Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
17/09/2022, 22:53
Static task
static1
Behavioral task
behavioral1
Sample
MT10386867902-004. pdf.exe
Resource
win7-20220901-en
General
-
Target
MT10386867902-004. pdf.exe
-
Size
1.1MB
-
MD5
0bdc1fda2cc607187dc341cc25827e5a
-
SHA1
7248bf8f4d29a9d3c2e70c1b987b6464713e5f39
-
SHA256
33b4616c77120e6805e6291a245901aaf59a3ff29ab585684aa9ff4261b88425
-
SHA512
7b9bc1f282cbafa54a5421d67b96b682510f081ed94d94328453b5fa37f532f3a71d17ac12979bfce55faa2b23b2857745c7b4599f8ffd47a167e6e660240899
-
SSDEEP
24576:sONzSIoHIbBEAX+b0cM9/+TY0kNUYuy1aCb:sYzSI+IdEBb/MgTY0kNIy1/b
Malware Config
Extracted
formbook
tdet
flecOADaqXPdGREyc2S5U7in
KVyI9ev7H+7QNmD2Ypo=
/dS+buXK9NuzGmk+HDCRUfazFQ==
IHpkgl+nN4I0gAnczMbM7asQ708Cbt0=
UkVGwHvEpCcYba0OBA==
VTsq0ruLmB+azL+lXZkZRw==
5qToiFYvMKMD8W5dGQ==
S4rU9cAx619SvJr10kpU4XCfj6w=
9ymGAMljBH9nres8Ew==
BZeWfy6ACwx4uKkD66doyXuv
prCtFMOp06JaczompuX6D8VIKExtMFEs
dePiDR+zZNPBHPeGJAWv
OAR/oEfQWJ5S4N83XZkZRw==
t3LunnRUcdmGtd0rDg==
YAg6s7KVxrMcXPB/fJQLQQ==
t9oRP+fGiZ5WqdhnAg==
6nyt4oS6VLCeC907L8blYIuxEw==
rzQ6JM4sjRjA+TBcNpQ=
VILmlp6qylo/bMw=
bGqKNd1c+/9ptjYJ6adoyXuv
O7jwIsiapq+YFY3vZHloyXuv
LwTriqCs0LuZDGWGJAWv
Ms7rFApW4DOYva0I6F9zCnoN/k8Cbt0=
sAoMMjajYDAQpyuG99t1YIuxEw==
XmCJKuGsrCLJ1N0CMoU=
Q/YgFOQ2tIQ7y1WnIIjuS/Xqiao=
KSAu37WVuTuj3isSFTDRfnCfj6w=
tTIH9cMJkOO4LAnbXN7jYIuxEw==
W1JW8f3xIguvukcr
Xu0m2qK408ahDGCGJAWv
hhlSji7297cVQKv4nV1hVHGp
5p3XwKX6pxB4mHVUnfEUch2hiKQ=
ioqH86s20T/4C2GGJAWv
n+Ra04JUUrOh0rwaDA==
fGg3VRdo7zbeAc80XZkZRw==
2RCDtqD4fm3J8scJ7atoyXuv
1RZNdAf5JhPF8NukXZkZRw==
Qq2x2uZK1iV/ztWlXZkZRw==
V2CKQuc+51C1+mWfGYCQUQQ/JkEob9U=
t6eXekJMaexLcsALxa5PUA==
y8qewnpWaEio5MIdIN51YIuxEw==
jMMCJuc4s5dJuxLlzSwR1Tk=
WO4AHhqhPjuh8jRNKQSt
ogU8qK2VqrOvIiD9W53VDPN0obSW
jBwhRCRs+Ej2KPnkYuZtYIuxEw==
Roz5bCfAbYotd9c=
McHwEbkYws5IZrCJZhWqwW9qCl7SkA==
90VOd0hrT02y
vCJl1Ma24bZj4Ge/QoOORqMD7E8Cbt0=
NZSJqbtKAIJ20qPy9ct1YIuxEw==
wprAqTbNOM9+9A==
Z/YfPSGMEHEeQSF8OtNwf1oQAZcG+/9MIg==
D4C87o9mhXLaFdSpXZkZRw==
29DIQgn1+VzKtd0rDg==
ZQMYPC509DTaSjPCYAym
YpwVPj+hHXEbQhChVg/gqX0yGw==
XPgLKCCBJbacDO86XZkZRw==
ZNrYPg2oPCCGo7jn442cTw==
ytDYfoAXbE2v
yqacRiUJOd4OetU=
k8w84M6YlYChm+9YGW0cTQ==
9PX0YD8lIbAaZHNMpiTwpyA=
gI2SCM6/7Y6wBijLESpTdDE=
ntAQZ0eLI0s9aUuwjBmL/I3MN01tMFEs
posycbd.com
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation MT10386867902-004. pdf.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3576 set thread context of 3036 3576 MT10386867902-004. pdf.exe 92 PID 3036 set thread context of 3080 3036 MT10386867902-004. pdf.exe 46 PID 3036 set thread context of 3080 3036 MT10386867902-004. pdf.exe 46 PID 2816 set thread context of 3080 2816 explorer.exe 46 -
description ioc Process Key created \Registry\User\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 explorer.exe -
Suspicious behavior: EnumeratesProcesses 40 IoCs
pid Process 3036 MT10386867902-004. pdf.exe 3036 MT10386867902-004. pdf.exe 3036 MT10386867902-004. pdf.exe 3036 MT10386867902-004. pdf.exe 3036 MT10386867902-004. pdf.exe 3036 MT10386867902-004. pdf.exe 3036 MT10386867902-004. pdf.exe 3036 MT10386867902-004. pdf.exe 3036 MT10386867902-004. pdf.exe 3036 MT10386867902-004. pdf.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3080 Explorer.EXE -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 3036 MT10386867902-004. pdf.exe 3036 MT10386867902-004. pdf.exe 3036 MT10386867902-004. pdf.exe 3036 MT10386867902-004. pdf.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3036 MT10386867902-004. pdf.exe Token: SeDebugPrivilege 2816 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3576 wrote to memory of 3036 3576 MT10386867902-004. pdf.exe 92 PID 3576 wrote to memory of 3036 3576 MT10386867902-004. pdf.exe 92 PID 3576 wrote to memory of 3036 3576 MT10386867902-004. pdf.exe 92 PID 3576 wrote to memory of 3036 3576 MT10386867902-004. pdf.exe 92 PID 3576 wrote to memory of 3036 3576 MT10386867902-004. pdf.exe 92 PID 3576 wrote to memory of 3036 3576 MT10386867902-004. pdf.exe 92 PID 3080 wrote to memory of 2816 3080 Explorer.EXE 93 PID 3080 wrote to memory of 2816 3080 Explorer.EXE 93 PID 3080 wrote to memory of 2816 3080 Explorer.EXE 93 PID 2816 wrote to memory of 2344 2816 explorer.exe 94 PID 2816 wrote to memory of 2344 2816 explorer.exe 94 PID 2816 wrote to memory of 2344 2816 explorer.exe 94
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Users\Admin\AppData\Local\Temp\MT10386867902-004. pdf.exe"C:\Users\Admin\AppData\Local\Temp\MT10386867902-004. pdf.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Users\Admin\AppData\Local\Temp\MT10386867902-004. pdf.exe"C:\Users\Admin\AppData\Local\Temp\MT10386867902-004. pdf.exe"3⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3036
-
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:2344
-
-