Analysis

  • max time kernel
    364s
  • max time network
    848s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    23-07-2021 09:33

General

  • Target

    Win32.Pegasus/cvs_banks/?????? ?? ?????? ?. ???????? ?? 13.02.2013 (?? ??????? ????????).doc

  • Size

    303KB

  • MD5

    f6148dd98047b697eb1a69d5c19f0f85

  • SHA1

    6aff9ace4b23b33dfa76b29f2c9560fd53e79ed0

  • SHA256

    a963582c6eeebd471bc883a4c6c5aea0c258bf29c5c1f09cb931b4a8d2276282

  • SHA512

    67de1faabe58433e1dfc3485fa0ea2ff94e2be05c8c99f888989e78a4399f387373498dae3e78c0bb6baf70500d65543a4106a8af72f73add9512c4d471f33a2

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Win32.Pegasus\cvs_banks\______ __ ______ _. ________ __ 13.02.2013 (__ _______ ________).doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:512

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/512-114-0x00007FF949B80000-0x00007FF949B90000-memory.dmp
    Filesize

    64KB

  • memory/512-115-0x00007FF949B80000-0x00007FF949B90000-memory.dmp
    Filesize

    64KB

  • memory/512-116-0x00007FF949B80000-0x00007FF949B90000-memory.dmp
    Filesize

    64KB

  • memory/512-117-0x00007FF949B80000-0x00007FF949B90000-memory.dmp
    Filesize

    64KB

  • memory/512-119-0x00007FF949B80000-0x00007FF949B90000-memory.dmp
    Filesize

    64KB

  • memory/512-118-0x00007FF96B0E0000-0x00007FF96DC03000-memory.dmp
    Filesize

    43.1MB

  • memory/512-122-0x00007FF9648A0000-0x00007FF96598E000-memory.dmp
    Filesize

    16.9MB

  • memory/512-123-0x00007FF9629A0000-0x00007FF964895000-memory.dmp
    Filesize

    31.0MB

  • memory/512-338-0x00007FF949B80000-0x00007FF949B90000-memory.dmp
    Filesize

    64KB

  • memory/512-339-0x00007FF949B80000-0x00007FF949B90000-memory.dmp
    Filesize

    64KB

  • memory/512-340-0x00007FF949B80000-0x00007FF949B90000-memory.dmp
    Filesize

    64KB

  • memory/512-341-0x00007FF949B80000-0x00007FF949B90000-memory.dmp
    Filesize

    64KB