Analysis
-
max time kernel
152s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 00:29
Static task
static1
Behavioral task
behavioral1
Sample
EMECA20_GeneralBrochureEN_web_pdf.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
EMECA20_GeneralBrochureEN_web_pdf.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
EMECA20_GeneralBrochureEN_web_pdf.exe
-
Size
981KB
-
MD5
0816345b69321795af4a24159d3545b7
-
SHA1
4b743df38e5f214bf85b85c95851bf75d08683a1
-
SHA256
f79b985c1bf0b6708864ec45d12917c2e130dc53408b648b893179874f8e4b97
-
SHA512
5ad6e41c75500c95b40f5866f265a927e252ec9ed8adc59c003180efd7627f5fff0c276d3b93ffd77263de8008125152db2ce8f657da993bb88a31249298e7b6
Score
10/10
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
iexplore.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\L5Y8V7P1-C2B7-Q0N6-B1K7-L222R0D0G5H7 = "C:\\Users\\Admin\\AppData\\Roaming\\L5Y8V7P1-C2B7-Q0N6-B1K7-L222R0D0G5H7\\L5Y8V7P1-C2B7-Q0N6-B1K7-L222R0D0G5H7.exe" iexplore.exe -
Processes:
EMECA20_GeneralBrochureEN_web_pdf.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" EMECA20_GeneralBrochureEN_web_pdf.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
iexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\L5Y8V7P1-C2B7-Q0N6-B1K7-L222R0D0G5H7 = "C:\\Users\\Admin\\AppData\\Roaming\\L5Y8V7P1-C2B7-Q0N6-B1K7-L222R0D0G5H7\\L5Y8V7P1-C2B7-Q0N6-B1K7-L222R0D0G5H7.exe" iexplore.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\L5Y8V7P1-C2B7-Q0N6-B1K7-L222R0D0G5H7 = "C:\\Users\\Admin\\AppData\\Roaming\\L5Y8V7P1-C2B7-Q0N6-B1K7-L222R0D0G5H7\\L5Y8V7P1-C2B7-Q0N6-B1K7-L222R0D0G5H7.exe" iexplore.exe -
Processes:
EMECA20_GeneralBrochureEN_web_pdf.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" EMECA20_GeneralBrochureEN_web_pdf.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
EMECA20_GeneralBrochureEN_web_pdf.exeEMECA20_GeneralBrochureEN_web_pdf.exedescription pid process target process PID 4284 set thread context of 4072 4284 EMECA20_GeneralBrochureEN_web_pdf.exe EMECA20_GeneralBrochureEN_web_pdf.exe PID 4072 set thread context of 4012 4072 EMECA20_GeneralBrochureEN_web_pdf.exe iexplore.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
EMECA20_GeneralBrochureEN_web_pdf.exeEMECA20_GeneralBrochureEN_web_pdf.exepid process 4284 EMECA20_GeneralBrochureEN_web_pdf.exe 4284 EMECA20_GeneralBrochureEN_web_pdf.exe 4284 EMECA20_GeneralBrochureEN_web_pdf.exe 4284 EMECA20_GeneralBrochureEN_web_pdf.exe 4284 EMECA20_GeneralBrochureEN_web_pdf.exe 4284 EMECA20_GeneralBrochureEN_web_pdf.exe 4072 EMECA20_GeneralBrochureEN_web_pdf.exe 4072 EMECA20_GeneralBrochureEN_web_pdf.exe 4072 EMECA20_GeneralBrochureEN_web_pdf.exe 4072 EMECA20_GeneralBrochureEN_web_pdf.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
EMECA20_GeneralBrochureEN_web_pdf.exeiexplore.exedescription pid process Token: SeDebugPrivilege 4284 EMECA20_GeneralBrochureEN_web_pdf.exe Token: SeDebugPrivilege 4012 iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
EMECA20_GeneralBrochureEN_web_pdf.exeiexplore.exepid process 4072 EMECA20_GeneralBrochureEN_web_pdf.exe 4012 iexplore.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
EMECA20_GeneralBrochureEN_web_pdf.exeEMECA20_GeneralBrochureEN_web_pdf.exeiexplore.exedescription pid process target process PID 4284 wrote to memory of 4072 4284 EMECA20_GeneralBrochureEN_web_pdf.exe EMECA20_GeneralBrochureEN_web_pdf.exe PID 4284 wrote to memory of 4072 4284 EMECA20_GeneralBrochureEN_web_pdf.exe EMECA20_GeneralBrochureEN_web_pdf.exe PID 4284 wrote to memory of 4072 4284 EMECA20_GeneralBrochureEN_web_pdf.exe EMECA20_GeneralBrochureEN_web_pdf.exe PID 4284 wrote to memory of 4072 4284 EMECA20_GeneralBrochureEN_web_pdf.exe EMECA20_GeneralBrochureEN_web_pdf.exe PID 4284 wrote to memory of 4072 4284 EMECA20_GeneralBrochureEN_web_pdf.exe EMECA20_GeneralBrochureEN_web_pdf.exe PID 4284 wrote to memory of 4072 4284 EMECA20_GeneralBrochureEN_web_pdf.exe EMECA20_GeneralBrochureEN_web_pdf.exe PID 4284 wrote to memory of 4072 4284 EMECA20_GeneralBrochureEN_web_pdf.exe EMECA20_GeneralBrochureEN_web_pdf.exe PID 4072 wrote to memory of 4012 4072 EMECA20_GeneralBrochureEN_web_pdf.exe iexplore.exe PID 4072 wrote to memory of 4012 4072 EMECA20_GeneralBrochureEN_web_pdf.exe iexplore.exe PID 4072 wrote to memory of 4012 4072 EMECA20_GeneralBrochureEN_web_pdf.exe iexplore.exe PID 4072 wrote to memory of 4012 4072 EMECA20_GeneralBrochureEN_web_pdf.exe iexplore.exe PID 4072 wrote to memory of 4012 4072 EMECA20_GeneralBrochureEN_web_pdf.exe iexplore.exe PID 4072 wrote to memory of 4012 4072 EMECA20_GeneralBrochureEN_web_pdf.exe iexplore.exe PID 4072 wrote to memory of 4012 4072 EMECA20_GeneralBrochureEN_web_pdf.exe iexplore.exe PID 4072 wrote to memory of 4012 4072 EMECA20_GeneralBrochureEN_web_pdf.exe iexplore.exe PID 4012 wrote to memory of 1952 4012 iexplore.exe notepad.exe PID 4012 wrote to memory of 1952 4012 iexplore.exe notepad.exe PID 4012 wrote to memory of 1952 4012 iexplore.exe notepad.exe PID 4012 wrote to memory of 1952 4012 iexplore.exe notepad.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
EMECA20_GeneralBrochureEN_web_pdf.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" EMECA20_GeneralBrochureEN_web_pdf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\EMECA20_GeneralBrochureEN_web_pdf.exe"C:\Users\Admin\AppData\Local\Temp\EMECA20_GeneralBrochureEN_web_pdf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Users\Admin\AppData\Local\Temp\EMECA20_GeneralBrochureEN_web_pdf.exe"{path}"2⤵
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4072 -
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\EMECA20_GeneralBrochureEN_web_pdf.exe3⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Windows\SysWOW64\notepad.exenotepad.exe4⤵PID:1952
-
-
-