Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-10-2024 14:00

General

  • Target

    Fattura 00384788-0849838.pdf.exe

  • Size

    867KB

  • MD5

    921023d253b6dfac1eaabe38f3b36a45

  • SHA1

    82ae601f2eb5202a5314feffb2a9bd07c5f33327

  • SHA256

    a2deb60615b3bd20beeb9253547a41c0a970139bfb59d9f88854b8b61880ead1

  • SHA512

    86229692b51a24e3f29aec482f6aca2109cf98031011a5bc71b756ee1417fe0200c179bde3adfd9dd72dcb5edd553abb98a5c6845b1c42d3e7672038fb7bc115

  • SSDEEP

    24576:+XH+j3CgxpmJI+QhQ3r+HVqQUEHpGzOUPZ:Jj3CgxpNhN16EHpCx

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 56 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 2 IoCs
  • Modifies data under HKEY_USERS 23 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k DcomLaunch -p
    1⤵
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Modifies data under HKEY_USERS
    • Suspicious use of WriteProcessMemory
    PID:808
    • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
      C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
      2⤵
        PID:3276
      • C:\Windows\system32\DllHost.exe
        C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
        2⤵
          PID:4816
      • C:\Users\Admin\AppData\Local\Temp\Fattura 00384788-0849838.pdf.exe
        "C:\Users\Admin\AppData\Local\Temp\Fattura 00384788-0849838.pdf.exe"
        1⤵
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2380
        • C:\Users\Admin\AppData\Local\Temp\Fattura 00384788-0849838.pdf.exe
          "C:\Users\Admin\AppData\Local\Temp\Fattura 00384788-0849838.pdf.exe"
          2⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:3208
      • C:\Users\Admin\AppData\Local\Temp\zsioqoc.exe
        C:\Users\Admin\AppData\Local\Temp\zsioqoc.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Suspicious use of SetThreadContext
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1932
        • C:\Users\Admin\AppData\Local\Temp\zsioqoc.exe
          C:\Users\Admin\AppData\Local\Temp\zsioqoc.exe
          2⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2156
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2156 -s 636
            3⤵
            • Program crash
            PID:2488
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2156 -s 656
            3⤵
            • Program crash
            PID:5052
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2156 -ip 2156
        1⤵
          PID:1604
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2156 -ip 2156
          1⤵
            PID:4196

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\ProgramData\SoftwareDistribution\arvnhth

            Filesize

            654B

            MD5

            59f6a57ee51dc4ffbe6d6571ca78d457

            SHA1

            0e8dd1c4097f404213b30b642aa704ad767189b7

            SHA256

            87104a1bfe2367cf03632ece1d3cdedd33dc979a123d0030de4e0aeb02adc30b

            SHA512

            0108649f50854da6bea47c57940a33cd82c6fee8318c7e408e4a3eb6e8622a5f628c5d98583855678f9c1c3174db9f7ace15317b19d79cd400830d5f658a34bd

          • C:\Users\Admin\AppData\Local\Temp\nss8DD9.tmp\System.dll

            Filesize

            11KB

            MD5

            883eff06ac96966270731e4e22817e11

            SHA1

            523c87c98236cbc04430e87ec19b977595092ac8

            SHA256

            44e5dfd551b38e886214bd6b9c8ee913c4c4d1f085a6575d97c3e892b925da82

            SHA512

            60333253342476911c84bbc1d9bf8a29f811207787fdd6107dce8d2b6e031669303f28133ffc811971ed7792087fe90fb1faabc0af4e91c298ba51e28109a390

          • C:\Users\Admin\AppData\Local\Temp\zsioqoc.exe

            Filesize

            867KB

            MD5

            921023d253b6dfac1eaabe38f3b36a45

            SHA1

            82ae601f2eb5202a5314feffb2a9bd07c5f33327

            SHA256

            a2deb60615b3bd20beeb9253547a41c0a970139bfb59d9f88854b8b61880ead1

            SHA512

            86229692b51a24e3f29aec482f6aca2109cf98031011a5bc71b756ee1417fe0200c179bde3adfd9dd72dcb5edd553abb98a5c6845b1c42d3e7672038fb7bc115

          • C:\Users\Admin\AppData\Roaming\LICENSE_en_US.TXT

            Filesize

            2KB

            MD5

            00d7ffb88aeb3f3fa5ae3178591139ef

            SHA1

            b5edc99a205912d98207c1314d696dfe48192118

            SHA256

            f8dfac00ca2636f16dbb824c1626a607308bb582356fb736d1ee3f5f2656d861

            SHA512

            03e9df7a1cd6b214b03830b184bf0e7c0abb48da36a184402f2bb3590991bb027cff95cc8751d83cb5c7f7fcddc6969e746056a307d30cfc9fe937010f9a4fa7

          • C:\Users\Admin\AppData\Roaming\NsResize.dll

            Filesize

            60KB

            MD5

            9c655b0c142db0494026c1ebb1b3923f

            SHA1

            2dbebe42968e78200688e40ab5b8d25bf8e0b4df

            SHA256

            ef2d114896f07fc20aed5c3045754de0103813aa31bedb188262cec6fb3263dd

            SHA512

            51d7efab18f6909daf61534befa2e20eec437c24114f7c21b383004806d4b8869dc12395a972965c89dbeb66fe0282833207b5aa93ec7f085ca7054d0a0d9f1d

          • C:\Users\Admin\AppData\Roaming\README_kn_IN.TXT

            Filesize

            409B

            MD5

            ade6c65fd0eeb73a60e279fdc7da023b

            SHA1

            4af90b3176b51d1e70e5561e27a2a2fd2277edcb

            SHA256

            56c2ecc106829db1020d48fe49a4802a4ee24875a8a873fff86ff0c413a3e226

            SHA512

            6bce13814640b256b83fa54b9d8df0e34076734baaa090b9aa433eefff87324b6782dd36567ea1c231480714c15df30dafb0cc665ea8194c1ada2f956ec0b83e

          • C:\Users\Admin\AppData\Roaming\default_hash.JS

            Filesize

            136B

            MD5

            06a09bda9d5dd7dba611b2dd460d545e

            SHA1

            73946d0150e298464b8a55a107bb22be6368029c

            SHA256

            c062646586359c92950920a9e5a51bcec73afeb863dc01337a88adadc789f05e

            SHA512

            b104418ebc3eabf7a3d4aae3a23bdeea63d0118f56397e3763318397baa0b59ed5756a354a922c2c6206636ab761197e379e6fa5b4aa7cf2a60c24416a2ad459

          • C:\Users\Admin\AppData\Roaming\setup.ISS

            Filesize

            241B

            MD5

            698f513c0c9d50ac789cfbe4bde1b467

            SHA1

            122acd3c51b72fc2bf4dc556cac09f9e6c6445fa

            SHA256

            f19b204261a5524ed3f5204fbd01d91f06fe1b2181b2fa2c2c7629ccb4e54b16

            SHA512

            c2b5ef941d332d2faa780d044ee5fee6f59d7852e5b0a5974fa47c9b9f03c2b3d867423004eae788ac765f30dbe65bc3b71cd9b679b1ff5dee78eb8fc82f41fc

          • F:\$RECYCLE.BIN\S-1-5-18\desktop.ini

            Filesize

            129B

            MD5

            a526b9e7c716b3489d8cc062fbce4005

            SHA1

            2df502a944ff721241be20a9e449d2acd07e0312

            SHA256

            e1b9ce9b57957b1a0607a72a057d6b7a9b34ea60f3f8aa8f38a3af979bd23066

            SHA512

            d83d4c656c96c3d1809ad06ce78fa09a77781461c99109e4b81d1a186fc533a7e72d65a4cb7edf689eeccda8f687a13d3276f1111a1e72f7c3cd92a49bce0f88

          • memory/808-179-0x000000001EF20000-0x000000001EF97000-memory.dmp

            Filesize

            476KB

          • memory/808-196-0x000000001EF20000-0x000000001EF97000-memory.dmp

            Filesize

            476KB

          • memory/808-155-0x000000001EF20000-0x000000001EF97000-memory.dmp

            Filesize

            476KB

          • memory/808-158-0x000000001EF20000-0x000000001EF97000-memory.dmp

            Filesize

            476KB

          • memory/808-157-0x000000001EF20000-0x000000001EF97000-memory.dmp

            Filesize

            476KB

          • memory/808-163-0x000000001EF20000-0x000000001EF97000-memory.dmp

            Filesize

            476KB

          • memory/808-161-0x000000001EF20000-0x000000001EF97000-memory.dmp

            Filesize

            476KB

          • memory/808-3547-0x000000001EF20000-0x000000001EF97000-memory.dmp

            Filesize

            476KB

          • memory/808-367-0x000000001EF20000-0x000000001EF97000-memory.dmp

            Filesize

            476KB

          • memory/1932-141-0x0000000000D50000-0x0000000000D60000-memory.dmp

            Filesize

            64KB

          • memory/2156-152-0x0000000000990000-0x0000000000BDB000-memory.dmp

            Filesize

            2.3MB

          • memory/2380-64-0x0000000002300000-0x0000000002310000-memory.dmp

            Filesize

            64KB

          • memory/3208-73-0x0000000000A00000-0x0000000000C4B000-memory.dmp

            Filesize

            2.3MB

          • memory/3208-72-0x0000000000400000-0x00000000004A4600-memory.dmp

            Filesize

            657KB

          • memory/3208-70-0x0000000000400000-0x00000000004A5000-memory.dmp

            Filesize

            660KB

          • memory/3208-71-0x00000000007E0000-0x00000000009FA000-memory.dmp

            Filesize

            2.1MB

          • memory/3208-68-0x0000000000400000-0x00000000004A5000-memory.dmp

            Filesize

            660KB