Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24/11/2022, 04:50
Static task
static1
Behavioral task
behavioral1
Sample
2014_11rechnung_pdf_telekom_0000283882_november_00288273_11_0000000392_000005.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2014_11rechnung_pdf_telekom_0000283882_november_00288273_11_0000000392_000005.exe
Resource
win10v2004-20221111-en
General
-
Target
2014_11rechnung_pdf_telekom_0000283882_november_00288273_11_0000000392_000005.exe
-
Size
148KB
-
MD5
719d4b8a24a98b938d0c393228e413f2
-
SHA1
9f55cdc8223b1ada8c7fdf678f605345442ce240
-
SHA256
29e65cd43000e27bb73556fce0dcbc2ec9a42a68dad623c251dc84a846651040
-
SHA512
e729442bc973b846cb07511c0654d65a425cc576f7a1847dc7800ac45fcaefaa0005327a779a7712017610130f47f4fbdf14f5b53ee812cfa725e09dca3d8d78
-
SSDEEP
3072:oykEWzxnWWEe+SuF1FZ01bzWQPg0qRfN2HOdUnylZ5MWz2M:drWzNWWEl1iiXpRfWOanyz5Rn
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 516 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\loibgjiv.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\Identities\\loibgjiv.exe\"" Explorer.EXE -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2040 set thread context of 2012 2040 2014_11rechnung_pdf_telekom_0000283882_november_00288273_11_0000000392_000005.exe 28 -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 2040 2014_11rechnung_pdf_telekom_0000283882_november_00288273_11_0000000392_000005.exe 2012 2014_11rechnung_pdf_telekom_0000283882_november_00288273_11_0000000392_000005.exe 2012 2014_11rechnung_pdf_telekom_0000283882_november_00288273_11_0000000392_000005.exe 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1208 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2012 2014_11rechnung_pdf_telekom_0000283882_november_00288273_11_0000000392_000005.exe Token: SeDebugPrivilege 1208 Explorer.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1208 Explorer.EXE 1208 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1208 Explorer.EXE 1208 Explorer.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2040 2014_11rechnung_pdf_telekom_0000283882_november_00288273_11_0000000392_000005.exe 2040 2014_11rechnung_pdf_telekom_0000283882_november_00288273_11_0000000392_000005.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1208 Explorer.EXE -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2040 wrote to memory of 2012 2040 2014_11rechnung_pdf_telekom_0000283882_november_00288273_11_0000000392_000005.exe 28 PID 2040 wrote to memory of 2012 2040 2014_11rechnung_pdf_telekom_0000283882_november_00288273_11_0000000392_000005.exe 28 PID 2040 wrote to memory of 2012 2040 2014_11rechnung_pdf_telekom_0000283882_november_00288273_11_0000000392_000005.exe 28 PID 2040 wrote to memory of 2012 2040 2014_11rechnung_pdf_telekom_0000283882_november_00288273_11_0000000392_000005.exe 28 PID 2040 wrote to memory of 2012 2040 2014_11rechnung_pdf_telekom_0000283882_november_00288273_11_0000000392_000005.exe 28 PID 2040 wrote to memory of 2012 2040 2014_11rechnung_pdf_telekom_0000283882_november_00288273_11_0000000392_000005.exe 28 PID 2040 wrote to memory of 2012 2040 2014_11rechnung_pdf_telekom_0000283882_november_00288273_11_0000000392_000005.exe 28 PID 2040 wrote to memory of 2012 2040 2014_11rechnung_pdf_telekom_0000283882_november_00288273_11_0000000392_000005.exe 28 PID 2040 wrote to memory of 2012 2040 2014_11rechnung_pdf_telekom_0000283882_november_00288273_11_0000000392_000005.exe 28 PID 2040 wrote to memory of 2012 2040 2014_11rechnung_pdf_telekom_0000283882_november_00288273_11_0000000392_000005.exe 28 PID 2012 wrote to memory of 516 2012 2014_11rechnung_pdf_telekom_0000283882_november_00288273_11_0000000392_000005.exe 29 PID 2012 wrote to memory of 516 2012 2014_11rechnung_pdf_telekom_0000283882_november_00288273_11_0000000392_000005.exe 29 PID 2012 wrote to memory of 516 2012 2014_11rechnung_pdf_telekom_0000283882_november_00288273_11_0000000392_000005.exe 29 PID 2012 wrote to memory of 516 2012 2014_11rechnung_pdf_telekom_0000283882_november_00288273_11_0000000392_000005.exe 29 PID 2012 wrote to memory of 1208 2012 2014_11rechnung_pdf_telekom_0000283882_november_00288273_11_0000000392_000005.exe 16 PID 1208 wrote to memory of 1104 1208 Explorer.EXE 13 PID 1208 wrote to memory of 1176 1208 Explorer.EXE 17 PID 1208 wrote to memory of 1176 1208 Explorer.EXE 17 PID 1208 wrote to memory of 2012 1208 Explorer.EXE 28 PID 1208 wrote to memory of 516 1208 Explorer.EXE 29 PID 1208 wrote to memory of 516 1208 Explorer.EXE 29 PID 1208 wrote to memory of 580 1208 Explorer.EXE 30 PID 1208 wrote to memory of 580 1208 Explorer.EXE 30
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1104
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\2014_11rechnung_pdf_telekom_0000283882_november_00288273_11_0000000392_000005.exe"C:\Users\Admin\AppData\Local\Temp\2014_11rechnung_pdf_telekom_0000283882_november_00288273_11_0000000392_000005.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\2014_11rechnung_pdf_telekom_0000283882_november_00288273_11_0000000392_000005.exeC:\Users\Admin\AppData\Local\Temp\2014_11rechnung_pdf_telekom_0000283882_november_00288273_11_0000000392_000005.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\MS2476~1.BAT"4⤵
- Deletes itself
PID:516
-
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1176
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "80219091721324126191014617661-1393502755-569819691-1119349333-1946713492-1349014926"1⤵PID:580
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
201B
MD589e657c512fbc5aa47308b1bcc3ad2e8
SHA1f87f4e9a8dd1d615aba678a5af2ad39764148356
SHA256e7290d4108cf67eabd8188c4932a906372952ab71af91dd0d492ed9c6f5d9f67
SHA512568ec87e014cc664110ba309e54f422d0af89e66256ed98b00bbfd18157f9a3e76411a8e7e6f78f7bf50273afe5f38d98d974a05fdbdcec8b6e14a12988d0f92