Analysis
-
max time kernel
103s -
max time network
151s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
17-11-2021 20:57
Static task
static1
Behavioral task
behavioral1
Sample
SMH-20211015-Request For Quote 100967-SPN.pdf (56KB).exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
SMH-20211015-Request For Quote 100967-SPN.pdf (56KB).exe
Resource
win10-en-20211104
General
-
Target
SMH-20211015-Request For Quote 100967-SPN.pdf (56KB).exe
-
Size
721KB
-
MD5
d095a956c7c94b27bdb21ebded88207d
-
SHA1
90326a8d96ea3878ef4acafd12847f719ba141cd
-
SHA256
c5a9b54887316170a328f0c1c1adab1db83debfe3b9f922c752c6f090c9abe9b
-
SHA512
b3fb3d63d0a4e5dff906cfabc02465e140424d2c86e4d199aadf70528e338c875aef5f789ccf4be5de2a3a2117b9f5ea97ff5fb8f513684c13d260906c1a9ccb
Malware Config
Signatures
-
Looks for VirtualBox Guest Additions in registry 2 TTPs
-
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
iexplore.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\L3Q7J4T2-J8A6-L6O4-W4G3-U5J7D0W2W5F0 = "C:\\Users\\Admin\\AppData\\Roaming\\L3Q7J4T2-J8A6-L6O4-W4G3-U5J7D0W2W5F0\\L3Q7J4T2-J8A6-L6O4-W4G3-U5J7D0W2W5F0.exe" iexplore.exe -
Looks for VMWare Tools registry key 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
SMH-20211015-Request For Quote 100967-SPN.pdf (56KB).exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion SMH-20211015-Request For Quote 100967-SPN.pdf (56KB).exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion SMH-20211015-Request For Quote 100967-SPN.pdf (56KB).exe -
Deletes itself 1 IoCs
Processes:
notepad.exepid process 832 notepad.exe -
Processes:
SMH-20211015-Request For Quote 100967-SPN.pdf (56KB).exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" SMH-20211015-Request For Quote 100967-SPN.pdf (56KB).exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
iexplore.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\L3Q7J4T2-J8A6-L6O4-W4G3-U5J7D0W2W5F0 = "C:\\Users\\Admin\\AppData\\Roaming\\L3Q7J4T2-J8A6-L6O4-W4G3-U5J7D0W2W5F0\\L3Q7J4T2-J8A6-L6O4-W4G3-U5J7D0W2W5F0.exe" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Windows\CurrentVersion\Run\L3Q7J4T2-J8A6-L6O4-W4G3-U5J7D0W2W5F0 = "C:\\Users\\Admin\\AppData\\Roaming\\L3Q7J4T2-J8A6-L6O4-W4G3-U5J7D0W2W5F0\\L3Q7J4T2-J8A6-L6O4-W4G3-U5J7D0W2W5F0.exe" iexplore.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run iexplore.exe -
Processes:
SMH-20211015-Request For Quote 100967-SPN.pdf (56KB).exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" SMH-20211015-Request For Quote 100967-SPN.pdf (56KB).exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
SMH-20211015-Request For Quote 100967-SPN.pdf (56KB).exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum SMH-20211015-Request For Quote 100967-SPN.pdf (56KB).exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 SMH-20211015-Request For Quote 100967-SPN.pdf (56KB).exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
SMH-20211015-Request For Quote 100967-SPN.pdf (56KB).exeSMH-20211015-Request For Quote 100967-SPN.pdf (56KB).exedescription pid process target process PID 3340 set thread context of 1844 3340 SMH-20211015-Request For Quote 100967-SPN.pdf (56KB).exe SMH-20211015-Request For Quote 100967-SPN.pdf (56KB).exe PID 1844 set thread context of 3452 1844 SMH-20211015-Request For Quote 100967-SPN.pdf (56KB).exe iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
SMH-20211015-Request For Quote 100967-SPN.pdf (56KB).exepid process 1844 SMH-20211015-Request For Quote 100967-SPN.pdf (56KB).exe 1844 SMH-20211015-Request For Quote 100967-SPN.pdf (56KB).exe 1844 SMH-20211015-Request For Quote 100967-SPN.pdf (56KB).exe 1844 SMH-20211015-Request For Quote 100967-SPN.pdf (56KB).exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
iexplore.exedescription pid process Token: SeDebugPrivilege 3452 iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
SMH-20211015-Request For Quote 100967-SPN.pdf (56KB).exeiexplore.exepid process 1844 SMH-20211015-Request For Quote 100967-SPN.pdf (56KB).exe 3452 iexplore.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
SMH-20211015-Request For Quote 100967-SPN.pdf (56KB).exeSMH-20211015-Request For Quote 100967-SPN.pdf (56KB).exeiexplore.exedescription pid process target process PID 3340 wrote to memory of 1844 3340 SMH-20211015-Request For Quote 100967-SPN.pdf (56KB).exe SMH-20211015-Request For Quote 100967-SPN.pdf (56KB).exe PID 3340 wrote to memory of 1844 3340 SMH-20211015-Request For Quote 100967-SPN.pdf (56KB).exe SMH-20211015-Request For Quote 100967-SPN.pdf (56KB).exe PID 3340 wrote to memory of 1844 3340 SMH-20211015-Request For Quote 100967-SPN.pdf (56KB).exe SMH-20211015-Request For Quote 100967-SPN.pdf (56KB).exe PID 3340 wrote to memory of 1844 3340 SMH-20211015-Request For Quote 100967-SPN.pdf (56KB).exe SMH-20211015-Request For Quote 100967-SPN.pdf (56KB).exe PID 3340 wrote to memory of 1844 3340 SMH-20211015-Request For Quote 100967-SPN.pdf (56KB).exe SMH-20211015-Request For Quote 100967-SPN.pdf (56KB).exe PID 3340 wrote to memory of 1844 3340 SMH-20211015-Request For Quote 100967-SPN.pdf (56KB).exe SMH-20211015-Request For Quote 100967-SPN.pdf (56KB).exe PID 3340 wrote to memory of 1844 3340 SMH-20211015-Request For Quote 100967-SPN.pdf (56KB).exe SMH-20211015-Request For Quote 100967-SPN.pdf (56KB).exe PID 1844 wrote to memory of 3452 1844 SMH-20211015-Request For Quote 100967-SPN.pdf (56KB).exe iexplore.exe PID 1844 wrote to memory of 3452 1844 SMH-20211015-Request For Quote 100967-SPN.pdf (56KB).exe iexplore.exe PID 1844 wrote to memory of 3452 1844 SMH-20211015-Request For Quote 100967-SPN.pdf (56KB).exe iexplore.exe PID 1844 wrote to memory of 3452 1844 SMH-20211015-Request For Quote 100967-SPN.pdf (56KB).exe iexplore.exe PID 1844 wrote to memory of 3452 1844 SMH-20211015-Request For Quote 100967-SPN.pdf (56KB).exe iexplore.exe PID 1844 wrote to memory of 3452 1844 SMH-20211015-Request For Quote 100967-SPN.pdf (56KB).exe iexplore.exe PID 1844 wrote to memory of 3452 1844 SMH-20211015-Request For Quote 100967-SPN.pdf (56KB).exe iexplore.exe PID 1844 wrote to memory of 3452 1844 SMH-20211015-Request For Quote 100967-SPN.pdf (56KB).exe iexplore.exe PID 3452 wrote to memory of 832 3452 iexplore.exe notepad.exe PID 3452 wrote to memory of 832 3452 iexplore.exe notepad.exe PID 3452 wrote to memory of 832 3452 iexplore.exe notepad.exe PID 3452 wrote to memory of 832 3452 iexplore.exe notepad.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
SMH-20211015-Request For Quote 100967-SPN.pdf (56KB).exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" SMH-20211015-Request For Quote 100967-SPN.pdf (56KB).exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SMH-20211015-Request For Quote 100967-SPN.pdf (56KB).exe"C:\Users\Admin\AppData\Local\Temp\SMH-20211015-Request For Quote 100967-SPN.pdf (56KB).exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\SMH-20211015-Request For Quote 100967-SPN.pdf (56KB).exe"C:\Users\Admin\AppData\Local\Temp\SMH-20211015-Request For Quote 100967-SPN.pdf (56KB).exe"2⤵
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\SMH-20211015-Request For Quote 100967-SPN.pdf (56KB).exe3⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\notepad.exenotepad.exe4⤵
- Deletes itself
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/832-133-0x0000000000000000-mapping.dmp
-
memory/1844-128-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/1844-134-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/1844-131-0x00000000009E0000-0x00000000009EA000-memory.dmpFilesize
40KB
-
memory/1844-130-0x00000000009E0000-0x00000000009E6000-memory.dmpFilesize
24KB
-
memory/1844-129-0x00000000004010B8-mapping.dmp
-
memory/3340-123-0x0000000004D30000-0x000000000522E000-memory.dmpFilesize
5.0MB
-
memory/3340-126-0x0000000008810000-0x0000000008858000-memory.dmpFilesize
288KB
-
memory/3340-127-0x0000000008920000-0x0000000008921000-memory.dmpFilesize
4KB
-
memory/3340-125-0x0000000008770000-0x0000000008771000-memory.dmpFilesize
4KB
-
memory/3340-124-0x0000000005090000-0x0000000005097000-memory.dmpFilesize
28KB
-
memory/3340-118-0x0000000000490000-0x0000000000491000-memory.dmpFilesize
4KB
-
memory/3340-122-0x0000000004D90000-0x0000000004D91000-memory.dmpFilesize
4KB
-
memory/3340-121-0x0000000004DD0000-0x0000000004DD1000-memory.dmpFilesize
4KB
-
memory/3340-120-0x0000000005230000-0x0000000005231000-memory.dmpFilesize
4KB
-
memory/3452-132-0x0000000000401364-mapping.dmp