Analysis
-
max time kernel
34s -
max time network
148s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
05-11-2020 11:46
Static task
static1
Behavioral task
behavioral1
Sample
Booking Confirmation 110420203251 - copy - PDF.exe
Resource
win7v20201028
0 signatures
0 seconds
General
-
Target
Booking Confirmation 110420203251 - copy - PDF.exe
-
Size
344KB
-
MD5
f4f48519f108900933d0dd0e8aa1f40f
-
SHA1
5a48020b486ab74eea85cf88d647dc2ba0994ace
-
SHA256
f6d2fe1a8ba40429708ec5c70159fcff0e9741ea260ea93e3665d6ea752f96d3
-
SHA512
d02dc186871c344bddac7ae1a5c1e9c72014e106dfdbe1c565bf7a56ae052b10f7abb69f34010f5315752766bc40a86d1f9e20da2c8c70f7c0aef053ab3248a1
Malware Config
Signatures
-
Beds Protector Packer 1 IoCs
Detects Beds Protector packer used to load .NET malware.
resource yara_rule behavioral2/memory/508-5-0x0000000004DF0000-0x0000000004E3B000-memory.dmp beds_protector -
HiveRAT Payload 3 IoCs
resource yara_rule behavioral2/memory/3892-37-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral2/memory/3892-38-0x000000000044C7BE-mapping.dmp family_hiverat behavioral2/memory/3892-39-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Booking Confirmation 110420203251 - copy - PDF.exe Booking Confirmation 110420203251 - copy - PDF.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3944 set thread context of 3892 3944 Booking Confirmation 110420203251 - copy - PDF.exe 84 -
Delays execution with timeout.exe 1 IoCs
pid Process 3460 timeout.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings powershell.exe -
Suspicious behavior: EnumeratesProcesses 59 IoCs
pid Process 508 Booking Confirmation 110420203251 - copy - PDF.exe 508 Booking Confirmation 110420203251 - copy - PDF.exe 508 Booking Confirmation 110420203251 - copy - PDF.exe 508 Booking Confirmation 110420203251 - copy - PDF.exe 508 Booking Confirmation 110420203251 - copy - PDF.exe 508 Booking Confirmation 110420203251 - copy - PDF.exe 508 Booking Confirmation 110420203251 - copy - PDF.exe 508 Booking Confirmation 110420203251 - copy - PDF.exe 508 Booking Confirmation 110420203251 - copy - PDF.exe 508 Booking Confirmation 110420203251 - copy - PDF.exe 508 Booking Confirmation 110420203251 - copy - PDF.exe 508 Booking Confirmation 110420203251 - copy - PDF.exe 508 Booking Confirmation 110420203251 - copy - PDF.exe 508 Booking Confirmation 110420203251 - copy - PDF.exe 508 Booking Confirmation 110420203251 - copy - PDF.exe 508 Booking Confirmation 110420203251 - copy - PDF.exe 508 Booking Confirmation 110420203251 - copy - PDF.exe 508 Booking Confirmation 110420203251 - copy - PDF.exe 200 powershell.exe 200 powershell.exe 200 powershell.exe 3944 Booking Confirmation 110420203251 - copy - PDF.exe 3944 Booking Confirmation 110420203251 - copy - PDF.exe 3944 Booking Confirmation 110420203251 - copy - PDF.exe 3944 Booking Confirmation 110420203251 - copy - PDF.exe 3944 Booking Confirmation 110420203251 - copy - PDF.exe 3944 Booking Confirmation 110420203251 - copy - PDF.exe 3944 Booking Confirmation 110420203251 - copy - PDF.exe 3944 Booking Confirmation 110420203251 - copy - PDF.exe 3944 Booking Confirmation 110420203251 - copy - PDF.exe 3944 Booking Confirmation 110420203251 - copy - PDF.exe 3944 Booking Confirmation 110420203251 - copy - PDF.exe 3944 Booking Confirmation 110420203251 - copy - PDF.exe 3944 Booking Confirmation 110420203251 - copy - PDF.exe 3944 Booking Confirmation 110420203251 - copy - PDF.exe 3944 Booking Confirmation 110420203251 - copy - PDF.exe 3944 Booking Confirmation 110420203251 - copy - PDF.exe 3944 Booking Confirmation 110420203251 - copy - PDF.exe 3944 Booking Confirmation 110420203251 - copy - PDF.exe 3944 Booking Confirmation 110420203251 - copy - PDF.exe 3944 Booking Confirmation 110420203251 - copy - PDF.exe 3944 Booking Confirmation 110420203251 - copy - PDF.exe 3944 Booking Confirmation 110420203251 - copy - PDF.exe 3944 Booking Confirmation 110420203251 - copy - PDF.exe 3944 Booking Confirmation 110420203251 - copy - PDF.exe 3944 Booking Confirmation 110420203251 - copy - PDF.exe 3944 Booking Confirmation 110420203251 - copy - PDF.exe 3944 Booking Confirmation 110420203251 - copy - PDF.exe 3944 Booking Confirmation 110420203251 - copy - PDF.exe 3944 Booking Confirmation 110420203251 - copy - PDF.exe 3944 Booking Confirmation 110420203251 - copy - PDF.exe 3944 Booking Confirmation 110420203251 - copy - PDF.exe 3944 Booking Confirmation 110420203251 - copy - PDF.exe 3944 Booking Confirmation 110420203251 - copy - PDF.exe 3944 Booking Confirmation 110420203251 - copy - PDF.exe 3944 Booking Confirmation 110420203251 - copy - PDF.exe 3944 Booking Confirmation 110420203251 - copy - PDF.exe 3944 Booking Confirmation 110420203251 - copy - PDF.exe 3892 Booking Confirmation 110420203251 - copy - PDF.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2212 WScript.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 508 Booking Confirmation 110420203251 - copy - PDF.exe Token: SeDebugPrivilege 200 powershell.exe Token: SeDebugPrivilege 3944 Booking Confirmation 110420203251 - copy - PDF.exe Token: SeDebugPrivilege 3892 Booking Confirmation 110420203251 - copy - PDF.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 508 wrote to memory of 3828 508 Booking Confirmation 110420203251 - copy - PDF.exe 75 PID 508 wrote to memory of 3828 508 Booking Confirmation 110420203251 - copy - PDF.exe 75 PID 508 wrote to memory of 3828 508 Booking Confirmation 110420203251 - copy - PDF.exe 75 PID 3828 wrote to memory of 3460 3828 cmd.exe 77 PID 3828 wrote to memory of 3460 3828 cmd.exe 77 PID 3828 wrote to memory of 3460 3828 cmd.exe 77 PID 3828 wrote to memory of 200 3828 cmd.exe 81 PID 3828 wrote to memory of 200 3828 cmd.exe 81 PID 3828 wrote to memory of 200 3828 cmd.exe 81 PID 200 wrote to memory of 2212 200 powershell.exe 82 PID 200 wrote to memory of 2212 200 powershell.exe 82 PID 200 wrote to memory of 2212 200 powershell.exe 82 PID 200 wrote to memory of 3944 200 powershell.exe 83 PID 200 wrote to memory of 3944 200 powershell.exe 83 PID 200 wrote to memory of 3944 200 powershell.exe 83 PID 3944 wrote to memory of 3892 3944 Booking Confirmation 110420203251 - copy - PDF.exe 84 PID 3944 wrote to memory of 3892 3944 Booking Confirmation 110420203251 - copy - PDF.exe 84 PID 3944 wrote to memory of 3892 3944 Booking Confirmation 110420203251 - copy - PDF.exe 84 PID 3944 wrote to memory of 3892 3944 Booking Confirmation 110420203251 - copy - PDF.exe 84 PID 3944 wrote to memory of 3892 3944 Booking Confirmation 110420203251 - copy - PDF.exe 84 PID 3944 wrote to memory of 3892 3944 Booking Confirmation 110420203251 - copy - PDF.exe 84 PID 3944 wrote to memory of 3892 3944 Booking Confirmation 110420203251 - copy - PDF.exe 84 PID 3944 wrote to memory of 3892 3944 Booking Confirmation 110420203251 - copy - PDF.exe 84 PID 3944 wrote to memory of 3892 3944 Booking Confirmation 110420203251 - copy - PDF.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\Booking Confirmation 110420203251 - copy - PDF.exe"C:\Users\Admin\AppData\Local\Temp\Booking Confirmation 110420203251 - copy - PDF.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:508 -
C:\Windows\SysWOW64\cmd.execmd.exe /c timeout 5 & powershell -command Start-Process -WindowStyle hidden -FilePath 'C:\Users\Admin\AppData\Local\Temp\\696392.js'; Start-Sleep -s 5; Start-Process -WindowStyle hidden -FilePath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Booking Confirmation 110420203251 - copy - PDF.exe'2⤵
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Windows\SysWOW64\timeout.exetimeout 53⤵
- Delays execution with timeout.exe
PID:3460
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command Start-Process -WindowStyle hidden -FilePath 'C:\Users\Admin\AppData\Local\Temp\\696392.js'; Start-Sleep -s 5; Start-Process -WindowStyle hidden -FilePath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Booking Confirmation 110420203251 - copy - PDF.exe'3⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:200 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\696392.js"4⤵
- Suspicious behavior: RenamesItself
PID:2212
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Booking Confirmation 110420203251 - copy - PDF.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Booking Confirmation 110420203251 - copy - PDF.exe"4⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Booking Confirmation 110420203251 - copy - PDF.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Booking Confirmation 110420203251 - copy - PDF.exe"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3892
-
-
-
-