Analysis

  • max time kernel
    15s
  • max time network
    64s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    23-07-2021 15:37

General

  • Target

    Payment Advice copy 00019....pdf.exe

  • Size

    1.4MB

  • MD5

    c3c9fecc65c77e6b96c8eb8640bacc36

  • SHA1

    64140c46f2471cc8431fbda56d64019c90ff15ab

  • SHA256

    ecc8293f6aa073abd1d40cae1f945978f4fcea27b8baf67ee1b5856c45e0d698

  • SHA512

    08afede9df6161325090aed194970cc9b0081976ba6c6d26cd56a5b05d0c8deeb248669881c50ba618be8c378a86c939d8e135a6ea9ffb3a3548b47683b5e159

Score
7/10

Malware Config

Signatures

  • Obfuscated with Agile.Net obfuscator 1 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Payment Advice copy 00019....pdf.exe
    "C:\Users\Admin\AppData\Local\Temp\Payment Advice copy 00019....pdf.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:520

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/520-60-0x00000000001A0000-0x00000000001A1000-memory.dmp
    Filesize

    4KB

  • memory/520-62-0x0000000004D10000-0x0000000004D11000-memory.dmp
    Filesize

    4KB

  • memory/520-64-0x0000000004A00000-0x0000000004A21000-memory.dmp
    Filesize

    132KB

  • memory/520-65-0x0000000004D11000-0x0000000004D12000-memory.dmp
    Filesize

    4KB