Analysis
-
max time kernel
163s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2023, 21:24
Static task
static1
Behavioral task
behavioral1
Sample
P608297_2807_110411_jusificantes.PDF.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
P608297_2807_110411_jusificantes.PDF.exe
Resource
win10v2004-20230915-en
General
-
Target
P608297_2807_110411_jusificantes.PDF.exe
-
Size
360KB
-
MD5
d578bde56a9d1131efbf2629041960f5
-
SHA1
d7f0ba43a9c9b50db7efcd384646926841bb6c38
-
SHA256
9849e7217530267aa3ee1f84b0fbca828a72c296cd1db7c43fa8fe7f319b54eb
-
SHA512
a949ed9a409bdcf6926e78397bbd6b84cd7a54788a2da3b09f8aad00b6e728e4718e1821c34d008e02685e2895f303cc77506ae6966facc32b9bf70fc06bc41c
-
SSDEEP
6144:PYa6/Ja/LYizQFpati5GRoItggeyMI0AJ6OO/ATGL50kY8no/kzIEcHY2OZr:PYNaYicpG5X0Y6xAKL5vY8NcHm
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation dewrxmbi.exe -
Executes dropped EXE 2 IoCs
pid Process 4484 dewrxmbi.exe 4344 dewrxmbi.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4484 set thread context of 4344 4484 dewrxmbi.exe 91 PID 4344 set thread context of 3188 4344 dewrxmbi.exe 44 PID 4344 set thread context of 568 4344 dewrxmbi.exe 97 PID 568 set thread context of 3188 568 help.exe 44 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \Registry\User\S-1-5-21-1574508946-349927670-1185736483-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 help.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 4344 dewrxmbi.exe 4344 dewrxmbi.exe 4344 dewrxmbi.exe 4344 dewrxmbi.exe 4344 dewrxmbi.exe 4344 dewrxmbi.exe 4344 dewrxmbi.exe 4344 dewrxmbi.exe 4344 dewrxmbi.exe 4344 dewrxmbi.exe 4344 dewrxmbi.exe 4344 dewrxmbi.exe 4344 dewrxmbi.exe 4344 dewrxmbi.exe 4344 dewrxmbi.exe 4344 dewrxmbi.exe 568 help.exe 568 help.exe 568 help.exe 568 help.exe 568 help.exe 568 help.exe 568 help.exe 568 help.exe 568 help.exe 568 help.exe 568 help.exe 568 help.exe 568 help.exe 568 help.exe 568 help.exe 568 help.exe 568 help.exe 568 help.exe 568 help.exe 568 help.exe 568 help.exe 568 help.exe 568 help.exe 568 help.exe 568 help.exe 568 help.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3188 Explorer.EXE -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 4484 dewrxmbi.exe 4344 dewrxmbi.exe 3188 Explorer.EXE 3188 Explorer.EXE 568 help.exe 568 help.exe 568 help.exe 568 help.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4344 dewrxmbi.exe Token: SeDebugPrivilege 568 help.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2808 wrote to memory of 4484 2808 P608297_2807_110411_jusificantes.PDF.exe 89 PID 2808 wrote to memory of 4484 2808 P608297_2807_110411_jusificantes.PDF.exe 89 PID 2808 wrote to memory of 4484 2808 P608297_2807_110411_jusificantes.PDF.exe 89 PID 4484 wrote to memory of 4344 4484 dewrxmbi.exe 91 PID 4484 wrote to memory of 4344 4484 dewrxmbi.exe 91 PID 4484 wrote to memory of 4344 4484 dewrxmbi.exe 91 PID 4484 wrote to memory of 4344 4484 dewrxmbi.exe 91 PID 3188 wrote to memory of 568 3188 Explorer.EXE 97 PID 3188 wrote to memory of 568 3188 Explorer.EXE 97 PID 3188 wrote to memory of 568 3188 Explorer.EXE 97 PID 568 wrote to memory of 4516 568 help.exe 102 PID 568 wrote to memory of 4516 568 help.exe 102 PID 568 wrote to memory of 4516 568 help.exe 102
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Users\Admin\AppData\Local\Temp\P608297_2807_110411_jusificantes.PDF.exe"C:\Users\Admin\AppData\Local\Temp\P608297_2807_110411_jusificantes.PDF.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\dewrxmbi.exe"C:\Users\Admin\AppData\Local\Temp\dewrxmbi.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\dewrxmbi.exe"C:\Users\Admin\AppData\Local\Temp\dewrxmbi.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4344
-
-
-
-
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:4516
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
163KB
MD5f211b2a65b7b68b0f41227e4cd10950d
SHA1405da3b50ae13fd43fc01542bbf63769725a0da1
SHA256def376b9ac2d5191e8ebdc283492141b24717f6b7c94a0044f42166e9f9ee8e5
SHA512e7d99421172b93616045b678378600ec9b8a29d5792facb1ffff7ab04f1af6763332f285484c110ff29333325edd269627396e4cadd57dc856ba2a33de354de9
-
Filesize
163KB
MD5f211b2a65b7b68b0f41227e4cd10950d
SHA1405da3b50ae13fd43fc01542bbf63769725a0da1
SHA256def376b9ac2d5191e8ebdc283492141b24717f6b7c94a0044f42166e9f9ee8e5
SHA512e7d99421172b93616045b678378600ec9b8a29d5792facb1ffff7ab04f1af6763332f285484c110ff29333325edd269627396e4cadd57dc856ba2a33de354de9
-
Filesize
163KB
MD5f211b2a65b7b68b0f41227e4cd10950d
SHA1405da3b50ae13fd43fc01542bbf63769725a0da1
SHA256def376b9ac2d5191e8ebdc283492141b24717f6b7c94a0044f42166e9f9ee8e5
SHA512e7d99421172b93616045b678378600ec9b8a29d5792facb1ffff7ab04f1af6763332f285484c110ff29333325edd269627396e4cadd57dc856ba2a33de354de9
-
Filesize
250KB
MD59e820721388ae8202acf48cfe7f292de
SHA113ebf9d0e5b7bd39e16050ec13aeaf56dbfd0fe4
SHA25619740d5ebb50e60aae2d7af56df24458226fab04ba362a79fbcd7981e1b69aa3
SHA512ef5196821b89948312db6383486a72048c3cafe4e08a6438b0f6ecb660df4b9482db5a8eec1ce3db96ec9132e5e065d984658490712feb7e9ad033c0d2adc6e5