Overview
overview
8Static
static
8Win32.Pega...15.xls
windows10_x64
1Win32.Pega...15.xls
windows10_x64
1Win32.Pega...?).doc
windows10_x64
1Win32.Pega...15.doc
windows10_x64
1Win32.Pega...min.js
windows10_x64
1Win32.Pega...min.js
windows10_x64
1Win32.Pega...ain.js
windows10_x64
1Win32.Pega...ble.js
windows10_x64
1Win32.Pega...min.js
windows10_x64
1Win32.Pega...min.js
windows10_x64
1Win32.Pega...min.js
windows10_x64
1Win32.Pega...x.html
windows10_x64
1Win32.Pega...vg.xml
windows10_x64
Win32.Pega...min.js
windows10_x64
1Win32.Pega...hp.vbs
windows10_x64
1Win32.Pega...hp.vbs
windows10_x64
1Win32.Pega...hp.vbs
windows10_x64
1Win32.Pega...php.js
windows10_x64
1Win32.Pega...ol.exe
windows10_x64
1Win32.Pega...gs.bat
windows10_x64
1Win32.Pega...ct.bat
windows10_x64
1Win32.Pega...es.bat
windows10_x64
1Win32.Pega...re.bat
windows10_x64
1Win32.Pega...er.bat
windows10_x64
1Win32.Pega...er.bat
windows10_x64
1Win32.Pega...hp.ps1
windows10_x64
Win32.Pega...RS.BAT
windows10_x64
1Win32.Pega...ck.exe
windows10_x64
1Win32.Pega...pp.vbs
windows10_x64
1Win32.Pega...pp.vbs
windows10_x64
1Win32.Pega...pp.vbs
windows10_x64
1Win32.Pega...pp.vbs
windows10_x64
1Analysis
-
max time kernel
303s -
max time network
722s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
23-07-2021 09:33
Behavioral task
behavioral1
Sample
Win32.Pegasus/cvs_banks/????????? (500) 30 06 2015.xls
Resource
win10v20210408
Behavioral task
behavioral2
Sample
Win32.Pegasus/cvs_banks/????????? (485) 24 08 2015.xls
Resource
win10v20210410
Behavioral task
behavioral3
Sample
Win32.Pegasus/cvs_banks/?????? ?? ?????? ?. ???????? ?? 13.02.2013 (?? ??????? ????????).doc
Resource
win10v20210410
Behavioral task
behavioral4
Sample
Win32.Pegasus/cvs_banks/?? ?????? ?? 17.11.2015.doc
Resource
win10v20210408
Behavioral task
behavioral5
Sample
Win32.Pegasus/Pegasus/web-adminpart/res/pnotify.custom.min.js
Resource
win10v20210410
Behavioral task
behavioral6
Sample
Win32.Pegasus/Pegasus/web-adminpart/res/messi.min.js
Resource
win10v20210408
Behavioral task
behavioral7
Sample
Win32.Pegasus/Pegasus/web-adminpart/res/main.js
Resource
win10v20210410
Behavioral task
behavioral8
Sample
Win32.Pegasus/Pegasus/web-adminpart/res/jquery.jeditable.js
Resource
win10v20210408
Behavioral task
behavioral9
Sample
Win32.Pegasus/Pegasus/web-adminpart/res/jquery.form.min.js
Resource
win10v20210410
Behavioral task
behavioral10
Sample
Win32.Pegasus/Pegasus/web-adminpart/res/jquery-ui.min.js
Resource
win10v20210410
Behavioral task
behavioral11
Sample
Win32.Pegasus/Pegasus/web-adminpart/res/jquery-1.11.2.min.js
Resource
win10v20210408
Behavioral task
behavioral12
Sample
Win32.Pegasus/Pegasus/web-adminpart/res/index.html
Resource
win10v20210410
Behavioral task
behavioral13
Sample
Win32.Pegasus/Pegasus/web-adminpart/res/glyphicons-halflings-regular.svg.xml
Resource
win10v20210408
Behavioral task
behavioral14
Sample
Win32.Pegasus/Pegasus/web-adminpart/res/bootstrap.min.js
Resource
win10v20210410
Behavioral task
behavioral15
Sample
Win32.Pegasus/Pegasus/web-adminpart/inc/mod_auth.php.vbs
Resource
win10v20210408
Behavioral task
behavioral16
Sample
Win32.Pegasus/Pegasus/web-adminpart/inc/mod_ajax_mjobs.php.vbs
Resource
win10v20210410
Behavioral task
behavioral17
Sample
Win32.Pegasus/Pegasus/web-adminpart/inc/mod_ajax_mcreds.php.vbs
Resource
win10v20210410
Behavioral task
behavioral18
Sample
Win32.Pegasus/Pegasus/web-adminpart/inc/ip2location.class.php.js
Resource
win10v20210408
Behavioral task
behavioral19
Sample
Win32.Pegasus/Pegasus/tools/signtool.exe
Resource
win10v20210410
Behavioral task
behavioral20
Sample
Win32.Pegasus/Pegasus/tools/recrypt_strings.bat
Resource
win10v20210408
Behavioral task
behavioral21
Sample
Win32.Pegasus/Pegasus/tools/rebuild_project.bat
Resource
win10v20210410
Behavioral task
behavioral22
Sample
Win32.Pegasus/Pegasus/tools/rebuild_modules.bat
Resource
win10v20210408
Behavioral task
behavioral23
Sample
Win32.Pegasus/Pegasus/tools/rebuild_core.bat
Resource
win10v20210410
Behavioral task
behavioral24
Sample
Win32.Pegasus/Pegasus/tools/prebuild_installer.bat
Resource
win10v20210410
Behavioral task
behavioral25
Sample
Win32.Pegasus/Pegasus/tools/postbuild_installer.bat
Resource
win10v20210408
Behavioral task
behavioral26
Sample
Win32.Pegasus/Pegasus/tools/make_binpack.php.ps1
Resource
win10v20210410
Behavioral task
behavioral27
Sample
Win32.Pegasus/Pegasus/tools/MAKE_INSTALLERS.BAT
Resource
win10v20210408
Behavioral task
behavioral28
Sample
Win32.Pegasus/Pegasus/tools/LZ4_pack.exe
Resource
win10v20210410
Behavioral task
behavioral29
Sample
Win32.Pegasus/Pegasus/shared/CommStructures.cpp.vbs
Resource
win10v20210408
Behavioral task
behavioral30
Sample
Win32.Pegasus/Pegasus/mod_NetworkConnectivity/transport_Generic.cpp.vbs
Resource
win10v20210410
Behavioral task
behavioral31
Sample
Win32.Pegasus/Pegasus/mod_KBRI/kbriTargetAccManager.cpp.vbs
Resource
win10v20210410
Behavioral task
behavioral32
Sample
Win32.Pegasus/Pegasus/mod_KBRI/kbriList.cpp.vbs
Resource
win10v20210408
General
-
Target
Win32.Pegasus/cvs_banks/????????? (500) 30 06 2015.xls
-
Size
728KB
-
MD5
70a522656967d3b087e89cce095e2566
-
SHA1
dd0273081f91eea5cc0e7515e560bde667aabf78
-
SHA256
1e7cf28d1354121974a4bd3f6630d4473798836e73437905ed692f92e4cea67e
-
SHA512
ce9dfba7abe0f01a68a1e56e9c1dd3000eaa3f10f032aee404ce39a4c47e4ef8691835bee5bbfe400e182a93043264ea3fc8a16f12d33e81de4a1b8a802ecc72
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 4800 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
EXCEL.EXEpid process 4800 EXCEL.EXE 4800 EXCEL.EXE 4800 EXCEL.EXE 4800 EXCEL.EXE 4800 EXCEL.EXE 4800 EXCEL.EXE 4800 EXCEL.EXE 4800 EXCEL.EXE 4800 EXCEL.EXE 4800 EXCEL.EXE 4800 EXCEL.EXE 4800 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Win32.Pegasus\cvs_banks\_________ (500) 30 06 2015.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4800-117-0x00007FF7A6CC0000-0x00007FF7AA276000-memory.dmpFilesize
53.7MB
-
memory/4800-118-0x00007FFD6E7C0000-0x00007FFD6E7D0000-memory.dmpFilesize
64KB
-
memory/4800-119-0x00007FFD6E7C0000-0x00007FFD6E7D0000-memory.dmpFilesize
64KB
-
memory/4800-120-0x00007FFD6E7C0000-0x00007FFD6E7D0000-memory.dmpFilesize
64KB
-
memory/4800-121-0x00007FFD6E7C0000-0x00007FFD6E7D0000-memory.dmpFilesize
64KB
-
memory/4800-124-0x00007FFD6E7C0000-0x00007FFD6E7D0000-memory.dmpFilesize
64KB
-
memory/4800-125-0x00007FFD8F730000-0x00007FFD9081E000-memory.dmpFilesize
16.9MB
-
memory/4800-126-0x000002B6750A0000-0x000002B676F95000-memory.dmpFilesize
31.0MB
-
memory/4800-276-0x00007FFD6E7C0000-0x00007FFD6E7D0000-memory.dmpFilesize
64KB
-
memory/4800-277-0x00007FFD6E7C0000-0x00007FFD6E7D0000-memory.dmpFilesize
64KB
-
memory/4800-278-0x00007FFD6E7C0000-0x00007FFD6E7D0000-memory.dmpFilesize
64KB
-
memory/4800-279-0x00007FFD6E7C0000-0x00007FFD6E7D0000-memory.dmpFilesize
64KB