Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240220-en -
resource tags
arch:x64arch:x86image:win10v2004-20240220-enlocale:en-usos:windows10-2004-x64system -
submitted
20-02-2024 10:40
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
SC_TR11670000_pdf.exe
Resource
win7-20231215-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
SC_TR11670000_pdf.exe
Resource
win10v2004-20240220-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
SC_TR11670000_pdf.exe
-
Size
791KB
-
MD5
5e2995a12ec2cf797d09fd95114aa311
-
SHA1
f6da1ad0c233b9207378f28f1ff9796f32f5f71b
-
SHA256
07e858606138fffa52b802f81ca769f8d24ca1c774aedffc44d70bc4c8682753
-
SHA512
b8cf408c57cdd13cffc9602d632c64c96578dab46928adeedd0d35fe78860e53c47bd1d58083aa1aa85b2d4a6aa3ec5c89d3da225dad799cea8848bee59956b5
-
SSDEEP
24576:KKJF5NFAMqHMt7hqad9MSvpd26ssKHFx:zJFZARHywSX2IKFx
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4156 set thread context of 2108 4156 SC_TR11670000_pdf.exe 81 PID 2108 set thread context of 3416 2108 SC_TR11670000_pdf.exe 51 PID 2108 set thread context of 5080 2108 SC_TR11670000_pdf.exe 82 PID 5080 set thread context of 3416 5080 dvdplay.exe 51 -
description ioc Process Key created \Registry\User\S-1-5-21-4023562663-3911442808-1494947993-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 dvdplay.exe -
Suspicious behavior: EnumeratesProcesses 63 IoCs
pid Process 4156 SC_TR11670000_pdf.exe 4156 SC_TR11670000_pdf.exe 4156 SC_TR11670000_pdf.exe 4156 SC_TR11670000_pdf.exe 4156 SC_TR11670000_pdf.exe 4156 SC_TR11670000_pdf.exe 4156 SC_TR11670000_pdf.exe 2108 SC_TR11670000_pdf.exe 2108 SC_TR11670000_pdf.exe 2108 SC_TR11670000_pdf.exe 2108 SC_TR11670000_pdf.exe 2108 SC_TR11670000_pdf.exe 2108 SC_TR11670000_pdf.exe 2108 SC_TR11670000_pdf.exe 2108 SC_TR11670000_pdf.exe 2108 SC_TR11670000_pdf.exe 2108 SC_TR11670000_pdf.exe 2108 SC_TR11670000_pdf.exe 2108 SC_TR11670000_pdf.exe 2108 SC_TR11670000_pdf.exe 2108 SC_TR11670000_pdf.exe 2108 SC_TR11670000_pdf.exe 2108 SC_TR11670000_pdf.exe 5080 dvdplay.exe 5080 dvdplay.exe 5080 dvdplay.exe 5080 dvdplay.exe 5080 dvdplay.exe 5080 dvdplay.exe 5080 dvdplay.exe 5080 dvdplay.exe 5080 dvdplay.exe 5080 dvdplay.exe 5080 dvdplay.exe 5080 dvdplay.exe 5080 dvdplay.exe 5080 dvdplay.exe 5080 dvdplay.exe 5080 dvdplay.exe 5080 dvdplay.exe 5080 dvdplay.exe 5080 dvdplay.exe 5080 dvdplay.exe 5080 dvdplay.exe 5080 dvdplay.exe 5080 dvdplay.exe 5080 dvdplay.exe 5080 dvdplay.exe 5080 dvdplay.exe 5080 dvdplay.exe 5080 dvdplay.exe 5080 dvdplay.exe 5080 dvdplay.exe 5080 dvdplay.exe 5080 dvdplay.exe 5080 dvdplay.exe 5080 dvdplay.exe 5080 dvdplay.exe 5080 dvdplay.exe 5080 dvdplay.exe 5080 dvdplay.exe 5080 dvdplay.exe 5080 dvdplay.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 2108 SC_TR11670000_pdf.exe 3416 Explorer.EXE 3416 Explorer.EXE 5080 dvdplay.exe 5080 dvdplay.exe 5080 dvdplay.exe 5080 dvdplay.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4156 SC_TR11670000_pdf.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4156 wrote to memory of 2108 4156 SC_TR11670000_pdf.exe 81 PID 4156 wrote to memory of 2108 4156 SC_TR11670000_pdf.exe 81 PID 4156 wrote to memory of 2108 4156 SC_TR11670000_pdf.exe 81 PID 4156 wrote to memory of 2108 4156 SC_TR11670000_pdf.exe 81 PID 4156 wrote to memory of 2108 4156 SC_TR11670000_pdf.exe 81 PID 4156 wrote to memory of 2108 4156 SC_TR11670000_pdf.exe 81 PID 3416 wrote to memory of 5080 3416 Explorer.EXE 82 PID 3416 wrote to memory of 5080 3416 Explorer.EXE 82 PID 3416 wrote to memory of 5080 3416 Explorer.EXE 82 PID 5080 wrote to memory of 4072 5080 dvdplay.exe 83 PID 5080 wrote to memory of 4072 5080 dvdplay.exe 83 PID 5080 wrote to memory of 4072 5080 dvdplay.exe 83
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Users\Admin\AppData\Local\Temp\SC_TR11670000_pdf.exe"C:\Users\Admin\AppData\Local\Temp\SC_TR11670000_pdf.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Users\Admin\AppData\Local\Temp\SC_TR11670000_pdf.exe"C:\Users\Admin\AppData\Local\Temp\SC_TR11670000_pdf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2108
-
-
-
C:\Windows\SysWOW64\dvdplay.exe"C:\Windows\SysWOW64\dvdplay.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:4072
-
-