Analysis
-
max time kernel
396s -
max time network
410s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
22-06-2023 17:27
Static task
static1
Behavioral task
behavioral1
Sample
hotel-requirements.pdf/hotel-requirements.pdf.scr
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
hotel-requirements.pdf/hotel-requirements.pdf.scr
Resource
win10v2004-20230621-en
General
-
Target
hotel-requirements.pdf/hotel-requirements.pdf.scr
-
Size
564.4MB
-
MD5
7faa29f9a965143cf67f27c1455111c1
-
SHA1
f5c34c4399c2fca31c6ac05e14a566374c6732a9
-
SHA256
a06612c8c0ff60c840da39e7d8571e949716bdec4c4a6582fdaae25216907fbe
-
SHA512
2caffe5412262a291fa76a5887ccff316b3983a675a16d97c4dcde087ae3d3ccdb9685f66dbc999d1ade1888d6df45d015e1dd9bc0d396a2abf8761949bf3dd6
-
SSDEEP
786432:MA5OgdnGFPsX2YiMiqN7z5EYUj4Vtpe9oA4Jxo88nvcVkf/2npG4U:M4d2oiU7z5EZMre9GJxo8q0Vkf8a
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Installer-Wizard_v1.4o.7n.exepid process 2012 Installer-Wizard_v1.4o.7n.exe -
Loads dropped DLL 1 IoCs
Processes:
hotel-requirements.pdf.scrpid process 2032 hotel-requirements.pdf.scr -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 1140 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 1140 powershell.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
hotel-requirements.pdf.scrInstaller-Wizard_v1.4o.7n.exedescription pid process target process PID 2032 wrote to memory of 2012 2032 hotel-requirements.pdf.scr Installer-Wizard_v1.4o.7n.exe PID 2032 wrote to memory of 2012 2032 hotel-requirements.pdf.scr Installer-Wizard_v1.4o.7n.exe PID 2032 wrote to memory of 2012 2032 hotel-requirements.pdf.scr Installer-Wizard_v1.4o.7n.exe PID 2032 wrote to memory of 2012 2032 hotel-requirements.pdf.scr Installer-Wizard_v1.4o.7n.exe PID 2032 wrote to memory of 2012 2032 hotel-requirements.pdf.scr Installer-Wizard_v1.4o.7n.exe PID 2032 wrote to memory of 2012 2032 hotel-requirements.pdf.scr Installer-Wizard_v1.4o.7n.exe PID 2032 wrote to memory of 2012 2032 hotel-requirements.pdf.scr Installer-Wizard_v1.4o.7n.exe PID 2012 wrote to memory of 1140 2012 Installer-Wizard_v1.4o.7n.exe powershell.exe PID 2012 wrote to memory of 1140 2012 Installer-Wizard_v1.4o.7n.exe powershell.exe PID 2012 wrote to memory of 1140 2012 Installer-Wizard_v1.4o.7n.exe powershell.exe PID 2012 wrote to memory of 1140 2012 Installer-Wizard_v1.4o.7n.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\hotel-requirements.pdf\hotel-requirements.pdf.scr"C:\Users\Admin\AppData\Local\Temp\hotel-requirements.pdf\hotel-requirements.pdf.scr" /S1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Installer-Wizard_v1.4o.7n\Installer-Wizard_v1.4o.7n.exe"C:\Users\Admin\AppData\Local\Temp\Installer-Wizard_v1.4o.7n\Installer-Wizard_v1.4o.7n.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Installer-Wizard_v1.4o.7n\Installer-Wizard_v1.4o.7n.exeFilesize
74.3MB
MD54ca5ed9d8c94d36e9291d79f98194dc2
SHA1de70cc4d3bcc448c092c5bd99ee661373f76383d
SHA2565877e8427328cf96115d79d42767fa65c4b54212a0ade9becb8effbc8d3b7074
SHA512d8552f61a3de0170ca5002b02b64dd6a9ab613c8e49b292f310596e52042534fc6b6cb03a71cd63fb9ff8234dd4ff46313b59f29db26e3043af078e6674caded
-
C:\Users\Admin\AppData\Local\Temp\Installer-Wizard_v1.4o.7n\Installer-Wizard_v1.4o.7n.exeFilesize
74.3MB
MD54ca5ed9d8c94d36e9291d79f98194dc2
SHA1de70cc4d3bcc448c092c5bd99ee661373f76383d
SHA2565877e8427328cf96115d79d42767fa65c4b54212a0ade9becb8effbc8d3b7074
SHA512d8552f61a3de0170ca5002b02b64dd6a9ab613c8e49b292f310596e52042534fc6b6cb03a71cd63fb9ff8234dd4ff46313b59f29db26e3043af078e6674caded
-
\Users\Admin\AppData\Local\Temp\Installer-Wizard_v1.4o.7n\Installer-Wizard_v1.4o.7n.exeFilesize
74.3MB
MD54ca5ed9d8c94d36e9291d79f98194dc2
SHA1de70cc4d3bcc448c092c5bd99ee661373f76383d
SHA2565877e8427328cf96115d79d42767fa65c4b54212a0ade9becb8effbc8d3b7074
SHA512d8552f61a3de0170ca5002b02b64dd6a9ab613c8e49b292f310596e52042534fc6b6cb03a71cd63fb9ff8234dd4ff46313b59f29db26e3043af078e6674caded
-
memory/1140-66-0x0000000000300000-0x0000000000340000-memory.dmpFilesize
256KB
-
memory/1140-67-0x0000000000300000-0x0000000000340000-memory.dmpFilesize
256KB
-
memory/1140-68-0x0000000000300000-0x0000000000340000-memory.dmpFilesize
256KB
-
memory/1140-69-0x0000000000300000-0x0000000000340000-memory.dmpFilesize
256KB
-
memory/1140-70-0x0000000000300000-0x0000000000340000-memory.dmpFilesize
256KB
-
memory/1140-71-0x0000000000300000-0x0000000000340000-memory.dmpFilesize
256KB
-
memory/2012-61-0x0000000000930000-0x0000000005376000-memory.dmpFilesize
74.3MB
-
memory/2012-62-0x00000000099D0000-0x0000000009A10000-memory.dmpFilesize
256KB
-
memory/2012-65-0x00000000099D0000-0x0000000009A10000-memory.dmpFilesize
256KB