Analysis
-
max time kernel
159s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 01:31
Static task
static1
Behavioral task
behavioral1
Sample
Company presentation~pdf.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Company presentation~pdf.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
Composition & Quantity~pdf.exe
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
Composition & Quantity~pdf.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral5
Sample
Inquiry Items~pdf.exe
Resource
win7-20220414-en
Behavioral task
behavioral6
Sample
Inquiry Items~pdf.exe
Resource
win10v2004-20220414-en
General
-
Target
Inquiry Items~pdf.exe
-
Size
859KB
-
MD5
befba058f69c91a13b001f3d15efa262
-
SHA1
aeebe9b13b160bcb77bca46e5acefbdf214f9e5f
-
SHA256
e469882fa707c3f2f85c8bdd5fe250434f3fa5169ee71f8132dce99296b99629
-
SHA512
13a8df597d4ddf3762731e1c9226845e33ef15595c1e9d6152edf1abfabf5a9695f911a9475f900f1862ba50009c208be613679f9ed51e4a1e698f8eab0e779a
Malware Config
Signatures
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Inquiry Items~pdf.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ybFan = "C:\\TWJYXOUL\\ybFanj\\ybFanjLno.vbs" Inquiry Items~pdf.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
Inquiry Items~pdf.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum Inquiry Items~pdf.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 Inquiry Items~pdf.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Inquiry Items~pdf.exedescription pid process target process PID 2432 set thread context of 2336 2432 Inquiry Items~pdf.exe InstallUtil.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
InstallUtil.exepid process 2336 InstallUtil.exe 2336 InstallUtil.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
Inquiry Items~pdf.exepid process 2432 Inquiry Items~pdf.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
InstallUtil.exedescription pid process Token: SeDebugPrivilege 2336 InstallUtil.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
Inquiry Items~pdf.exeInstallUtil.exedescription pid process target process PID 2432 wrote to memory of 2336 2432 Inquiry Items~pdf.exe InstallUtil.exe PID 2432 wrote to memory of 2336 2432 Inquiry Items~pdf.exe InstallUtil.exe PID 2432 wrote to memory of 2336 2432 Inquiry Items~pdf.exe InstallUtil.exe PID 2432 wrote to memory of 2336 2432 Inquiry Items~pdf.exe InstallUtil.exe PID 2336 wrote to memory of 5056 2336 InstallUtil.exe REG.exe PID 2336 wrote to memory of 5056 2336 InstallUtil.exe REG.exe PID 2336 wrote to memory of 5056 2336 InstallUtil.exe REG.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Inquiry Items~pdf.exe"C:\Users\Admin\AppData\Local\Temp\Inquiry Items~pdf.exe"1⤵
- Adds Run key to start application
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\InstallUtil.exe"C:\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\InstallUtil.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\REG.exeREG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f3⤵
- Modifies registry key
PID:5056