Analysis
-
max time kernel
77s -
max time network
127s -
platform
windows10_x64 -
resource
win10 -
submitted
14-07-2020 22:36
Static task
static1
Behavioral task
behavioral1
Sample
overdue invoice.pdf.exe
Resource
win7v200430
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
overdue invoice.pdf.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
overdue invoice.pdf.exe
-
Size
1.3MB
-
MD5
dc5f5ae953f37c7f54a3d787fc2353ca
-
SHA1
75de209d727492f675faec351f728c2b9d09b565
-
SHA256
ab5f254a91426311df7fe85d3442b62c7b69dd1c6e444ef725ddcba5a06ac961
-
SHA512
32c651b7e91fd467616ab5391e4e4e51d343c4d91da4afbf8a8f63d5db2d3f60bca6cf3d77d88daa15da8cbdd7a9dccc7ab3766d859472ed7ca9e4b9ce9decd3
Score
5/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 3380 dw20.exe Token: SeBackupPrivilege 3380 dw20.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3380 dw20.exe 3380 dw20.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3100 wrote to memory of 3860 3100 overdue invoice.pdf.exe 67 PID 3100 wrote to memory of 3860 3100 overdue invoice.pdf.exe 67 PID 3100 wrote to memory of 3860 3100 overdue invoice.pdf.exe 67 PID 3100 wrote to memory of 3860 3100 overdue invoice.pdf.exe 67 PID 3100 wrote to memory of 3860 3100 overdue invoice.pdf.exe 67 PID 3100 wrote to memory of 3860 3100 overdue invoice.pdf.exe 67 PID 3100 wrote to memory of 3860 3100 overdue invoice.pdf.exe 67 PID 3100 wrote to memory of 3860 3100 overdue invoice.pdf.exe 67 PID 3860 wrote to memory of 3380 3860 RegSvcs.exe 68 PID 3860 wrote to memory of 3380 3860 RegSvcs.exe 68 PID 3860 wrote to memory of 3380 3860 RegSvcs.exe 68 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3100 set thread context of 3860 3100 overdue invoice.pdf.exe 67
Processes
-
C:\Users\Admin\AppData\Local\Temp\overdue invoice.pdf.exe"C:\Users\Admin\AppData\Local\Temp\overdue invoice.pdf.exe"1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
PID:3100 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"{path}"2⤵
- Suspicious use of WriteProcessMemory
PID:3860 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 6963⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:3380
-
-