Analysis
-
max time kernel
31s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05/05/2023, 14:39
Static task
static1
Behavioral task
behavioral1
Sample
LQ21592-Drawing.pdf.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
LQ21592-Drawing.pdf.exe
Resource
win10v2004-20230221-en
General
-
Target
LQ21592-Drawing.pdf.exe
-
Size
963KB
-
MD5
dfee7c2ce48f20911480549119dc23f7
-
SHA1
5385c3905ad8e901c81fa3e9bfbe547407a592e1
-
SHA256
e6bb0019f6aa3583c42c8e197631af09f07bdc8739442893cc8086f298929e33
-
SHA512
43f98c5decf98c4bee8e864b7b110bf1a4ec501d657f327ce0fdc527e3f98652192afb7dfcbf5a7f98a2bad00f24612e964ec7c157a09e678d8f847d4ed1c564
-
SSDEEP
12288:DuUNFThRuf3o53Gsp2hXZlh8+sJDv4alfZqby13caYgd2D6o4U3+:qULhYf3o5DpYlh8hJT4gcaYgdfo4
Malware Config
Extracted
xworm
95.214.27.226:7000
snt7zBKkLKuTPgQb
-
install_file
USB.exe
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LQ21592-Drawing.pdf.lnk LQ21592-Drawing.pdf.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LQ21592-Drawing.pdf.lnk LQ21592-Drawing.pdf.exe -
Loads dropped DLL 1 IoCs
pid Process 1264 LQ21592-Drawing.pdf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1264 LQ21592-Drawing.pdf.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1264 LQ21592-Drawing.pdf.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1264 LQ21592-Drawing.pdf.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1264 LQ21592-Drawing.pdf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\LQ21592-Drawing.pdf.exe"C:\Users\Admin\AppData\Local\Temp\LQ21592-Drawing.pdf.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1264
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
963KB
MD5dfee7c2ce48f20911480549119dc23f7
SHA15385c3905ad8e901c81fa3e9bfbe547407a592e1
SHA256e6bb0019f6aa3583c42c8e197631af09f07bdc8739442893cc8086f298929e33
SHA51243f98c5decf98c4bee8e864b7b110bf1a4ec501d657f327ce0fdc527e3f98652192afb7dfcbf5a7f98a2bad00f24612e964ec7c157a09e678d8f847d4ed1c564