Analysis
-
max time kernel
72s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-05-2022 23:30
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order 251177.pdf.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Purchase Order 251177.pdf.exe
Resource
win10v2004-20220414-en
General
-
Target
Purchase Order 251177.pdf.exe
-
Size
620KB
-
MD5
de2cb62deae3547dc782d3229b4bdd52
-
SHA1
ed48de586e986ec9cc8eef85c04b735872cb1af8
-
SHA256
798757b5cf663c8a4f19074ad76705d66ed8295a4b66d44ee418971391c00c2d
-
SHA512
c44fa8b9161ba539e6f2fe265641883005ac5b8372bd3a9fdabe60b75374cdf8049ed7d9e75b2283be5654b55887ceb95246f696e6abfa41217f4710da25aaeb
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
Purchase Order 251177.pdf.exepid process 1464 Purchase Order 251177.pdf.exe 1464 Purchase Order 251177.pdf.exe 1464 Purchase Order 251177.pdf.exe 1464 Purchase Order 251177.pdf.exe 1464 Purchase Order 251177.pdf.exe 1464 Purchase Order 251177.pdf.exe 1464 Purchase Order 251177.pdf.exe 1464 Purchase Order 251177.pdf.exe 1464 Purchase Order 251177.pdf.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Purchase Order 251177.pdf.exedescription pid process Token: SeDebugPrivilege 1464 Purchase Order 251177.pdf.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
Purchase Order 251177.pdf.exedescription pid process target process PID 1464 wrote to memory of 1136 1464 Purchase Order 251177.pdf.exe schtasks.exe PID 1464 wrote to memory of 1136 1464 Purchase Order 251177.pdf.exe schtasks.exe PID 1464 wrote to memory of 1136 1464 Purchase Order 251177.pdf.exe schtasks.exe PID 1464 wrote to memory of 1136 1464 Purchase Order 251177.pdf.exe schtasks.exe PID 1464 wrote to memory of 892 1464 Purchase Order 251177.pdf.exe Purchase Order 251177.pdf.exe PID 1464 wrote to memory of 892 1464 Purchase Order 251177.pdf.exe Purchase Order 251177.pdf.exe PID 1464 wrote to memory of 892 1464 Purchase Order 251177.pdf.exe Purchase Order 251177.pdf.exe PID 1464 wrote to memory of 892 1464 Purchase Order 251177.pdf.exe Purchase Order 251177.pdf.exe PID 1464 wrote to memory of 880 1464 Purchase Order 251177.pdf.exe Purchase Order 251177.pdf.exe PID 1464 wrote to memory of 880 1464 Purchase Order 251177.pdf.exe Purchase Order 251177.pdf.exe PID 1464 wrote to memory of 880 1464 Purchase Order 251177.pdf.exe Purchase Order 251177.pdf.exe PID 1464 wrote to memory of 880 1464 Purchase Order 251177.pdf.exe Purchase Order 251177.pdf.exe PID 1464 wrote to memory of 1368 1464 Purchase Order 251177.pdf.exe Purchase Order 251177.pdf.exe PID 1464 wrote to memory of 1368 1464 Purchase Order 251177.pdf.exe Purchase Order 251177.pdf.exe PID 1464 wrote to memory of 1368 1464 Purchase Order 251177.pdf.exe Purchase Order 251177.pdf.exe PID 1464 wrote to memory of 1368 1464 Purchase Order 251177.pdf.exe Purchase Order 251177.pdf.exe PID 1464 wrote to memory of 1888 1464 Purchase Order 251177.pdf.exe Purchase Order 251177.pdf.exe PID 1464 wrote to memory of 1888 1464 Purchase Order 251177.pdf.exe Purchase Order 251177.pdf.exe PID 1464 wrote to memory of 1888 1464 Purchase Order 251177.pdf.exe Purchase Order 251177.pdf.exe PID 1464 wrote to memory of 1888 1464 Purchase Order 251177.pdf.exe Purchase Order 251177.pdf.exe PID 1464 wrote to memory of 1432 1464 Purchase Order 251177.pdf.exe Purchase Order 251177.pdf.exe PID 1464 wrote to memory of 1432 1464 Purchase Order 251177.pdf.exe Purchase Order 251177.pdf.exe PID 1464 wrote to memory of 1432 1464 Purchase Order 251177.pdf.exe Purchase Order 251177.pdf.exe PID 1464 wrote to memory of 1432 1464 Purchase Order 251177.pdf.exe Purchase Order 251177.pdf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Purchase Order 251177.pdf.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order 251177.pdf.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KFIPySp" /XML "C:\Users\Admin\AppData\Local\Temp\tmp723.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\Purchase Order 251177.pdf.exe"{path}"2⤵
-
C:\Users\Admin\AppData\Local\Temp\Purchase Order 251177.pdf.exe"{path}"2⤵
-
C:\Users\Admin\AppData\Local\Temp\Purchase Order 251177.pdf.exe"{path}"2⤵
-
C:\Users\Admin\AppData\Local\Temp\Purchase Order 251177.pdf.exe"{path}"2⤵
-
C:\Users\Admin\AppData\Local\Temp\Purchase Order 251177.pdf.exe"{path}"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp723.tmpFilesize
1KB
MD537e4bda756e2fefd02e26028b30db298
SHA1793be727c4674648f5e43808ee38de20fd7639e6
SHA2561aaa453c67c4dd6f240596090c1cbb02a3f227090b8e1094b34a4243aab8fbf4
SHA5122c1fe0b60a72fcfc1f2f25a95d17943b4652a6531d7ad88837602f68e3d070a6373fab52167d374ef5bc7cc6fcfd9feb9a633a34e5f695b6c3eebad47c60fa5f
-
memory/1136-59-0x0000000000000000-mapping.dmp
-
memory/1464-54-0x00000000003A0000-0x0000000000440000-memory.dmpFilesize
640KB
-
memory/1464-55-0x00000000754A1000-0x00000000754A3000-memory.dmpFilesize
8KB
-
memory/1464-56-0x0000000000390000-0x00000000003A0000-memory.dmpFilesize
64KB
-
memory/1464-57-0x00000000051F0000-0x0000000005240000-memory.dmpFilesize
320KB
-
memory/1464-58-0x0000000005870000-0x00000000058E2000-memory.dmpFilesize
456KB