADEM YOY 149E_pdf.exe MV EVER DIADEM YOY 149E_pdf.exe PID 1060 wrote to memory of 1084 1060 MV EVER DIADEM YOY 149E_pdf.exe MV EVER DIADEM YOY 149E_pdf.exe PID 1324 wrote to memory of 1068 1324 Explorer.EXE colorcpl.exe PID 1324 wrote to memory of 1068 1324 Explorer.EXE colorcpl.exe PID 1324 wrote to memory of 1068 1324 Explorer.EXE colorcpl.exe PID 1324 wrote to memory of 1068 1324 Explorer.EXE colorcpl.exe PID 1068 wrote to memory of 1424 1068 colorcpl.exe cmd.exe PID 1068 wrote to memory of 1424 1068 colorcpl.exe cmd.exe PID 1068 wrote to memory of 1424 1068 colorcpl.exe cmd.exe PID 1068 wrote to memory of 1424 1068 colorcpl.exe cmd.exe PID 1068 wrote to memory of 1668 1068 colorcpl.exe Firefox.exe PID 1068 wrote to memory of 1668 1068 colorcpl.exe Firefox.exe PID 1068 wrote to memory of 1668 1068 colorcpl.exe Firefox.exe PID 1068 wrote to memory of 1668 1068 colorcpl.exe Firefox.exe PID 1068 wrote to memory of 1668 1068 colorcpl.exe Firefox.exe -
Suspicious behavior: MapViewOfSection 8 IoCs
Processes:
MV EVER DIADEM YOY 149E_pdf.exeMV EVER DIADEM YOY 149E_pdf.execolorcpl.exepid process 1060 MV EVER DIADEM YOY 149E_pdf.exe 1084 MV EVER DIADEM YOY 149E_pdf.exe 1084 MV EVER DIADEM YOY 149E_pdf.exe 1084 MV EVER DIADEM YOY 149E_pdf.exe 1068 colorcpl.exe 1068 colorcpl.exe 1068 colorcpl.exe 1068 colorcpl.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
MV EVER DIADEM YOY 149E_pdf.exeMV EVER DIADEM YOY 149E_pdf.execolorcpl.exedescription pid process target process PID 1060 set thread context of 1084 1060 MV EVER DIADEM YOY 149E_pdf.exe MV EVER DIADEM YOY 149E_pdf.exe PID 1084 set thread context of 1324 1084 MV EVER DIADEM YOY 149E_pdf.exe Explorer.EXE PID 1068 set thread context of 1324 1068 colorcpl.exe Explorer.EXE -
Suspicious use of FindShellTrayWindow 5 IoCs
Processes:
Explorer.EXEpid process 1324 Explorer.EXE 1324 Explorer.EXE 1324 Explorer.EXE 1324 Explorer.EXE 1324 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
Explorer.EXEpid process 1324 Explorer.EXE 1324 Explorer.EXE 1324 Explorer.EXE 1324 Explorer.EXE -
Drops file in Program Files directory 1 IoCs
Processes:
colorcpl.exedescription ioc process File opened for modification C:\Program Files (x86)\Vtd_\taskhostk6qliv8.exe colorcpl.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Checks whether UAC is enabled
- Suspicious use of WriteProcessMemory
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\MV EVER DIADEM YOY 149E_pdf.exe"C:\Users\Admin\AppData\Local\Temp\MV EVER DIADEM YOY 149E_pdf.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
PID:1060 -
C:\Users\Admin\AppData\Local\Temp\MV EVER DIADEM YOY 149E_pdf.exe"C:\Users\Admin\AppData\Local\Temp\MV EVER DIADEM YOY 149E_pdf.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
PID:1084
-
-
-
C:\Windows\SysWOW64\colorcpl.exe"C:\Windows\SysWOW64\colorcpl.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Adds Run entry to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
PID:1068 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\MV EVER DIADEM YOY 149E_pdf.exe"3⤵
- Deletes itself
PID:1424
-
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1668
-
-