Analysis
-
max time kernel
81s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 01:31
Static task
static1
Behavioral task
behavioral1
Sample
Company presentation~pdf.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Company presentation~pdf.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
Composition & Quantity~pdf.exe
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
Composition & Quantity~pdf.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral5
Sample
Inquiry Items~pdf.exe
Resource
win7-20220414-en
Behavioral task
behavioral6
Sample
Inquiry Items~pdf.exe
Resource
win10v2004-20220414-en
General
-
Target
Inquiry Items~pdf.exe
-
Size
859KB
-
MD5
befba058f69c91a13b001f3d15efa262
-
SHA1
aeebe9b13b160bcb77bca46e5acefbdf214f9e5f
-
SHA256
e469882fa707c3f2f85c8bdd5fe250434f3fa5169ee71f8132dce99296b99629
-
SHA512
13a8df597d4ddf3762731e1c9226845e33ef15595c1e9d6152edf1abfabf5a9695f911a9475f900f1862ba50009c208be613679f9ed51e4a1e698f8eab0e779a
Malware Config
Signatures
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
InstallUtil.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Inquiry Items~pdf.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Run\ybFan = "C:\\TBHNEBSE\\ybFanj\\ybFanjLno.vbs" Inquiry Items~pdf.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
Inquiry Items~pdf.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum Inquiry Items~pdf.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 Inquiry Items~pdf.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Inquiry Items~pdf.exedescription pid process target process PID 1944 set thread context of 944 1944 Inquiry Items~pdf.exe InstallUtil.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
InstallUtil.exepid process 944 InstallUtil.exe 944 InstallUtil.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
Inquiry Items~pdf.exepid process 1944 Inquiry Items~pdf.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
InstallUtil.exedescription pid process Token: SeDebugPrivilege 944 InstallUtil.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
InstallUtil.exepid process 944 InstallUtil.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
Inquiry Items~pdf.exeInstallUtil.exedescription pid process target process PID 1944 wrote to memory of 944 1944 Inquiry Items~pdf.exe InstallUtil.exe PID 1944 wrote to memory of 944 1944 Inquiry Items~pdf.exe InstallUtil.exe PID 1944 wrote to memory of 944 1944 Inquiry Items~pdf.exe InstallUtil.exe PID 1944 wrote to memory of 944 1944 Inquiry Items~pdf.exe InstallUtil.exe PID 1944 wrote to memory of 944 1944 Inquiry Items~pdf.exe InstallUtil.exe PID 1944 wrote to memory of 944 1944 Inquiry Items~pdf.exe InstallUtil.exe PID 1944 wrote to memory of 944 1944 Inquiry Items~pdf.exe InstallUtil.exe PID 1944 wrote to memory of 944 1944 Inquiry Items~pdf.exe InstallUtil.exe PID 944 wrote to memory of 1316 944 InstallUtil.exe REG.exe PID 944 wrote to memory of 1316 944 InstallUtil.exe REG.exe PID 944 wrote to memory of 1316 944 InstallUtil.exe REG.exe PID 944 wrote to memory of 1316 944 InstallUtil.exe REG.exe PID 944 wrote to memory of 684 944 InstallUtil.exe netsh.exe PID 944 wrote to memory of 684 944 InstallUtil.exe netsh.exe PID 944 wrote to memory of 684 944 InstallUtil.exe netsh.exe PID 944 wrote to memory of 684 944 InstallUtil.exe netsh.exe -
outlook_office_path 1 IoCs
Processes:
InstallUtil.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
outlook_win_path 1 IoCs
Processes:
InstallUtil.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Inquiry Items~pdf.exe"C:\Users\Admin\AppData\Local\Temp\Inquiry Items~pdf.exe"1⤵
- Adds Run key to start application
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\InstallUtil.exe"C:\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\InstallUtil.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:944 -
C:\Windows\SysWOW64\REG.exeREG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f3⤵
- Modifies registry key
PID:1316 -
C:\Windows\SysWOW64\netsh.exe"netsh" wlan show profile3⤵PID:684