Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29-02-2024 05:30
Static task
static1
Behavioral task
behavioral1
Sample
payment_advice.pdf.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
payment_advice.pdf.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
Boudoirerne.app
Resource
macos-20240214-en
General
-
Target
payment_advice.pdf.exe
-
Size
488KB
-
MD5
b1a75a6271ebfc3b672d0a81554a8cb6
-
SHA1
e2d8af8ad37f39525d3a9c2b3e76761fa708e58e
-
SHA256
744e507d743c9e8a041276c397fd996f5b395ffe03b3ae2c2e8abf2e873eeb10
-
SHA512
5b65a743198c0aa81ee2f3b7168d506ac88ca8c0a88673d2531602ad48fe65481578657333b0dadf0682ef8be56b44d08ab2633a6bb8cb9c55be1d3d18665be6
-
SSDEEP
12288:hGzEt2rIG4OUv310EviKF8zm/QF5h7OeLp0:hGz54fN0CYT1fp0
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2868 payment_advice.pdf.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 3 drive.google.com 5 drive.google.com -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\rekinole.Pre payment_advice.pdf.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2868 payment_advice.pdf.exe 2604 payment_advice.pdf.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2868 set thread context of 2604 2868 payment_advice.pdf.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2868 payment_advice.pdf.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2868 wrote to memory of 2604 2868 payment_advice.pdf.exe 28 PID 2868 wrote to memory of 2604 2868 payment_advice.pdf.exe 28 PID 2868 wrote to memory of 2604 2868 payment_advice.pdf.exe 28 PID 2868 wrote to memory of 2604 2868 payment_advice.pdf.exe 28 PID 2868 wrote to memory of 2604 2868 payment_advice.pdf.exe 28 PID 2868 wrote to memory of 2604 2868 payment_advice.pdf.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\payment_advice.pdf.exe"C:\Users\Admin\AppData\Local\Temp\payment_advice.pdf.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\payment_advice.pdf.exe"C:\Users\Admin\AppData\Local\Temp\payment_advice.pdf.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2604
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD54add245d4ba34b04f213409bfe504c07
SHA1ef756d6581d70e87d58cc4982e3f4d18e0ea5b09
SHA2569111099efe9d5c9b391dc132b2faf0a3851a760d4106d5368e30ac744eb42706
SHA5121bd260cabe5ea3cefbbc675162f30092ab157893510f45a1b571489e03ebb2903c55f64f89812754d3fe03c8f10012b8078d1261a7e73ac1f87c82f714bce03d