Analysis
-
max time kernel
116s -
max time network
122s -
platform
windows7_x64 -
resource
win7 -
submitted
15/07/2020, 05:27
Static task
static1
Behavioral task
behavioral1
Sample
Proforma Invoice Attached .10456 pdf.exe
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Proforma Invoice Attached .10456 pdf.exe
Resource
win10v200430
0 signatures
0 seconds
General
-
Target
Proforma Invoice Attached .10456 pdf.exe
-
Size
1.2MB
-
MD5
065cfa71e11cd67ea14f3c072363167b
-
SHA1
7383426bc5cb24190b24b14d99f812b98704942c
-
SHA256
62e8d80b582bb90531dd63743d085910e20cdc35494bea3209fd80e22cff13bd
-
SHA512
58e3fc424c8019410f58026b05892ea6fa398a3d8631599329acdae8d5c10f19a20be0c25b512f56cb111d6d559b3ff46c0f49997454195b54dd72bfeb52dbd1
Score
10/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 608 wrote to memory of 876 608 Proforma Invoice Attached .10456 pdf.exe 24 PID 608 wrote to memory of 876 608 Proforma Invoice Attached .10456 pdf.exe 24 PID 608 wrote to memory of 876 608 Proforma Invoice Attached .10456 pdf.exe 24 PID 608 wrote to memory of 876 608 Proforma Invoice Attached .10456 pdf.exe 24 PID 608 wrote to memory of 876 608 Proforma Invoice Attached .10456 pdf.exe 24 PID 608 wrote to memory of 876 608 Proforma Invoice Attached .10456 pdf.exe 24 PID 608 wrote to memory of 876 608 Proforma Invoice Attached .10456 pdf.exe 24 PID 608 wrote to memory of 876 608 Proforma Invoice Attached .10456 pdf.exe 24 PID 608 wrote to memory of 876 608 Proforma Invoice Attached .10456 pdf.exe 24 PID 608 wrote to memory of 876 608 Proforma Invoice Attached .10456 pdf.exe 24 PID 608 wrote to memory of 876 608 Proforma Invoice Attached .10456 pdf.exe 24 PID 608 wrote to memory of 876 608 Proforma Invoice Attached .10456 pdf.exe 24 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 608 set thread context of 876 608 Proforma Invoice Attached .10456 pdf.exe 24 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 608 Proforma Invoice Attached .10456 pdf.exe -
NetWire RAT payload 2 IoCs
resource yara_rule behavioral1/memory/876-2-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/876-4-0x0000000000400000-0x0000000000433000-memory.dmp netwire -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ MSBuild.exe Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run\NetWire = "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\MSBuild.exe" MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Proforma Invoice Attached .10456 pdf.exe"C:\Users\Admin\AppData\Local\Temp\Proforma Invoice Attached .10456 pdf.exe"1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:608 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"{path}"2⤵
- Adds Run key to start application
PID:876
-