Analysis
-
max time kernel
5s -
max time network
17s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 12:15
Static task
static1
Behavioral task
behavioral1
Sample
2014_11transaktions_pdf_000093378_2014_0000919_11_v_00028836_n_827100007.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2014_11transaktions_pdf_000093378_2014_0000919_11_v_00028836_n_827100007.exe
Resource
win10v2004-20220812-en
General
-
Target
2014_11transaktions_pdf_000093378_2014_0000919_11_v_00028836_n_827100007.exe
-
Size
278KB
-
MD5
b650be9b84ff38f06f217ad982b8660d
-
SHA1
20c4b3e5dbe971309c3ec966e4e671d8c56580c5
-
SHA256
586ee2c334dff3ada56930d7de90999634893495ba8acd524273b955303b23fd
-
SHA512
d132fa2fc0cbbd1f03e9c83c06aef54ea5700ba648f6fa7a04b3bc235a65758d0168e72428820115e546cd6a785281253adf340444db22f79b4cffea45f31371
-
SSDEEP
6144:9iaYUpwXV9RIKWn/TUVs8oL48N8lqFzc+tRJSht4K:DzXrN8UbtPShiK
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
2014_11transaktions_pdf_000093378_2014_0000919_11_v_00028836_n_827100007.exepid process 4340 2014_11transaktions_pdf_000093378_2014_0000919_11_v_00028836_n_827100007.exe 4340 2014_11transaktions_pdf_000093378_2014_0000919_11_v_00028836_n_827100007.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
2014_11transaktions_pdf_000093378_2014_0000919_11_v_00028836_n_827100007.exedescription pid process Token: SeDebugPrivilege 4340 2014_11transaktions_pdf_000093378_2014_0000919_11_v_00028836_n_827100007.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
2014_11transaktions_pdf_000093378_2014_0000919_11_v_00028836_n_827100007.exedescription pid process target process PID 4340 wrote to memory of 1824 4340 2014_11transaktions_pdf_000093378_2014_0000919_11_v_00028836_n_827100007.exe cmd.exe PID 4340 wrote to memory of 1824 4340 2014_11transaktions_pdf_000093378_2014_0000919_11_v_00028836_n_827100007.exe cmd.exe PID 4340 wrote to memory of 1824 4340 2014_11transaktions_pdf_000093378_2014_0000919_11_v_00028836_n_827100007.exe cmd.exe PID 4340 wrote to memory of 2740 4340 2014_11transaktions_pdf_000093378_2014_0000919_11_v_00028836_n_827100007.exe Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2740
-
C:\Users\Admin\AppData\Local\Temp\2014_11transaktions_pdf_000093378_2014_0000919_11_v_00028836_n_827100007.exe"C:\Users\Admin\AppData\Local\Temp\2014_11transaktions_pdf_000093378_2014_0000919_11_v_00028836_n_827100007.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\MS8840~1.BAT"3⤵PID:1824