Analysis
-
max time kernel
172s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 06:58
Static task
static1
Behavioral task
behavioral1
Sample
Stampa Di Evolution Order.PDF.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Stampa Di Evolution Order.PDF.exe
Resource
win10v2004-20230915-en
General
-
Target
Stampa Di Evolution Order.PDF.exe
-
Size
600KB
-
MD5
b4db35b8d515a842523cecd060bd2f1f
-
SHA1
c769a3dca8c8c9f2499a7a1154ad7b1ddbe84087
-
SHA256
712f1dd153cfa3cdc0d32d481f58aff6b583bc7a60a94597a8c47ced99360d89
-
SHA512
65e0392bdbdf2b5abca48133e994a3e2f2386d97ecb7289c0b7df469356d13cf8790532c712ce2a86af531a0f89044b59d7b3527a049f7322ae3b83bf50a6237
-
SSDEEP
12288:hO725mDTMdu7gQj+it4Uh/7XEMiJB1xNReVE4zd4Il8MRsw:nF0EA5z9iP1xNRIdFRsw
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation Stampa Di Evolution Order.PDF.exe Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation Stampa Di Evolution Order.PDF.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2948 set thread context of 4752 2948 Stampa Di Evolution Order.PDF.exe 102 PID 4752 set thread context of 3160 4752 Stampa Di Evolution Order.PDF.exe 58 PID 4752 set thread context of 3624 4752 Stampa Di Evolution Order.PDF.exe 105 PID 3624 set thread context of 3160 3624 ipconfig.exe 58 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 3624 ipconfig.exe -
description ioc Process Key created \Registry\User\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 36 IoCs
pid Process 2948 Stampa Di Evolution Order.PDF.exe 2948 Stampa Di Evolution Order.PDF.exe 780 powershell.exe 780 powershell.exe 4752 Stampa Di Evolution Order.PDF.exe 4752 Stampa Di Evolution Order.PDF.exe 4752 Stampa Di Evolution Order.PDF.exe 4752 Stampa Di Evolution Order.PDF.exe 4752 Stampa Di Evolution Order.PDF.exe 4752 Stampa Di Evolution Order.PDF.exe 4752 Stampa Di Evolution Order.PDF.exe 4752 Stampa Di Evolution Order.PDF.exe 4752 Stampa Di Evolution Order.PDF.exe 4752 Stampa Di Evolution Order.PDF.exe 4752 Stampa Di Evolution Order.PDF.exe 4752 Stampa Di Evolution Order.PDF.exe 4752 Stampa Di Evolution Order.PDF.exe 4752 Stampa Di Evolution Order.PDF.exe 4752 Stampa Di Evolution Order.PDF.exe 4752 Stampa Di Evolution Order.PDF.exe 3624 ipconfig.exe 3624 ipconfig.exe 3624 ipconfig.exe 3624 ipconfig.exe 3624 ipconfig.exe 3624 ipconfig.exe 3624 ipconfig.exe 3624 ipconfig.exe 3624 ipconfig.exe 3624 ipconfig.exe 3624 ipconfig.exe 3624 ipconfig.exe 3624 ipconfig.exe 3624 ipconfig.exe 3624 ipconfig.exe 3624 ipconfig.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 4752 Stampa Di Evolution Order.PDF.exe 3160 Explorer.EXE 3160 Explorer.EXE 3624 ipconfig.exe 3624 ipconfig.exe 3624 ipconfig.exe 3624 ipconfig.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2948 Stampa Di Evolution Order.PDF.exe Token: SeDebugPrivilege 780 powershell.exe Token: SeDebugPrivilege 4752 Stampa Di Evolution Order.PDF.exe Token: SeDebugPrivilege 3624 ipconfig.exe Token: SeShutdownPrivilege 3160 Explorer.EXE Token: SeCreatePagefilePrivilege 3160 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2948 wrote to memory of 780 2948 Stampa Di Evolution Order.PDF.exe 99 PID 2948 wrote to memory of 780 2948 Stampa Di Evolution Order.PDF.exe 99 PID 2948 wrote to memory of 780 2948 Stampa Di Evolution Order.PDF.exe 99 PID 2948 wrote to memory of 3764 2948 Stampa Di Evolution Order.PDF.exe 101 PID 2948 wrote to memory of 3764 2948 Stampa Di Evolution Order.PDF.exe 101 PID 2948 wrote to memory of 3764 2948 Stampa Di Evolution Order.PDF.exe 101 PID 2948 wrote to memory of 4752 2948 Stampa Di Evolution Order.PDF.exe 102 PID 2948 wrote to memory of 4752 2948 Stampa Di Evolution Order.PDF.exe 102 PID 2948 wrote to memory of 4752 2948 Stampa Di Evolution Order.PDF.exe 102 PID 2948 wrote to memory of 4752 2948 Stampa Di Evolution Order.PDF.exe 102 PID 2948 wrote to memory of 4752 2948 Stampa Di Evolution Order.PDF.exe 102 PID 2948 wrote to memory of 4752 2948 Stampa Di Evolution Order.PDF.exe 102 PID 3160 wrote to memory of 3624 3160 Explorer.EXE 105 PID 3160 wrote to memory of 3624 3160 Explorer.EXE 105 PID 3160 wrote to memory of 3624 3160 Explorer.EXE 105 PID 3624 wrote to memory of 3796 3624 ipconfig.exe 109 PID 3624 wrote to memory of 3796 3624 ipconfig.exe 109 PID 3624 wrote to memory of 3796 3624 ipconfig.exe 109
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Users\Admin\AppData\Local\Temp\Stampa Di Evolution Order.PDF.exe"C:\Users\Admin\AppData\Local\Temp\Stampa Di Evolution Order.PDF.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Stampa Di Evolution Order.PDF.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:780
-
-
C:\Users\Admin\AppData\Local\Temp\Stampa Di Evolution Order.PDF.exe"C:\Users\Admin\AppData\Local\Temp\Stampa Di Evolution Order.PDF.exe"3⤵PID:3764
-
-
C:\Users\Admin\AppData\Local\Temp\Stampa Di Evolution Order.PDF.exe"C:\Users\Admin\AppData\Local\Temp\Stampa Di Evolution Order.PDF.exe"3⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4752
-
-
-
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\SysWOW64\ipconfig.exe"2⤵
- Suspicious use of SetThreadContext
- Gathers network information
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:3796
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82