Analysis
-
max time kernel
99s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
07-02-2022 12:21
Static task
static1
Behavioral task
behavioral1
Sample
yeni sipariş pdf.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
yeni sipariş pdf.exe
Resource
win10v2004-en-20220113
General
-
Target
yeni sipariş pdf.exe
-
Size
822KB
-
MD5
41d2899a4441944b48daba79bfb70dd0
-
SHA1
463778a640b327918d8e67cd2f9fa949be3b04e8
-
SHA256
7480e4ba962590b3f14f4516861bb1aa80ffa08223a944ee6599cfe3b4e89bce
-
SHA512
cb5b11e73fb06ffe3e1c4f91658899d82c8da6c6db9f3b3c126840bfb728b6ee862f8b45c903366ab37c2570baff6c298af41f4ffbd92e624579e8c4bc380104
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
yeni sipariş pdf.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation yeni sipariş pdf.exe -
Drops file in Windows directory 6 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Windows\WindowsUpdate.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
yeni sipariş pdf.exepid process 4604 yeni sipariş pdf.exe 4604 yeni sipariş pdf.exe 4604 yeni sipariş pdf.exe 4604 yeni sipariş pdf.exe 4604 yeni sipariş pdf.exe 4604 yeni sipariş pdf.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
svchost.exeyeni sipariş pdf.exedescription pid process Token: SeShutdownPrivilege 3628 svchost.exe Token: SeCreatePagefilePrivilege 3628 svchost.exe Token: SeShutdownPrivilege 3628 svchost.exe Token: SeCreatePagefilePrivilege 3628 svchost.exe Token: SeShutdownPrivilege 3628 svchost.exe Token: SeCreatePagefilePrivilege 3628 svchost.exe Token: SeDebugPrivilege 4604 yeni sipariş pdf.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
yeni sipariş pdf.exedescription pid process target process PID 4604 wrote to memory of 2432 4604 yeni sipariş pdf.exe powershell.exe PID 4604 wrote to memory of 2432 4604 yeni sipariş pdf.exe powershell.exe PID 4604 wrote to memory of 2432 4604 yeni sipariş pdf.exe powershell.exe PID 4604 wrote to memory of 4140 4604 yeni sipariş pdf.exe schtasks.exe PID 4604 wrote to memory of 4140 4604 yeni sipariş pdf.exe schtasks.exe PID 4604 wrote to memory of 4140 4604 yeni sipariş pdf.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\yeni sipariş pdf.exe"C:\Users\Admin\AppData\Local\Temp\yeni sipariş pdf.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\oifnpghsFyo.exe"2⤵
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\oifnpghsFyo" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD73E.tmp"2⤵
- Creates scheduled task(s)
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3628-148-0x000001EE1D860000-0x000001EE1D864000-memory.dmpFilesize
16KB
-
memory/4604-130-0x0000000000300000-0x00000000003D4000-memory.dmpFilesize
848KB
-
memory/4604-131-0x0000000005300000-0x00000000058A4000-memory.dmpFilesize
5.6MB
-
memory/4604-132-0x0000000004DF0000-0x0000000004E82000-memory.dmpFilesize
584KB
-
memory/4604-133-0x0000000004D50000-0x00000000052F4000-memory.dmpFilesize
5.6MB
-
memory/4604-134-0x0000000004D80000-0x0000000004D8A000-memory.dmpFilesize
40KB
-
memory/4604-135-0x0000000007290000-0x000000000732C000-memory.dmpFilesize
624KB