Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2023, 06:29
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Document_File_Account.exe
Resource
win7-20231020-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
Document_File_Account.exe
Resource
win10v2004-20231023-en
7 signatures
150 seconds
General
-
Target
Document_File_Account.exe
-
Size
901KB
-
MD5
32fffd3ae9d622e65d3eb3f133499582
-
SHA1
b46eb24e29e17e1c900d356bacd5404797a86d25
-
SHA256
ef4cfc26c8e8bff8944ac18e7202bfa7cba32fc8c65382f33bea823864e2de13
-
SHA512
a76d4a8ad2b5c43df0cbbe90c2b4827181bbb504c75e5a820db8624e7a22870d7571c0be136db3ba211183a3914ec9a3b4f9f36ff0bda85f8da79b3b56936237
-
SSDEEP
12288:8zA/E1a7XmCeYdNN2sndwW5wYYcUnW/+kgmVDiDMDr+:80v7dHGW5wYYrngVgoD3D
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4240 set thread context of 4000 4240 Document_File_Account.exe 92 PID 4000 set thread context of 3272 4000 Document_File_Account.exe 38 PID 4000 set thread context of 180 4000 Document_File_Account.exe 97 PID 180 set thread context of 3272 180 extrac32.exe 38 -
description ioc Process Key created \Registry\User\S-1-5-21-1114462139-3090196418-29517368-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 extrac32.exe -
Suspicious behavior: EnumeratesProcesses 58 IoCs
pid Process 4240 Document_File_Account.exe 4240 Document_File_Account.exe 4240 Document_File_Account.exe 4240 Document_File_Account.exe 4000 Document_File_Account.exe 4000 Document_File_Account.exe 4000 Document_File_Account.exe 4000 Document_File_Account.exe 4000 Document_File_Account.exe 4000 Document_File_Account.exe 4000 Document_File_Account.exe 4000 Document_File_Account.exe 4000 Document_File_Account.exe 4000 Document_File_Account.exe 4000 Document_File_Account.exe 4000 Document_File_Account.exe 4000 Document_File_Account.exe 4000 Document_File_Account.exe 4000 Document_File_Account.exe 4000 Document_File_Account.exe 180 extrac32.exe 180 extrac32.exe 180 extrac32.exe 180 extrac32.exe 180 extrac32.exe 180 extrac32.exe 180 extrac32.exe 180 extrac32.exe 180 extrac32.exe 180 extrac32.exe 180 extrac32.exe 180 extrac32.exe 180 extrac32.exe 180 extrac32.exe 180 extrac32.exe 180 extrac32.exe 180 extrac32.exe 180 extrac32.exe 180 extrac32.exe 180 extrac32.exe 180 extrac32.exe 180 extrac32.exe 180 extrac32.exe 180 extrac32.exe 180 extrac32.exe 180 extrac32.exe 180 extrac32.exe 180 extrac32.exe 180 extrac32.exe 180 extrac32.exe 180 extrac32.exe 180 extrac32.exe 180 extrac32.exe 180 extrac32.exe 180 extrac32.exe 180 extrac32.exe 180 extrac32.exe 180 extrac32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3272 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 4000 Document_File_Account.exe 3272 Explorer.EXE 3272 Explorer.EXE 180 extrac32.exe 180 extrac32.exe 180 extrac32.exe 180 extrac32.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 4240 Document_File_Account.exe Token: SeShutdownPrivilege 3272 Explorer.EXE Token: SeCreatePagefilePrivilege 3272 Explorer.EXE Token: SeShutdownPrivilege 3272 Explorer.EXE Token: SeCreatePagefilePrivilege 3272 Explorer.EXE Token: SeShutdownPrivilege 3272 Explorer.EXE Token: SeCreatePagefilePrivilege 3272 Explorer.EXE Token: SeShutdownPrivilege 3272 Explorer.EXE Token: SeCreatePagefilePrivilege 3272 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4240 wrote to memory of 3784 4240 Document_File_Account.exe 90 PID 4240 wrote to memory of 3784 4240 Document_File_Account.exe 90 PID 4240 wrote to memory of 3784 4240 Document_File_Account.exe 90 PID 4240 wrote to memory of 4324 4240 Document_File_Account.exe 91 PID 4240 wrote to memory of 4324 4240 Document_File_Account.exe 91 PID 4240 wrote to memory of 4324 4240 Document_File_Account.exe 91 PID 4240 wrote to memory of 4000 4240 Document_File_Account.exe 92 PID 4240 wrote to memory of 4000 4240 Document_File_Account.exe 92 PID 4240 wrote to memory of 4000 4240 Document_File_Account.exe 92 PID 4240 wrote to memory of 4000 4240 Document_File_Account.exe 92 PID 4240 wrote to memory of 4000 4240 Document_File_Account.exe 92 PID 4240 wrote to memory of 4000 4240 Document_File_Account.exe 92 PID 3272 wrote to memory of 180 3272 Explorer.EXE 97 PID 3272 wrote to memory of 180 3272 Explorer.EXE 97 PID 3272 wrote to memory of 180 3272 Explorer.EXE 97 PID 180 wrote to memory of 1356 180 extrac32.exe 98 PID 180 wrote to memory of 1356 180 extrac32.exe 98 PID 180 wrote to memory of 1356 180 extrac32.exe 98
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Users\Admin\AppData\Local\Temp\Document_File_Account.exe"C:\Users\Admin\AppData\Local\Temp\Document_File_Account.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Users\Admin\AppData\Local\Temp\Document_File_Account.exe"C:\Users\Admin\AppData\Local\Temp\Document_File_Account.exe"3⤵PID:3784
-
-
C:\Users\Admin\AppData\Local\Temp\Document_File_Account.exe"C:\Users\Admin\AppData\Local\Temp\Document_File_Account.exe"3⤵PID:4324
-
-
C:\Users\Admin\AppData\Local\Temp\Document_File_Account.exe"C:\Users\Admin\AppData\Local\Temp\Document_File_Account.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4000
-
-
-
C:\Windows\SysWOW64\extrac32.exe"C:\Windows\SysWOW64\extrac32.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:180 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1356
-
-