Overview
overview
8Static
static
8Win32.Pega...15.xls
windows10_x64
1Win32.Pega...15.xls
windows10_x64
1Win32.Pega...?).doc
windows10_x64
1Win32.Pega...15.doc
windows10_x64
1Win32.Pega...min.js
windows10_x64
1Win32.Pega...min.js
windows10_x64
1Win32.Pega...ain.js
windows10_x64
1Win32.Pega...ble.js
windows10_x64
1Win32.Pega...min.js
windows10_x64
1Win32.Pega...min.js
windows10_x64
1Win32.Pega...min.js
windows10_x64
1Win32.Pega...x.html
windows10_x64
1Win32.Pega...vg.xml
windows10_x64
Win32.Pega...min.js
windows10_x64
1Win32.Pega...hp.vbs
windows10_x64
1Win32.Pega...hp.vbs
windows10_x64
1Win32.Pega...hp.vbs
windows10_x64
1Win32.Pega...php.js
windows10_x64
1Win32.Pega...ol.exe
windows10_x64
1Win32.Pega...gs.bat
windows10_x64
1Win32.Pega...ct.bat
windows10_x64
1Win32.Pega...es.bat
windows10_x64
1Win32.Pega...re.bat
windows10_x64
1Win32.Pega...er.bat
windows10_x64
1Win32.Pega...er.bat
windows10_x64
1Win32.Pega...hp.ps1
windows10_x64
Win32.Pega...RS.BAT
windows10_x64
1Win32.Pega...ck.exe
windows10_x64
1Win32.Pega...pp.vbs
windows10_x64
1Win32.Pega...pp.vbs
windows10_x64
1Win32.Pega...pp.vbs
windows10_x64
1Win32.Pega...pp.vbs
windows10_x64
1Analysis
-
max time kernel
236s -
max time network
356s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
23-07-2021 09:33
Behavioral task
behavioral1
Sample
Win32.Pegasus/cvs_banks/????????? (500) 30 06 2015.xls
Resource
win10v20210408
Behavioral task
behavioral2
Sample
Win32.Pegasus/cvs_banks/????????? (485) 24 08 2015.xls
Resource
win10v20210410
Behavioral task
behavioral3
Sample
Win32.Pegasus/cvs_banks/?????? ?? ?????? ?. ???????? ?? 13.02.2013 (?? ??????? ????????).doc
Resource
win10v20210410
Behavioral task
behavioral4
Sample
Win32.Pegasus/cvs_banks/?? ?????? ?? 17.11.2015.doc
Resource
win10v20210408
Behavioral task
behavioral5
Sample
Win32.Pegasus/Pegasus/web-adminpart/res/pnotify.custom.min.js
Resource
win10v20210410
Behavioral task
behavioral6
Sample
Win32.Pegasus/Pegasus/web-adminpart/res/messi.min.js
Resource
win10v20210408
Behavioral task
behavioral7
Sample
Win32.Pegasus/Pegasus/web-adminpart/res/main.js
Resource
win10v20210410
Behavioral task
behavioral8
Sample
Win32.Pegasus/Pegasus/web-adminpart/res/jquery.jeditable.js
Resource
win10v20210408
Behavioral task
behavioral9
Sample
Win32.Pegasus/Pegasus/web-adminpart/res/jquery.form.min.js
Resource
win10v20210410
Behavioral task
behavioral10
Sample
Win32.Pegasus/Pegasus/web-adminpart/res/jquery-ui.min.js
Resource
win10v20210410
Behavioral task
behavioral11
Sample
Win32.Pegasus/Pegasus/web-adminpart/res/jquery-1.11.2.min.js
Resource
win10v20210408
Behavioral task
behavioral12
Sample
Win32.Pegasus/Pegasus/web-adminpart/res/index.html
Resource
win10v20210410
Behavioral task
behavioral13
Sample
Win32.Pegasus/Pegasus/web-adminpart/res/glyphicons-halflings-regular.svg.xml
Resource
win10v20210408
Behavioral task
behavioral14
Sample
Win32.Pegasus/Pegasus/web-adminpart/res/bootstrap.min.js
Resource
win10v20210410
Behavioral task
behavioral15
Sample
Win32.Pegasus/Pegasus/web-adminpart/inc/mod_auth.php.vbs
Resource
win10v20210408
Behavioral task
behavioral16
Sample
Win32.Pegasus/Pegasus/web-adminpart/inc/mod_ajax_mjobs.php.vbs
Resource
win10v20210410
Behavioral task
behavioral17
Sample
Win32.Pegasus/Pegasus/web-adminpart/inc/mod_ajax_mcreds.php.vbs
Resource
win10v20210410
Behavioral task
behavioral18
Sample
Win32.Pegasus/Pegasus/web-adminpart/inc/ip2location.class.php.js
Resource
win10v20210408
Behavioral task
behavioral19
Sample
Win32.Pegasus/Pegasus/tools/signtool.exe
Resource
win10v20210410
Behavioral task
behavioral20
Sample
Win32.Pegasus/Pegasus/tools/recrypt_strings.bat
Resource
win10v20210408
Behavioral task
behavioral21
Sample
Win32.Pegasus/Pegasus/tools/rebuild_project.bat
Resource
win10v20210410
Behavioral task
behavioral22
Sample
Win32.Pegasus/Pegasus/tools/rebuild_modules.bat
Resource
win10v20210408
Behavioral task
behavioral23
Sample
Win32.Pegasus/Pegasus/tools/rebuild_core.bat
Resource
win10v20210410
Behavioral task
behavioral24
Sample
Win32.Pegasus/Pegasus/tools/prebuild_installer.bat
Resource
win10v20210410
Behavioral task
behavioral25
Sample
Win32.Pegasus/Pegasus/tools/postbuild_installer.bat
Resource
win10v20210408
Behavioral task
behavioral26
Sample
Win32.Pegasus/Pegasus/tools/make_binpack.php.ps1
Resource
win10v20210410
Behavioral task
behavioral27
Sample
Win32.Pegasus/Pegasus/tools/MAKE_INSTALLERS.BAT
Resource
win10v20210408
Behavioral task
behavioral28
Sample
Win32.Pegasus/Pegasus/tools/LZ4_pack.exe
Resource
win10v20210410
Behavioral task
behavioral29
Sample
Win32.Pegasus/Pegasus/shared/CommStructures.cpp.vbs
Resource
win10v20210408
Behavioral task
behavioral30
Sample
Win32.Pegasus/Pegasus/mod_NetworkConnectivity/transport_Generic.cpp.vbs
Resource
win10v20210410
Behavioral task
behavioral31
Sample
Win32.Pegasus/Pegasus/mod_KBRI/kbriTargetAccManager.cpp.vbs
Resource
win10v20210410
Behavioral task
behavioral32
Sample
Win32.Pegasus/Pegasus/mod_KBRI/kbriList.cpp.vbs
Resource
win10v20210408
General
-
Target
Win32.Pegasus/cvs_banks/?? ?????? ?? 17.11.2015.doc
-
Size
121KB
-
MD5
45797040b257240a392357994f6cf923
-
SHA1
2f9bd33c258ae7d7f2c106ac98271e7f3e7171b3
-
SHA256
940b7862969683eeaf6b32bd7685e4501cf78bc1afb27fd3892124be115922bf
-
SHA512
859483bb57d5eb302061a8e81066320fca59dc541627c11043be07ae3738aab52f736573510f3b3ff274d357ce0da04dc15cad082eadd54684a45228841ff0d4
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 640 WINWORD.EXE 640 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
WINWORD.EXEpid process 640 WINWORD.EXE 640 WINWORD.EXE 640 WINWORD.EXE 640 WINWORD.EXE 640 WINWORD.EXE 640 WINWORD.EXE 640 WINWORD.EXE 640 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Win32.Pegasus\cvs_banks\__ ______ __ 17.11.2015.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/640-114-0x00007FFAC4B10000-0x00007FFAC4B20000-memory.dmpFilesize
64KB
-
memory/640-115-0x00007FFAC4B10000-0x00007FFAC4B20000-memory.dmpFilesize
64KB
-
memory/640-116-0x00007FFAC4B10000-0x00007FFAC4B20000-memory.dmpFilesize
64KB
-
memory/640-117-0x00007FFAC4B10000-0x00007FFAC4B20000-memory.dmpFilesize
64KB
-
memory/640-119-0x00007FFAC4B10000-0x00007FFAC4B20000-memory.dmpFilesize
64KB
-
memory/640-118-0x00007FFAE6560000-0x00007FFAE9083000-memory.dmpFilesize
43.1MB
-
memory/640-122-0x00007FFAE06B0000-0x00007FFAE179E000-memory.dmpFilesize
16.9MB
-
memory/640-123-0x00007FFADE7B0000-0x00007FFAE06A5000-memory.dmpFilesize
31.0MB
-
memory/640-328-0x00007FFAC4B10000-0x00007FFAC4B20000-memory.dmpFilesize
64KB
-
memory/640-329-0x00007FFAC4B10000-0x00007FFAC4B20000-memory.dmpFilesize
64KB
-
memory/640-330-0x00007FFAC4B10000-0x00007FFAC4B20000-memory.dmpFilesize
64KB
-
memory/640-331-0x00007FFAC4B10000-0x00007FFAC4B20000-memory.dmpFilesize
64KB