Analysis

  • max time kernel
    140s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-en-20211014
  • submitted
    10-11-2021 07:31

General

  • Target

    IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe

  • Size

    436KB

  • MD5

    b3b9a674a9f1a42a359d26bc0ca832a7

  • SHA1

    33ea6cd06f21474da8bd6dd9290765f3a33518dc

  • SHA256

    18bea0cb94e7c9213588f2e8b500d66f4716c0e6ae1b68ec62ba28c64c627ca5

  • SHA512

    88bf57a14e255e058009c762ca357e7f7c11f3e553184b94f7908d82a7a1bcd069957b3ff9c7229133f845a7b1bcde53caacadeeb19a5f0df390f386606424c7

Malware Config

Signatures

  • UAC bypass 3 TTPs
  • Windows security bypass 2 TTPs
  • XpertRAT

    XpertRAT is a remote access trojan with various capabilities.

  • Looks for VirtualBox Guest Additions in registry 2 TTPs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Looks for VMWare Tools registry key 2 TTPs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe
    "C:\Users\Admin\AppData\Local\Temp\IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe"
    1⤵
    • Checks BIOS information in registry
    • Maps connected drives based on registry
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:944
    • C:\Users\Admin\AppData\Local\Temp\IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe
      "C:\Users\Admin\AppData\Local\Temp\IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe"
      2⤵
        PID:408
      • C:\Users\Admin\AppData\Local\Temp\IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe
        "C:\Users\Admin\AppData\Local\Temp\IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe"
        2⤵
        • Windows security modification
        • Checks whether UAC is enabled
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:812
        • C:\Program Files (x86)\Internet Explorer\iexplore.exe
          C:\Users\Admin\AppData\Local\Temp\IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe
          3⤵
          • Adds policy Run key to start application
          • Adds Run key to start application
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1660
          • C:\Windows\SysWOW64\notepad.exe
            notepad.exe
            4⤵
            • Deletes itself
            PID:1536

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/812-65-0x00000000004010B8-mapping.dmp
    • memory/812-64-0x0000000000400000-0x000000000042C000-memory.dmp
      Filesize

      176KB

    • memory/812-67-0x0000000000100000-0x000000000010A000-memory.dmp
      Filesize

      40KB

    • memory/812-63-0x0000000000400000-0x000000000042C000-memory.dmp
      Filesize

      176KB

    • memory/812-66-0x0000000000100000-0x0000000000106000-memory.dmp
      Filesize

      24KB

    • memory/812-61-0x0000000000400000-0x000000000042C000-memory.dmp
      Filesize

      176KB

    • memory/812-62-0x0000000000400000-0x000000000042C000-memory.dmp
      Filesize

      176KB

    • memory/944-57-0x0000000074A31000-0x0000000074A33000-memory.dmp
      Filesize

      8KB

    • memory/944-60-0x0000000004960000-0x00000000049A8000-memory.dmp
      Filesize

      288KB

    • memory/944-55-0x0000000000EB0000-0x0000000000EB1000-memory.dmp
      Filesize

      4KB

    • memory/944-59-0x0000000000570000-0x0000000000577000-memory.dmp
      Filesize

      28KB

    • memory/944-58-0x0000000000CE0000-0x0000000000CE1000-memory.dmp
      Filesize

      4KB

    • memory/1536-69-0x0000000000000000-mapping.dmp
    • memory/1660-68-0x0000000000401364-mapping.dmp