Analysis
-
max time kernel
140s -
max time network
151s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
10-11-2021 07:31
Static task
static1
Behavioral task
behavioral1
Sample
IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe
Resource
win10-en-20211104
General
-
Target
IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe
-
Size
436KB
-
MD5
b3b9a674a9f1a42a359d26bc0ca832a7
-
SHA1
33ea6cd06f21474da8bd6dd9290765f3a33518dc
-
SHA256
18bea0cb94e7c9213588f2e8b500d66f4716c0e6ae1b68ec62ba28c64c627ca5
-
SHA512
88bf57a14e255e058009c762ca357e7f7c11f3e553184b94f7908d82a7a1bcd069957b3ff9c7229133f845a7b1bcde53caacadeeb19a5f0df390f386606424c7
Malware Config
Signatures
-
Looks for VirtualBox Guest Additions in registry 2 TTPs
-
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
iexplore.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\L3Q7J4T2-J8A6-L6O4-W4G3-U5J7D0W2W5F0 = "C:\\Users\\Admin\\AppData\\Roaming\\L3Q7J4T2-J8A6-L6O4-W4G3-U5J7D0W2W5F0\\L3Q7J4T2-J8A6-L6O4-W4G3-U5J7D0W2W5F0.exe" iexplore.exe -
Looks for VMWare Tools registry key 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe -
Deletes itself 1 IoCs
Processes:
notepad.exepid process 1536 notepad.exe -
Processes:
IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UACDisableNotify = "0" IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
iexplore.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Windows\CurrentVersion\Run\L3Q7J4T2-J8A6-L6O4-W4G3-U5J7D0W2W5F0 = "C:\\Users\\Admin\\AppData\\Roaming\\L3Q7J4T2-J8A6-L6O4-W4G3-U5J7D0W2W5F0\\L3Q7J4T2-J8A6-L6O4-W4G3-U5J7D0W2W5F0.exe" iexplore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\L3Q7J4T2-J8A6-L6O4-W4G3-U5J7D0W2W5F0 = "C:\\Users\\Admin\\AppData\\Roaming\\L3Q7J4T2-J8A6-L6O4-W4G3-U5J7D0W2W5F0\\L3Q7J4T2-J8A6-L6O4-W4G3-U5J7D0W2W5F0.exe" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run iexplore.exe -
Processes:
IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exeIMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exedescription pid process target process PID 944 set thread context of 812 944 IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe PID 812 set thread context of 1660 812 IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe iexplore.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exeIMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exepid process 944 IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe 944 IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe 812 IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe 812 IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe 812 IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exeiexplore.exedescription pid process Token: SeDebugPrivilege 944 IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe Token: SeDebugPrivilege 1660 iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exeiexplore.exepid process 812 IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe 1660 iexplore.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exeIMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exeiexplore.exedescription pid process target process PID 944 wrote to memory of 408 944 IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe PID 944 wrote to memory of 408 944 IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe PID 944 wrote to memory of 408 944 IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe PID 944 wrote to memory of 408 944 IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe PID 944 wrote to memory of 812 944 IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe PID 944 wrote to memory of 812 944 IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe PID 944 wrote to memory of 812 944 IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe PID 944 wrote to memory of 812 944 IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe PID 944 wrote to memory of 812 944 IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe PID 944 wrote to memory of 812 944 IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe PID 944 wrote to memory of 812 944 IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe PID 944 wrote to memory of 812 944 IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe PID 812 wrote to memory of 1660 812 IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe iexplore.exe PID 812 wrote to memory of 1660 812 IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe iexplore.exe PID 812 wrote to memory of 1660 812 IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe iexplore.exe PID 812 wrote to memory of 1660 812 IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe iexplore.exe PID 812 wrote to memory of 1660 812 IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe iexplore.exe PID 812 wrote to memory of 1660 812 IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe iexplore.exe PID 812 wrote to memory of 1660 812 IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe iexplore.exe PID 812 wrote to memory of 1660 812 IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe iexplore.exe PID 812 wrote to memory of 1660 812 IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe iexplore.exe PID 1660 wrote to memory of 1536 1660 iexplore.exe notepad.exe PID 1660 wrote to memory of 1536 1660 iexplore.exe notepad.exe PID 1660 wrote to memory of 1536 1660 iexplore.exe notepad.exe PID 1660 wrote to memory of 1536 1660 iexplore.exe notepad.exe PID 1660 wrote to memory of 1536 1660 iexplore.exe notepad.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe"C:\Users\Admin\AppData\Local\Temp\IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Users\Admin\AppData\Local\Temp\IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe"C:\Users\Admin\AppData\Local\Temp\IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe"2⤵PID:408
-
C:\Users\Admin\AppData\Local\Temp\IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe"C:\Users\Admin\AppData\Local\Temp\IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe"2⤵
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:812 -
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\IMG-SMH-2021-1011-Fiyat Talebi 100967-TRK.pdf(56KB).exe3⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\notepad.exenotepad.exe4⤵
- Deletes itself
PID:1536
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/812-65-0x00000000004010B8-mapping.dmp
-
memory/812-64-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/812-67-0x0000000000100000-0x000000000010A000-memory.dmpFilesize
40KB
-
memory/812-63-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/812-66-0x0000000000100000-0x0000000000106000-memory.dmpFilesize
24KB
-
memory/812-61-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/812-62-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/944-57-0x0000000074A31000-0x0000000074A33000-memory.dmpFilesize
8KB
-
memory/944-60-0x0000000004960000-0x00000000049A8000-memory.dmpFilesize
288KB
-
memory/944-55-0x0000000000EB0000-0x0000000000EB1000-memory.dmpFilesize
4KB
-
memory/944-59-0x0000000000570000-0x0000000000577000-memory.dmpFilesize
28KB
-
memory/944-58-0x0000000000CE0000-0x0000000000CE1000-memory.dmpFilesize
4KB
-
memory/1536-69-0x0000000000000000-mapping.dmp
-
memory/1660-68-0x0000000000401364-mapping.dmp