Analysis

  • max time kernel
    144s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 12:35

General

  • Target

    2014_11rechnungonline_pdf_vodafone_0095890374_537999190_82135674.pdf.exe

  • Size

    284KB

  • MD5

    5227780e4555ca60025d107d5baea9dd

  • SHA1

    73caffd3824697f8686250ef6e6c4ac12ab39252

  • SHA256

    a34dc2d8bfe4df50efffa7f78da986024d6a0822c035ccbac2b68b995a8c35a5

  • SHA512

    b141e79f076f019bf852f6cd1a5a1c302410294fdb3d1eec4b11b9ed615f76ac1a3c636190fc5d02a4b1b52c0bb9b7d475b7dc92fa7b81b795f715e9fa6b69d4

  • SSDEEP

    6144:1oYT0BiwUyoqwx658IIIOf1G4ELtrWWiz0Lm1+V+XjMSBaf/9:1oY+z8Byb+Xvw

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1148
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1244
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:1280
        • C:\Users\Admin\AppData\Local\Temp\2014_11rechnungonline_pdf_vodafone_0095890374_537999190_82135674.pdf.exe
          "C:\Users\Admin\AppData\Local\Temp\2014_11rechnungonline_pdf_vodafone_0095890374_537999190_82135674.pdf.exe"
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1368
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\MS2476~1.BAT"
            3⤵
            • Deletes itself
            PID:1360

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\ms2476501.bat

        Filesize

        201B

        MD5

        89e657c512fbc5aa47308b1bcc3ad2e8

        SHA1

        f87f4e9a8dd1d615aba678a5af2ad39764148356

        SHA256

        e7290d4108cf67eabd8188c4932a906372952ab71af91dd0d492ed9c6f5d9f67

        SHA512

        568ec87e014cc664110ba309e54f422d0af89e66256ed98b00bbfd18157f9a3e76411a8e7e6f78f7bf50273afe5f38d98d974a05fdbdcec8b6e14a12988d0f92

      • memory/1148-66-0x0000000037650000-0x0000000037660000-memory.dmp

        Filesize

        64KB

      • memory/1148-73-0x00000000004A0000-0x00000000004B7000-memory.dmp

        Filesize

        92KB

      • memory/1244-70-0x0000000037650000-0x0000000037660000-memory.dmp

        Filesize

        64KB

      • memory/1244-74-0x0000000001BA0000-0x0000000001BB7000-memory.dmp

        Filesize

        92KB

      • memory/1280-60-0x0000000037650000-0x0000000037660000-memory.dmp

        Filesize

        64KB

      • memory/1280-58-0x0000000002980000-0x0000000002997000-memory.dmp

        Filesize

        92KB

      • memory/1280-75-0x0000000002980000-0x0000000002997000-memory.dmp

        Filesize

        92KB

      • memory/1360-57-0x0000000000000000-mapping.dmp

      • memory/1368-61-0x0000000000100000-0x000000000010E000-memory.dmp

        Filesize

        56KB

      • memory/1368-62-0x0000000000AF0000-0x0000000000B3A000-memory.dmp

        Filesize

        296KB

      • memory/1368-68-0x00000000001A0000-0x00000000001B4000-memory.dmp

        Filesize

        80KB

      • memory/1368-54-0x0000000076041000-0x0000000076043000-memory.dmp

        Filesize

        8KB