Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23-12-2022 08:10
Static task
static1
Behavioral task
behavioral1
Sample
documents.exe
Resource
win7-20220812-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
documents.exe
Resource
win10v2004-20220901-en
windows10-2004-x64
8 signatures
150 seconds
General
-
Target
documents.exe
-
Size
1.1MB
-
MD5
7481984fba685e017266b19ac0d8a51c
-
SHA1
a5b0334df8d078a2817a7ed685dbc5a83e989bb6
-
SHA256
1d73a4579f84d59f82e46024175c8bfb283fca301f4a4b3c4de56496cdbbed86
-
SHA512
369f6344fea00c8d8691a70b363a4bdfa310166259865184cd8fd234a0f9c4651d5b239512132403b965e7388576c16a0df8301871566b01e37a0ea76e0d49c3
-
SSDEEP
12288:WVje0gQR8bXCWRiEsRrKi0DMy4xjhyTlie3cfBtTkX7Y9xiTLCi900JmH2hpv962:WMIyYfiiw3ign8Qc
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 5032 set thread context of 4768 5032 documents.exe 83 PID 4768 set thread context of 2940 4768 CasPol.exe 70 PID 2784 set thread context of 2940 2784 cmmon32.exe 70 -
Program crash 1 IoCs
pid pid_target Process procid_target 1600 3108 WerFault.exe 91 -
description ioc Process Key created \Registry\User\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 cmmon32.exe -
Suspicious behavior: EnumeratesProcesses 63 IoCs
pid Process 5032 documents.exe 4768 CasPol.exe 4768 CasPol.exe 4768 CasPol.exe 4768 CasPol.exe 4768 CasPol.exe 4768 CasPol.exe 4768 CasPol.exe 4768 CasPol.exe 2784 cmmon32.exe 2784 cmmon32.exe 2784 cmmon32.exe 2784 cmmon32.exe 2784 cmmon32.exe 2784 cmmon32.exe 2784 cmmon32.exe 2784 cmmon32.exe 2784 cmmon32.exe 2784 cmmon32.exe 2784 cmmon32.exe 2784 cmmon32.exe 2784 cmmon32.exe 2784 cmmon32.exe 2784 cmmon32.exe 2784 cmmon32.exe 2784 cmmon32.exe 2784 cmmon32.exe 2784 cmmon32.exe 2784 cmmon32.exe 2784 cmmon32.exe 2784 cmmon32.exe 2784 cmmon32.exe 2784 cmmon32.exe 2784 cmmon32.exe 2784 cmmon32.exe 2784 cmmon32.exe 2784 cmmon32.exe 2784 cmmon32.exe 2784 cmmon32.exe 2784 cmmon32.exe 2784 cmmon32.exe 2784 cmmon32.exe 2784 cmmon32.exe 2784 cmmon32.exe 2784 cmmon32.exe 2784 cmmon32.exe 2784 cmmon32.exe 2784 cmmon32.exe 2784 cmmon32.exe 2784 cmmon32.exe 2784 cmmon32.exe 2784 cmmon32.exe 2784 cmmon32.exe 2784 cmmon32.exe 2784 cmmon32.exe 2784 cmmon32.exe 2784 cmmon32.exe 2784 cmmon32.exe 2784 cmmon32.exe 2784 cmmon32.exe 2784 cmmon32.exe 2784 cmmon32.exe 2784 cmmon32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2940 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 4768 CasPol.exe 4768 CasPol.exe 4768 CasPol.exe 2784 cmmon32.exe 2784 cmmon32.exe 2784 cmmon32.exe 2784 cmmon32.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 5032 documents.exe Token: SeDebugPrivilege 4768 CasPol.exe Token: SeDebugPrivilege 2784 cmmon32.exe Token: SeShutdownPrivilege 2940 Explorer.EXE Token: SeCreatePagefilePrivilege 2940 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 5032 wrote to memory of 4768 5032 documents.exe 83 PID 5032 wrote to memory of 4768 5032 documents.exe 83 PID 5032 wrote to memory of 4768 5032 documents.exe 83 PID 5032 wrote to memory of 4768 5032 documents.exe 83 PID 5032 wrote to memory of 4768 5032 documents.exe 83 PID 5032 wrote to memory of 4768 5032 documents.exe 83 PID 2940 wrote to memory of 2784 2940 Explorer.EXE 84 PID 2940 wrote to memory of 2784 2940 Explorer.EXE 84 PID 2940 wrote to memory of 2784 2940 Explorer.EXE 84 PID 2784 wrote to memory of 3108 2784 cmmon32.exe 91 PID 2784 wrote to memory of 3108 2784 cmmon32.exe 91 PID 2784 wrote to memory of 3108 2784 cmmon32.exe 91
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\documents.exe"C:\Users\Admin\AppData\Local\Temp\documents.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4768
-
-
-
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:3108
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3108 -s 1924⤵
- Program crash
PID:1600
-
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 476 -p 3108 -ip 31081⤵PID:1564