Analysis

  • max time kernel
    16s
  • max time network
    26s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-05-2024 16:17

General

  • Target

    PicoPDFEditingSoftware.exe

  • Size

    1.5MB

  • MD5

    f6b95936cb7486dd5ca43c63c8ad36c6

  • SHA1

    a488faf5fa1c773b58988276ee61b0e9aa6dab24

  • SHA256

    9dc90f1f05edddba503a8df4c41f5b3c664d840d3b9097c4393f3bb939ea65bf

  • SHA512

    ceaf3738892d4e552fef0833c212c9e500ac026a15834a32ba741e4978158476c70f8e60a796075447b2da99509066fb283b68d27847aa533b2803254d63e85b

  • SSDEEP

    49152:5YyCar5yHxc9AXOgoLCrkMszdwMOL0fOt79drZ01:qLaERc7ghpsBzOLL79Y

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Registers COM server for autorun 1 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PicoPDFEditingSoftware.exe
    "C:\Users\Admin\AppData\Local\Temp\PicoPDFEditingSoftware.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:5104
    • C:\Users\Admin\AppData\Local\Temp\n1s\nchsetup.exe
      "C:\Users\Admin\AppData\Local\Temp\n1s\nchsetup.exe" -installer "C:\Users\Admin\AppData\Local\Temp\PicoPDFEditingSoftware.exe" -instdata "C:\Users\Admin\AppData\Local\Temp\n1s\nchdata.dat"
      2⤵
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Registers COM server for autorun
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      PID:3308
      • C:\Program Files (x86)\NCH Software\PicoPDF\picopdf.exe
        "C:\Program Files (x86)\NCH Software\PicoPDF\picopdf.exe"
        3⤵
        • Executes dropped EXE
        PID:2148
      • C:\Program Files (x86)\NCH Software\PicoPDF\picopdf.exe
        "C:\Program Files (x86)\NCH Software\PicoPDF\picopdf.exe" -installsched
        3⤵
        • Executes dropped EXE
        PID:1544

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\n1s\nchdata.dat

    Filesize

    159KB

    MD5

    aa3440ea0ac1b25846731287f849fb62

    SHA1

    484bf8fca647a5f9dcd4363ab9d47babf1c1e43b

    SHA256

    64698d1ee067c8b398f07100b693886b5d113473a339dfaf7d43bc2898ae3810

    SHA512

    cdc8acfc72c2d7586977f7b5c6156b77768835629de8e4b798ed8695ad152364af67f13e4bb475360b8609ded41bbb63cbfcf993222bb97afac650010df46f9e

  • C:\Users\Admin\AppData\Local\Temp\n1s\nchsetup.exe

    Filesize

    3.4MB

    MD5

    4e1f5f4bcd2ff3fbcc266ad026fbbbd2

    SHA1

    c2cc06979b8920511d78d15e0900e1f04f671d1c

    SHA256

    cba2ab55a7afd7ae700f3999c5b74edd3c6cb76eee8fb25f6867e82651235550

    SHA512

    4a82150f4d7446db5126095229b7f1534291a488fb5448e60d442ef3b1feb02d3004ecc42477d947f4adc86416ccc96713b40c50c3fdae8b75005bce958ab6e7