Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
27-02-2021 07:13
Static task
static1
Behavioral task
behavioral1
Sample
Bookibg Confirmation_Pdf.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
Bookibg Confirmation_Pdf.exe
-
Size
792KB
-
MD5
f8ebfd07c19a299ac8da762992a3c36b
-
SHA1
7ef77d36b5bc3ab145d6482396c9d73500083859
-
SHA256
929a7bad454fe91b472f3cf802633eaab7c4673e55a9dc03ff820cedf8309251
-
SHA512
5f0b71f880408f306ea267098f46b340538cf4529d9c8c2838694eef9047410bf0bbed1f2f11c5addf50eb94eb0029db87eb8730349d1a5b63603e06ab61ac2f
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
Bookibg Confirmation_Pdf.exepid process 1100 Bookibg Confirmation_Pdf.exe 1100 Bookibg Confirmation_Pdf.exe 1100 Bookibg Confirmation_Pdf.exe 1100 Bookibg Confirmation_Pdf.exe 1100 Bookibg Confirmation_Pdf.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Bookibg Confirmation_Pdf.exedescription pid process Token: SeDebugPrivilege 1100 Bookibg Confirmation_Pdf.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
Bookibg Confirmation_Pdf.exedescription pid process target process PID 1100 wrote to memory of 428 1100 Bookibg Confirmation_Pdf.exe Bookibg Confirmation_Pdf.exe PID 1100 wrote to memory of 428 1100 Bookibg Confirmation_Pdf.exe Bookibg Confirmation_Pdf.exe PID 1100 wrote to memory of 428 1100 Bookibg Confirmation_Pdf.exe Bookibg Confirmation_Pdf.exe PID 1100 wrote to memory of 428 1100 Bookibg Confirmation_Pdf.exe Bookibg Confirmation_Pdf.exe PID 1100 wrote to memory of 1008 1100 Bookibg Confirmation_Pdf.exe Bookibg Confirmation_Pdf.exe PID 1100 wrote to memory of 1008 1100 Bookibg Confirmation_Pdf.exe Bookibg Confirmation_Pdf.exe PID 1100 wrote to memory of 1008 1100 Bookibg Confirmation_Pdf.exe Bookibg Confirmation_Pdf.exe PID 1100 wrote to memory of 1008 1100 Bookibg Confirmation_Pdf.exe Bookibg Confirmation_Pdf.exe PID 1100 wrote to memory of 1120 1100 Bookibg Confirmation_Pdf.exe Bookibg Confirmation_Pdf.exe PID 1100 wrote to memory of 1120 1100 Bookibg Confirmation_Pdf.exe Bookibg Confirmation_Pdf.exe PID 1100 wrote to memory of 1120 1100 Bookibg Confirmation_Pdf.exe Bookibg Confirmation_Pdf.exe PID 1100 wrote to memory of 1120 1100 Bookibg Confirmation_Pdf.exe Bookibg Confirmation_Pdf.exe PID 1100 wrote to memory of 1256 1100 Bookibg Confirmation_Pdf.exe Bookibg Confirmation_Pdf.exe PID 1100 wrote to memory of 1256 1100 Bookibg Confirmation_Pdf.exe Bookibg Confirmation_Pdf.exe PID 1100 wrote to memory of 1256 1100 Bookibg Confirmation_Pdf.exe Bookibg Confirmation_Pdf.exe PID 1100 wrote to memory of 1256 1100 Bookibg Confirmation_Pdf.exe Bookibg Confirmation_Pdf.exe PID 1100 wrote to memory of 876 1100 Bookibg Confirmation_Pdf.exe Bookibg Confirmation_Pdf.exe PID 1100 wrote to memory of 876 1100 Bookibg Confirmation_Pdf.exe Bookibg Confirmation_Pdf.exe PID 1100 wrote to memory of 876 1100 Bookibg Confirmation_Pdf.exe Bookibg Confirmation_Pdf.exe PID 1100 wrote to memory of 876 1100 Bookibg Confirmation_Pdf.exe Bookibg Confirmation_Pdf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Bookibg Confirmation_Pdf.exe"C:\Users\Admin\AppData\Local\Temp\Bookibg Confirmation_Pdf.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Bookibg Confirmation_Pdf.exe"C:\Users\Admin\AppData\Local\Temp\Bookibg Confirmation_Pdf.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\Bookibg Confirmation_Pdf.exe"C:\Users\Admin\AppData\Local\Temp\Bookibg Confirmation_Pdf.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\Bookibg Confirmation_Pdf.exe"C:\Users\Admin\AppData\Local\Temp\Bookibg Confirmation_Pdf.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\Bookibg Confirmation_Pdf.exe"C:\Users\Admin\AppData\Local\Temp\Bookibg Confirmation_Pdf.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\Bookibg Confirmation_Pdf.exe"C:\Users\Admin\AppData\Local\Temp\Bookibg Confirmation_Pdf.exe"2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1100-2-0x0000000074360000-0x0000000074A4E000-memory.dmpFilesize
6.9MB
-
memory/1100-3-0x00000000003F0000-0x00000000003F1000-memory.dmpFilesize
4KB
-
memory/1100-5-0x0000000007360000-0x0000000007361000-memory.dmpFilesize
4KB
-
memory/1100-6-0x00000000004D0000-0x00000000004D3000-memory.dmpFilesize
12KB
-
memory/1100-7-0x00000000042D0000-0x0000000004324000-memory.dmpFilesize
336KB