Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25-01-2024 17:51

General

  • Target

    3_Документи.pdf.exe

  • Size

    1.1MB

  • MD5

    a85a13ceb0a2fb1ac658a6cddc3628a5

  • SHA1

    28ddbc9d2ecb7073fe329c59c73afa52e4973c1d

  • SHA256

    2afe2fed654c4514265a3d1b0f50cef25b9fc34351887a13d770457ba018492d

  • SHA512

    0ced8655cf9b61a28bfeba5d16117caa1c1d87ebfa7622229fe43b0d36eb74bcead44b7f8412f8a38e505d57bcca33a6e3775e310dcd0cf9d1c9cf99ff4c2f47

  • SSDEEP

    24576:JZ37GcN9ytIFGibL4fzXeoRVofL+0zA7TrjkoG0WIorgXIMLVPO2:JB7XK9iyjCT5A7T/SrdMLV22

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3_Документи.pdf.exe
    "C:\Users\Admin\AppData\Local\Temp\3_Документи.pdf.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2052
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /k cmd < Strings & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2712
      • C:\Windows\SysWOW64\cmd.exe
        cmd
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2012
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist
          4⤵
          • Enumerates processes with tasklist
          • Suspicious use of AdjustPrivilegeToken
          PID:2852
        • C:\Windows\SysWOW64\findstr.exe
          findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"
          4⤵
            PID:2720
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • Suspicious use of AdjustPrivilegeToken
            PID:2724
          • C:\Windows\SysWOW64\findstr.exe
            findstr /I "wrsa.exe"
            4⤵
              PID:2732
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c mkdir 8211
              4⤵
                PID:2564
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c copy /b Tour + Wheel + Magical + Sides + Mf + Header 8211\Ri.pif
                4⤵
                  PID:2572
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c copy /b Coupons + Her + Decorative 8211\d
                  4⤵
                    PID:2728
                  • C:\Windows\SysWOW64\PING.EXE
                    ping -n 5 localhost
                    4⤵
                    • Runs ping.exe
                    PID:3024
                  • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\8211\Ri.pif
                    8211\Ri.pif 8211\d
                    4⤵
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    • Suspicious use of WriteProcessMemory
                    PID:2848
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 2848 -s 512
                      5⤵
                      • Loads dropped DLL
                      • Program crash
                      PID:1564

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\8211\Ri.pif

              Filesize

              924KB

              MD5

              848164d084384c49937f99d5b894253e

              SHA1

              3055ef803eeec4f175ebf120f94125717ee12444

              SHA256

              f58d3a4b2f3f7f10815c24586fae91964eeed830369e7e0701b43895b0cefbd3

              SHA512

              aabe1cf076f48f32542f49a92e4ca9f054b31d5a9949119991b897b9489fe775d8009896408ba49ac43ec431c87c0d385daead9dbbde7ef6309b0c97bbaf852a

            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\8211\d

              Filesize

              1.1MB

              MD5

              b1c6275d28d8ef11215547a5a1dd041c

              SHA1

              f917f7c513b240714031ea8b3163570a8c419032

              SHA256

              652ca8d800770c0592362d8223d23eb0811491a016670103d73942ee882014c2

              SHA512

              01df5059612ada3e43ddf5051f06393a85705d9e5569ef05d8b03f61ade7f1e0060a3225924a3b944bd2c33fb911d21c0e4f5d52b5fd71de19a09dd0d5e82dde

            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Coupons

              Filesize

              470KB

              MD5

              868b4f1a860604da4de0fcbdeb8f3955

              SHA1

              f03051d88f48dd21b44525771e3e058848e50b98

              SHA256

              2c09af789c33b6a7f769a2076bffb025027b45e28ae21f588a8d431d5c2b7bca

              SHA512

              aa9e3d40b7d81747ec2e190bd899c59c233c3fbfdafe897fca8101537da50f7ac550704d8ebc25f78c09a1b4ecd51b6179fba56860a94f9d8ff1229fb21c2941

            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Decorative

              Filesize

              287KB

              MD5

              11b0e09a31165d0b564ed6108247e32e

              SHA1

              9e44915c1778d17712ce609ab53043d4e270bfba

              SHA256

              75df35ea009602413921f725b2579716ae76247b986735c31f5037bb2dbb3abb

              SHA512

              28a44f9152900da7c4ea4a151aab0123d0089953b6b2a217d3dfb7860ea449720172658000589c04c4bdf597290afea32fab0cb53c1571592d4de9fc30210bfa

            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Header

              Filesize

              103KB

              MD5

              e904474a7442c2d35dc17a05a2412ec1

              SHA1

              cb1c7570221703722cc54ead60460b0488ab29a5

              SHA256

              a5cc801b2db4523d6a7dfa40128b858bd3d297a7ea1607845fb535fd0d721f2c

              SHA512

              d56684844b13a0df8deacb7c92848eb7b56f12193c274fff7d3b42a1bd0ae4970fe0ba3c48242ae1b2c4746aecf79561e24e26816d9b5521ac9849a68b55839b

            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Her

              Filesize

              402KB

              MD5

              9b6f23f0978c91d394472f6400c32e9e

              SHA1

              6e520ff244e6ff257a5cf96d6f0ae72fa98d749a

              SHA256

              7bac1c0e1a8337f9f8d6bb645bf35a6af5e986ccb163fa017dbec86a3cf01a84

              SHA512

              8832bb69d0967ee4c28804d1babee6d99bf347194f7c0ccef780bb8a7530bc98139246ea2a246bb9bd62390dc9587111187d2cd556c93307f3c46e49e0a90c01

            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Magical

              Filesize

              190KB

              MD5

              8dee4f87e8b028086bfb9c6e28c7efeb

              SHA1

              07022aebc3ae5a8966acfe372127f43794ef8c0c

              SHA256

              95eb67f5407bb608c9d6b2972c87930a1ce4acbcaaf1f6308f3e5439e32dcea4

              SHA512

              b30f3f265515fa7682d87a82c56a6073647c4c2ba75f08cacc01143d90ec8c06634326fd4d23596417d5c479507a79b81890a99b438f05fb53ad7eff3c235bd8

            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Mf

              Filesize

              110KB

              MD5

              70c69b5c519979a93041dc147046963f

              SHA1

              1549258c1a0a8a957503cc6ee9f4768552469177

              SHA256

              e0fa999a7596408f51b11d427c5b4f290b8d7ce9d9b47c1a7a98361c728334bc

              SHA512

              8f8b2aa000b691caac1d0f32b8ef80e708e3cd9f4099e1c09fd837757ec15dc3cc1ff6ce72fc1c9bbab6a48a357ba6791c87c1de1db03d53e98da132751716a2

            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sides

              Filesize

              138KB

              MD5

              c2db062feb62093ad5892db13fe4c706

              SHA1

              e17106b070b70dccf5d94d481b492c2ad6c16c8c

              SHA256

              c1211df077e49d47d212220fde380911265ead362b42605d20c829900fb151f1

              SHA512

              6e983abb79fcfdd248241ab2d1a0ac3404fecc428e45863681b9fdd7f9fad3ee7fd0e8681b64d6d3a79295d9b9f721f576661e44aac7e055e74f9d466ec37143

            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Strings

              Filesize

              13KB

              MD5

              23688d1a4ab6134d67d0183adeda1306

              SHA1

              d61ef6782c022ac4ec0d7389d10d80d7498984b3

              SHA256

              7158e8faf43a3376141950870260798133098f81642e68056afd6dc3e1e1d776

              SHA512

              9808a88456f41d677cb6d8d1c493aba9bf4b7fc49ef88ab099030342fe65dc5473c9aa2c0747958fd0844a6a62750fc1bee15fc06cc7c6d5bf1b387030a90160

            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Tour

              Filesize

              188KB

              MD5

              62a7e75d1df779e6169adb0cfa905694

              SHA1

              3f855dc814432bd0cd6e793c5a5bb2776b838602

              SHA256

              7fa7da730c634c4a21832d2d35cbe4a6d1484fcfadbae988e2e97a9ad76f73db

              SHA512

              1f22866bfe4c6186b77c05aca2e4088c30e7ea1fe6057782a2a7aefda9221c78be2fe2cc5c673fd266e12218e91a66b254e90ff1d94f9ba6b8552c1e6bbc1698

            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Wheel

              Filesize

              195KB

              MD5

              9f291e36e5804f3a1ea7456dea65b346

              SHA1

              e69a6a0df88a24dc318bfaf1a323b080c6ad7624

              SHA256

              37a743aa0ddda77e81dfb5c1ca3ab0ad2dff05237a87189af2867c82c4916a65

              SHA512

              7959b0279934eb093f9cfdcdb642a183440f2575bc1a3ccfdfe2a712fb15015739490be27303a78d29a7eb19d432cbc513385d25f7c789e0a9ddd78afed62abf

            • memory/2848-36-0x0000000000160000-0x0000000000161000-memory.dmp

              Filesize

              4KB

            • memory/2848-38-0x00000000044A0000-0x0000000004529000-memory.dmp

              Filesize

              548KB

            • memory/2848-39-0x00000000044A0000-0x0000000004529000-memory.dmp

              Filesize

              548KB

            • memory/2848-37-0x00000000044A0000-0x0000000004529000-memory.dmp

              Filesize

              548KB

            • memory/2848-40-0x00000000044A0000-0x0000000004529000-memory.dmp

              Filesize

              548KB

            • memory/2848-41-0x00000000044A0000-0x0000000004529000-memory.dmp

              Filesize

              548KB

            • memory/2848-42-0x00000000044A0000-0x0000000004529000-memory.dmp

              Filesize

              548KB

            • memory/2848-43-0x0000000000170000-0x0000000000171000-memory.dmp

              Filesize

              4KB