Analysis
-
max time kernel
140s -
max time network
150s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
08-03-2021 21:59
Static task
static1
Behavioral task
behavioral1
Sample
Booking Confirmation 1104202403251 - copy - PDF.exe
Resource
win7v20201028
0 signatures
0 seconds
General
-
Target
Booking Confirmation 1104202403251 - copy - PDF.exe
-
Size
344KB
-
MD5
f4f48519f108900933d0dd0e8aa1f40f
-
SHA1
5a48020b486ab74eea85cf88d647dc2ba0994ace
-
SHA256
f6d2fe1a8ba40429708ec5c70159fcff0e9741ea260ea93e3665d6ea752f96d3
-
SHA512
d02dc186871c344bddac7ae1a5c1e9c72014e106dfdbe1c565bf7a56ae052b10f7abb69f34010f5315752766bc40a86d1f9e20da2c8c70f7c0aef053ab3248a1
Malware Config
Signatures
-
Beds Protector Packer 1 IoCs
Detects Beds Protector packer used to load .NET malware.
resource yara_rule behavioral1/memory/1108-5-0x0000000001F00000-0x0000000001F4B000-memory.dmp beds_protector -
HiveRAT Payload 4 IoCs
resource yara_rule behavioral1/memory/892-47-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral1/memory/892-48-0x000000000044C7BE-mapping.dmp family_hiverat behavioral1/memory/892-50-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral1/memory/892-52-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Booking Confirmation 1104202403251 - copy - PDF.exe Booking Confirmation 1104202403251 - copy - PDF.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 476 set thread context of 892 476 Booking Confirmation 1104202403251 - copy - PDF.exe 35 -
Delays execution with timeout.exe 1 IoCs
pid Process 1400 timeout.exe -
Suspicious behavior: EnumeratesProcesses 57 IoCs
pid Process 1108 Booking Confirmation 1104202403251 - copy - PDF.exe 1108 Booking Confirmation 1104202403251 - copy - PDF.exe 1108 Booking Confirmation 1104202403251 - copy - PDF.exe 1108 Booking Confirmation 1104202403251 - copy - PDF.exe 1108 Booking Confirmation 1104202403251 - copy - PDF.exe 1108 Booking Confirmation 1104202403251 - copy - PDF.exe 1108 Booking Confirmation 1104202403251 - copy - PDF.exe 1108 Booking Confirmation 1104202403251 - copy - PDF.exe 1108 Booking Confirmation 1104202403251 - copy - PDF.exe 1108 Booking Confirmation 1104202403251 - copy - PDF.exe 1108 Booking Confirmation 1104202403251 - copy - PDF.exe 1108 Booking Confirmation 1104202403251 - copy - PDF.exe 1108 Booking Confirmation 1104202403251 - copy - PDF.exe 1108 Booking Confirmation 1104202403251 - copy - PDF.exe 1108 Booking Confirmation 1104202403251 - copy - PDF.exe 1108 Booking Confirmation 1104202403251 - copy - PDF.exe 1108 Booking Confirmation 1104202403251 - copy - PDF.exe 1108 Booking Confirmation 1104202403251 - copy - PDF.exe 1564 powershell.exe 1564 powershell.exe 476 Booking Confirmation 1104202403251 - copy - PDF.exe 476 Booking Confirmation 1104202403251 - copy - PDF.exe 476 Booking Confirmation 1104202403251 - copy - PDF.exe 476 Booking Confirmation 1104202403251 - copy - PDF.exe 476 Booking Confirmation 1104202403251 - copy - PDF.exe 476 Booking Confirmation 1104202403251 - copy - PDF.exe 476 Booking Confirmation 1104202403251 - copy - PDF.exe 476 Booking Confirmation 1104202403251 - copy - PDF.exe 476 Booking Confirmation 1104202403251 - copy - PDF.exe 476 Booking Confirmation 1104202403251 - copy - PDF.exe 476 Booking Confirmation 1104202403251 - copy - PDF.exe 476 Booking Confirmation 1104202403251 - copy - PDF.exe 476 Booking Confirmation 1104202403251 - copy - PDF.exe 476 Booking Confirmation 1104202403251 - copy - PDF.exe 476 Booking Confirmation 1104202403251 - copy - PDF.exe 476 Booking Confirmation 1104202403251 - copy - PDF.exe 476 Booking Confirmation 1104202403251 - copy - PDF.exe 476 Booking Confirmation 1104202403251 - copy - PDF.exe 476 Booking Confirmation 1104202403251 - copy - PDF.exe 476 Booking Confirmation 1104202403251 - copy - PDF.exe 476 Booking Confirmation 1104202403251 - copy - PDF.exe 476 Booking Confirmation 1104202403251 - copy - PDF.exe 476 Booking Confirmation 1104202403251 - copy - PDF.exe 476 Booking Confirmation 1104202403251 - copy - PDF.exe 476 Booking Confirmation 1104202403251 - copy - PDF.exe 476 Booking Confirmation 1104202403251 - copy - PDF.exe 476 Booking Confirmation 1104202403251 - copy - PDF.exe 476 Booking Confirmation 1104202403251 - copy - PDF.exe 476 Booking Confirmation 1104202403251 - copy - PDF.exe 476 Booking Confirmation 1104202403251 - copy - PDF.exe 476 Booking Confirmation 1104202403251 - copy - PDF.exe 476 Booking Confirmation 1104202403251 - copy - PDF.exe 476 Booking Confirmation 1104202403251 - copy - PDF.exe 476 Booking Confirmation 1104202403251 - copy - PDF.exe 476 Booking Confirmation 1104202403251 - copy - PDF.exe 476 Booking Confirmation 1104202403251 - copy - PDF.exe 476 Booking Confirmation 1104202403251 - copy - PDF.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1940 WScript.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1108 Booking Confirmation 1104202403251 - copy - PDF.exe Token: SeDebugPrivilege 1564 powershell.exe Token: SeDebugPrivilege 476 Booking Confirmation 1104202403251 - copy - PDF.exe Token: SeDebugPrivilege 892 Booking Confirmation 1104202403251 - copy - PDF.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1108 wrote to memory of 1692 1108 Booking Confirmation 1104202403251 - copy - PDF.exe 29 PID 1108 wrote to memory of 1692 1108 Booking Confirmation 1104202403251 - copy - PDF.exe 29 PID 1108 wrote to memory of 1692 1108 Booking Confirmation 1104202403251 - copy - PDF.exe 29 PID 1108 wrote to memory of 1692 1108 Booking Confirmation 1104202403251 - copy - PDF.exe 29 PID 1692 wrote to memory of 1400 1692 cmd.exe 31 PID 1692 wrote to memory of 1400 1692 cmd.exe 31 PID 1692 wrote to memory of 1400 1692 cmd.exe 31 PID 1692 wrote to memory of 1400 1692 cmd.exe 31 PID 1692 wrote to memory of 1564 1692 cmd.exe 32 PID 1692 wrote to memory of 1564 1692 cmd.exe 32 PID 1692 wrote to memory of 1564 1692 cmd.exe 32 PID 1692 wrote to memory of 1564 1692 cmd.exe 32 PID 1564 wrote to memory of 1940 1564 powershell.exe 33 PID 1564 wrote to memory of 1940 1564 powershell.exe 33 PID 1564 wrote to memory of 1940 1564 powershell.exe 33 PID 1564 wrote to memory of 1940 1564 powershell.exe 33 PID 1564 wrote to memory of 476 1564 powershell.exe 34 PID 1564 wrote to memory of 476 1564 powershell.exe 34 PID 1564 wrote to memory of 476 1564 powershell.exe 34 PID 1564 wrote to memory of 476 1564 powershell.exe 34 PID 476 wrote to memory of 892 476 Booking Confirmation 1104202403251 - copy - PDF.exe 35 PID 476 wrote to memory of 892 476 Booking Confirmation 1104202403251 - copy - PDF.exe 35 PID 476 wrote to memory of 892 476 Booking Confirmation 1104202403251 - copy - PDF.exe 35 PID 476 wrote to memory of 892 476 Booking Confirmation 1104202403251 - copy - PDF.exe 35 PID 476 wrote to memory of 892 476 Booking Confirmation 1104202403251 - copy - PDF.exe 35 PID 476 wrote to memory of 892 476 Booking Confirmation 1104202403251 - copy - PDF.exe 35 PID 476 wrote to memory of 892 476 Booking Confirmation 1104202403251 - copy - PDF.exe 35 PID 476 wrote to memory of 892 476 Booking Confirmation 1104202403251 - copy - PDF.exe 35 PID 476 wrote to memory of 892 476 Booking Confirmation 1104202403251 - copy - PDF.exe 35 PID 476 wrote to memory of 892 476 Booking Confirmation 1104202403251 - copy - PDF.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\Booking Confirmation 1104202403251 - copy - PDF.exe"C:\Users\Admin\AppData\Local\Temp\Booking Confirmation 1104202403251 - copy - PDF.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Windows\SysWOW64\cmd.execmd.exe /c timeout 5 & powershell -command Start-Process -WindowStyle hidden -FilePath 'C:\Users\Admin\AppData\Local\Temp\\46692.js'; Start-Sleep -s 5; Start-Process -WindowStyle hidden -FilePath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Booking Confirmation 1104202403251 - copy - PDF.exe'2⤵
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\SysWOW64\timeout.exetimeout 53⤵
- Delays execution with timeout.exe
PID:1400
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command Start-Process -WindowStyle hidden -FilePath 'C:\Users\Admin\AppData\Local\Temp\\46692.js'; Start-Sleep -s 5; Start-Process -WindowStyle hidden -FilePath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Booking Confirmation 1104202403251 - copy - PDF.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\46692.js"4⤵
- Suspicious behavior: RenamesItself
PID:1940
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Booking Confirmation 1104202403251 - copy - PDF.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Booking Confirmation 1104202403251 - copy - PDF.exe"4⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:476 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Booking Confirmation 1104202403251 - copy - PDF.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Booking Confirmation 1104202403251 - copy - PDF.exe"5⤵
- Suspicious use of AdjustPrivilegeToken
PID:892
-
-
-
-