Analysis
-
max time kernel
113s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 02:21
Static task
static1
Behavioral task
behavioral1
Sample
Company Presentation~pdf.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Company Presentation~pdf.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
Infrared Thermometer~pdf.exe
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
Infrared Thermometer~pdf.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral5
Sample
Mask samples & qty needed~pdf.exe
Resource
win7-20220414-en
Behavioral task
behavioral6
Sample
Mask samples & qty needed~pdf.exe
Resource
win10v2004-20220414-en
General
-
Target
Infrared Thermometer~pdf.exe
-
Size
1.2MB
-
MD5
cbc2a4c4b531711337eb807fbd082adc
-
SHA1
f9114fe1e6ebe680831900fce56fde5ed2a748eb
-
SHA256
2ae247545c4291da9b83ad9ba0c6af00bd80c896a3fb9fafd028e09444bf3baf
-
SHA512
e5649d648c989049af1dd13c12f397483935d019e93e655801f51f642f7db8bd536c945b4ef92a1f46ff73e8e8952ddb397857c935408e52862543c0a58a92e2
Malware Config
Signatures
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
InstallUtil.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Infrared Thermometer~pdf.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows\CurrentVersion\Run\OfuoM = "C:\\TVHJCWMH\\OfuoMN\\OfuoMNeUP.vbs" Infrared Thermometer~pdf.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
Infrared Thermometer~pdf.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum Infrared Thermometer~pdf.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 Infrared Thermometer~pdf.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Infrared Thermometer~pdf.exedescription pid process target process PID 980 set thread context of 1020 980 Infrared Thermometer~pdf.exe InstallUtil.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
InstallUtil.exepid process 1020 InstallUtil.exe 1020 InstallUtil.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
Infrared Thermometer~pdf.exepid process 980 Infrared Thermometer~pdf.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
InstallUtil.exedescription pid process Token: SeDebugPrivilege 1020 InstallUtil.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
InstallUtil.exepid process 1020 InstallUtil.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
Infrared Thermometer~pdf.exeInstallUtil.exedescription pid process target process PID 980 wrote to memory of 1020 980 Infrared Thermometer~pdf.exe InstallUtil.exe PID 980 wrote to memory of 1020 980 Infrared Thermometer~pdf.exe InstallUtil.exe PID 980 wrote to memory of 1020 980 Infrared Thermometer~pdf.exe InstallUtil.exe PID 980 wrote to memory of 1020 980 Infrared Thermometer~pdf.exe InstallUtil.exe PID 980 wrote to memory of 1020 980 Infrared Thermometer~pdf.exe InstallUtil.exe PID 980 wrote to memory of 1020 980 Infrared Thermometer~pdf.exe InstallUtil.exe PID 980 wrote to memory of 1020 980 Infrared Thermometer~pdf.exe InstallUtil.exe PID 980 wrote to memory of 1020 980 Infrared Thermometer~pdf.exe InstallUtil.exe PID 1020 wrote to memory of 472 1020 InstallUtil.exe REG.exe PID 1020 wrote to memory of 472 1020 InstallUtil.exe REG.exe PID 1020 wrote to memory of 472 1020 InstallUtil.exe REG.exe PID 1020 wrote to memory of 472 1020 InstallUtil.exe REG.exe PID 1020 wrote to memory of 1464 1020 InstallUtil.exe netsh.exe PID 1020 wrote to memory of 1464 1020 InstallUtil.exe netsh.exe PID 1020 wrote to memory of 1464 1020 InstallUtil.exe netsh.exe PID 1020 wrote to memory of 1464 1020 InstallUtil.exe netsh.exe -
outlook_office_path 1 IoCs
Processes:
InstallUtil.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
outlook_win_path 1 IoCs
Processes:
InstallUtil.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Infrared Thermometer~pdf.exe"C:\Users\Admin\AppData\Local\Temp\Infrared Thermometer~pdf.exe"1⤵
- Adds Run key to start application
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\InstallUtil.exe"C:\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\InstallUtil.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:1020 -
C:\Windows\SysWOW64\REG.exeREG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f3⤵
- Modifies registry key
PID:472 -
C:\Windows\SysWOW64\netsh.exe"netsh" wlan show profile3⤵PID:1464