Analysis
-
max time kernel
125s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 01:32
Static task
static1
Behavioral task
behavioral1
Sample
N95 AND KN95 MASK PICTURES~PDF.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
N95 AND KN95 MASK PICTURES~PDF.exe
Resource
win10v2004-20220414-en
General
-
Target
N95 AND KN95 MASK PICTURES~PDF.exe
-
Size
869KB
-
MD5
d21527bda4967799ac00097cb91dde6c
-
SHA1
fb38cb0a433366d6d58b7de799e071b9311b840a
-
SHA256
3afc04e4f98aeb4c05a9648ac3a0e1f90788035bc41322bba868fdd982517e42
-
SHA512
5dac8cbe1db8f3593b251d76558108fb43d6253b3eb650a8aef93a4ad5d20fa2b508acf63ae0e30ce8a6dcd04f03761bbec59f96f43fe5bcf1f1cd0843205099
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
InstallUtil.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
N95 AND KN95 MASK PICTURES~PDF.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\ICRNq = "C:\\WYZSGDWS\\ICRNqf\\ICRNqfRDT.vbs" N95 AND KN95 MASK PICTURES~PDF.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
N95 AND KN95 MASK PICTURES~PDF.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 N95 AND KN95 MASK PICTURES~PDF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum N95 AND KN95 MASK PICTURES~PDF.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
N95 AND KN95 MASK PICTURES~PDF.exedescription pid process target process PID 1496 set thread context of 1516 1496 N95 AND KN95 MASK PICTURES~PDF.exe InstallUtil.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
InstallUtil.exepid process 1516 InstallUtil.exe 1516 InstallUtil.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
N95 AND KN95 MASK PICTURES~PDF.exepid process 1496 N95 AND KN95 MASK PICTURES~PDF.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
InstallUtil.exedescription pid process Token: SeDebugPrivilege 1516 InstallUtil.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
InstallUtil.exepid process 1516 InstallUtil.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
N95 AND KN95 MASK PICTURES~PDF.exeInstallUtil.exedescription pid process target process PID 1496 wrote to memory of 1516 1496 N95 AND KN95 MASK PICTURES~PDF.exe InstallUtil.exe PID 1496 wrote to memory of 1516 1496 N95 AND KN95 MASK PICTURES~PDF.exe InstallUtil.exe PID 1496 wrote to memory of 1516 1496 N95 AND KN95 MASK PICTURES~PDF.exe InstallUtil.exe PID 1496 wrote to memory of 1516 1496 N95 AND KN95 MASK PICTURES~PDF.exe InstallUtil.exe PID 1496 wrote to memory of 1516 1496 N95 AND KN95 MASK PICTURES~PDF.exe InstallUtil.exe PID 1496 wrote to memory of 1516 1496 N95 AND KN95 MASK PICTURES~PDF.exe InstallUtil.exe PID 1496 wrote to memory of 1516 1496 N95 AND KN95 MASK PICTURES~PDF.exe InstallUtil.exe PID 1496 wrote to memory of 1516 1496 N95 AND KN95 MASK PICTURES~PDF.exe InstallUtil.exe PID 1516 wrote to memory of 1924 1516 InstallUtil.exe REG.exe PID 1516 wrote to memory of 1924 1516 InstallUtil.exe REG.exe PID 1516 wrote to memory of 1924 1516 InstallUtil.exe REG.exe PID 1516 wrote to memory of 1924 1516 InstallUtil.exe REG.exe PID 1516 wrote to memory of 1704 1516 InstallUtil.exe netsh.exe PID 1516 wrote to memory of 1704 1516 InstallUtil.exe netsh.exe PID 1516 wrote to memory of 1704 1516 InstallUtil.exe netsh.exe PID 1516 wrote to memory of 1704 1516 InstallUtil.exe netsh.exe -
outlook_office_path 1 IoCs
Processes:
InstallUtil.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
outlook_win_path 1 IoCs
Processes:
InstallUtil.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\N95 AND KN95 MASK PICTURES~PDF.exe"C:\Users\Admin\AppData\Local\Temp\N95 AND KN95 MASK PICTURES~PDF.exe"1⤵
- Adds Run key to start application
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\InstallUtil.exe"C:\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\InstallUtil.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:1516 -
C:\Windows\SysWOW64\REG.exeREG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f3⤵
- Modifies registry key
PID:1924 -
C:\Windows\SysWOW64\netsh.exe"netsh" wlan show profile3⤵PID:1704