Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
23-04-2021 12:06
Static task
static1
Behavioral task
behavioral1
Sample
CONFIRM ORDER_O452-11189H6U77,pdf.exe
Resource
win7v20210410
General
-
Target
CONFIRM ORDER_O452-11189H6U77,pdf.exe
-
Size
743KB
-
MD5
a10b06acd92325678e2b960544c9257f
-
SHA1
754dfa9962325d7ad6676779bafcd8b5e18d6978
-
SHA256
6ce1eb96c697ce276022f1a14fe7da73f910487fcfb384d676b28aa55f0c05ca
-
SHA512
8fef2e063e121fdf49f2d1fedb35aa6bd17fcf15e775f2460d473f13783e9e9f256765c3da6b7aa8334dd096d69c6b5774ba1ee7f703f6e07a4acaabdcc0a249
Malware Config
Extracted
remcos
goddywin.freedynamicdns.net:6712
Signatures
-
Looks for VirtualBox Guest Additions in registry 2 TTPs
-
Looks for VMWare Tools registry key 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
CONFIRM ORDER_O452-11189H6U77,pdf.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion CONFIRM ORDER_O452-11189H6U77,pdf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion CONFIRM ORDER_O452-11189H6U77,pdf.exe -
Uses the VBS compiler for execution 1 TTPs
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
CONFIRM ORDER_O452-11189H6U77,pdf.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum CONFIRM ORDER_O452-11189H6U77,pdf.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 CONFIRM ORDER_O452-11189H6U77,pdf.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
CONFIRM ORDER_O452-11189H6U77,pdf.exedescription pid process target process PID 1456 set thread context of 3176 1456 CONFIRM ORDER_O452-11189H6U77,pdf.exe vbc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
CONFIRM ORDER_O452-11189H6U77,pdf.exepowershell.exepowershell.exepowershell.exepid process 1456 CONFIRM ORDER_O452-11189H6U77,pdf.exe 1456 CONFIRM ORDER_O452-11189H6U77,pdf.exe 1456 CONFIRM ORDER_O452-11189H6U77,pdf.exe 2056 powershell.exe 1228 powershell.exe 1716 powershell.exe 1228 powershell.exe 2056 powershell.exe 1716 powershell.exe 1228 powershell.exe 2056 powershell.exe 1716 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
CONFIRM ORDER_O452-11189H6U77,pdf.exepowershell.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 1456 CONFIRM ORDER_O452-11189H6U77,pdf.exe Token: SeDebugPrivilege 2056 powershell.exe Token: SeDebugPrivilege 1228 powershell.exe Token: SeDebugPrivilege 1716 powershell.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
CONFIRM ORDER_O452-11189H6U77,pdf.exedescription pid process target process PID 1456 wrote to memory of 2056 1456 CONFIRM ORDER_O452-11189H6U77,pdf.exe powershell.exe PID 1456 wrote to memory of 2056 1456 CONFIRM ORDER_O452-11189H6U77,pdf.exe powershell.exe PID 1456 wrote to memory of 2056 1456 CONFIRM ORDER_O452-11189H6U77,pdf.exe powershell.exe PID 1456 wrote to memory of 1228 1456 CONFIRM ORDER_O452-11189H6U77,pdf.exe powershell.exe PID 1456 wrote to memory of 1228 1456 CONFIRM ORDER_O452-11189H6U77,pdf.exe powershell.exe PID 1456 wrote to memory of 1228 1456 CONFIRM ORDER_O452-11189H6U77,pdf.exe powershell.exe PID 1456 wrote to memory of 3020 1456 CONFIRM ORDER_O452-11189H6U77,pdf.exe schtasks.exe PID 1456 wrote to memory of 3020 1456 CONFIRM ORDER_O452-11189H6U77,pdf.exe schtasks.exe PID 1456 wrote to memory of 3020 1456 CONFIRM ORDER_O452-11189H6U77,pdf.exe schtasks.exe PID 1456 wrote to memory of 1716 1456 CONFIRM ORDER_O452-11189H6U77,pdf.exe powershell.exe PID 1456 wrote to memory of 1716 1456 CONFIRM ORDER_O452-11189H6U77,pdf.exe powershell.exe PID 1456 wrote to memory of 1716 1456 CONFIRM ORDER_O452-11189H6U77,pdf.exe powershell.exe PID 1456 wrote to memory of 3176 1456 CONFIRM ORDER_O452-11189H6U77,pdf.exe vbc.exe PID 1456 wrote to memory of 3176 1456 CONFIRM ORDER_O452-11189H6U77,pdf.exe vbc.exe PID 1456 wrote to memory of 3176 1456 CONFIRM ORDER_O452-11189H6U77,pdf.exe vbc.exe PID 1456 wrote to memory of 3176 1456 CONFIRM ORDER_O452-11189H6U77,pdf.exe vbc.exe PID 1456 wrote to memory of 3176 1456 CONFIRM ORDER_O452-11189H6U77,pdf.exe vbc.exe PID 1456 wrote to memory of 3176 1456 CONFIRM ORDER_O452-11189H6U77,pdf.exe vbc.exe PID 1456 wrote to memory of 3176 1456 CONFIRM ORDER_O452-11189H6U77,pdf.exe vbc.exe PID 1456 wrote to memory of 3176 1456 CONFIRM ORDER_O452-11189H6U77,pdf.exe vbc.exe PID 1456 wrote to memory of 3176 1456 CONFIRM ORDER_O452-11189H6U77,pdf.exe vbc.exe PID 1456 wrote to memory of 3176 1456 CONFIRM ORDER_O452-11189H6U77,pdf.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\CONFIRM ORDER_O452-11189H6U77,pdf.exe"C:\Users\Admin\AppData\Local\Temp\CONFIRM ORDER_O452-11189H6U77,pdf.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\CONFIRM ORDER_O452-11189H6U77,pdf.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\JttnSaHiiAm.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JttnSaHiiAm" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4811.tmp"2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\JttnSaHiiAm.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logMD5
db01a2c1c7e70b2b038edf8ad5ad9826
SHA1540217c647a73bad8d8a79e3a0f3998b5abd199b
SHA256413da361d77055dae7007f82b58b366c8783aa72e0b8fbe41519b940c253b38d
SHA512c76ff57fcee5cdf9fdf3116d4e1dc0cf106867bf19ab474b763e242acf5dca9a7509cb837c35e130c3e056636b4e8a4e135512a978bcd3dd641e20f5bf76c3d6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
a18d6f90107e3696d0f9421aa3c2a8ef
SHA122880ca374966d658f05ac9574b7ea5e0ead16fb
SHA256f89de61ae0ca16c79e369174cb050d16b9fc1f1c33be0cfef06ed51496144ba2
SHA512cf574e6769fe9c8110460d9f6f965c8a6c338f1fcb0b55d2dca4afb970769820b26c34e2e8c75a61d499d96f16dff6c8cc3100bb88c7ff65132fee23fc468e1c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
68fb6dbbe9b5e5039d3dad876fdf545d
SHA1befdc1701a51678156707f584452a53240ee06b7
SHA256572f8a3e68893e83202fdefe7b788613ee288ad2772bfddcc0fbd6de39dfc1b5
SHA512ca603c79776f4baabfafb2486134d97aad0d0e01332a6916a7e143f571d4e1b762f0db7d5d4376aa25549bb50f0ccd995eed0b07e62df40869564256096efb46
-
C:\Users\Admin\AppData\Local\Temp\tmp4811.tmpMD5
4f8383bc721b4ad13c3bb3d8e8b42dd7
SHA1aa178422d97cc912d6e330e64464773f33d81744
SHA256be24d0a7974e9e88560480254e7f73e964d0c21e7ff50b1ffcff36392bb16e06
SHA5122664ab1ae379b2740ccbf9ac838ea80d8687a133a49ae9dd4bddc3b71b88ddfb5b16194c7aa4831aea3870102c5dde02c5ff84c47360dc3275a1aa31cbf9f88e
-
memory/1228-168-0x0000000008560000-0x0000000008561000-memory.dmpFilesize
4KB
-
memory/1228-141-0x0000000006FF0000-0x0000000006FF1000-memory.dmpFilesize
4KB
-
memory/1228-143-0x0000000006FF2000-0x0000000006FF3000-memory.dmpFilesize
4KB
-
memory/1228-171-0x0000000008380000-0x0000000008381000-memory.dmpFilesize
4KB
-
memory/1228-192-0x000000007EDE0000-0x000000007EDE1000-memory.dmpFilesize
4KB
-
memory/1228-195-0x0000000006FF3000-0x0000000006FF4000-memory.dmpFilesize
4KB
-
memory/1228-130-0x0000000000000000-mapping.dmp
-
memory/1456-121-0x0000000005C80000-0x0000000005C8D000-memory.dmpFilesize
52KB
-
memory/1456-114-0x0000000000FA0000-0x0000000000FA1000-memory.dmpFilesize
4KB
-
memory/1456-125-0x000000000C3B0000-0x000000000C3B1000-memory.dmpFilesize
4KB
-
memory/1456-118-0x0000000005AF0000-0x0000000005AF1000-memory.dmpFilesize
4KB
-
memory/1456-116-0x0000000005FF0000-0x0000000005FF1000-memory.dmpFilesize
4KB
-
memory/1456-119-0x00000000059B0000-0x00000000059B1000-memory.dmpFilesize
4KB
-
memory/1456-123-0x0000000001920000-0x0000000001957000-memory.dmpFilesize
220KB
-
memory/1456-120-0x0000000005AF0000-0x0000000005FEE000-memory.dmpFilesize
5.0MB
-
memory/1456-117-0x0000000005A00000-0x0000000005A01000-memory.dmpFilesize
4KB
-
memory/1456-122-0x0000000001860000-0x00000000018D5000-memory.dmpFilesize
468KB
-
memory/1716-196-0x0000000004C13000-0x0000000004C14000-memory.dmpFilesize
4KB
-
memory/1716-163-0x0000000004C10000-0x0000000004C11000-memory.dmpFilesize
4KB
-
memory/1716-144-0x0000000000000000-mapping.dmp
-
memory/1716-194-0x000000007FA30000-0x000000007FA31000-memory.dmpFilesize
4KB
-
memory/1716-164-0x0000000004C12000-0x0000000004C13000-memory.dmpFilesize
4KB
-
memory/2056-193-0x000000007ECD0000-0x000000007ECD1000-memory.dmpFilesize
4KB
-
memory/2056-129-0x0000000007920000-0x0000000007921000-memory.dmpFilesize
4KB
-
memory/2056-124-0x0000000000000000-mapping.dmp
-
memory/2056-165-0x0000000008270000-0x0000000008271000-memory.dmpFilesize
4KB
-
memory/2056-146-0x00000000082E0000-0x00000000082E1000-memory.dmpFilesize
4KB
-
memory/2056-140-0x00000000072E2000-0x00000000072E3000-memory.dmpFilesize
4KB
-
memory/2056-138-0x00000000072E0000-0x00000000072E1000-memory.dmpFilesize
4KB
-
memory/2056-139-0x0000000008100000-0x0000000008101000-memory.dmpFilesize
4KB
-
memory/2056-136-0x0000000007F80000-0x0000000007F81000-memory.dmpFilesize
4KB
-
memory/2056-128-0x0000000007240000-0x0000000007241000-memory.dmpFilesize
4KB
-
memory/2056-197-0x00000000072E3000-0x00000000072E4000-memory.dmpFilesize
4KB
-
memory/3020-131-0x0000000000000000-mapping.dmp
-
memory/3176-162-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/3176-148-0x0000000000413FA4-mapping.dmp
-
memory/3176-147-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB