Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-10-2024 08:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
PROFORMA FATURA pdf.exe
Resource
win7-20240903-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
PROFORMA FATURA pdf.exe
Resource
win10v2004-20240802-en
windows10-2004-x64
12 signatures
150 seconds
General
-
Target
PROFORMA FATURA pdf.exe
-
Size
2.3MB
-
MD5
a30e9b58b16c609e63db086c39fc5c83
-
SHA1
c4d0933d90088ba673e17bcff3efd52dace7e8df
-
SHA256
f278e9e47422ea40eda7002194f17872643ab88366e84124813f161b28be9c09
-
SHA512
2a1bdda4e3c2ad2ad312acd87d16f4ccf9dc6ce3b50941d1771ef53786da9f91c71629096c3403b7b48cdb9ad215facf958a1353c5f0380b846987c9da90ea7b
-
SSDEEP
49152:tDCNmXVrxzzilHH+/EZvwN/Idbze5QYpiDLT+s:qHH+cZvPd/ew
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\Hzvunihikjt = "C:\\Users\\Admin\\AppData\\Roaming\\Hzvunihikjt.exe" PROFORMA FATURA pdf.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2824 PROFORMA FATURA pdf.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2824 PROFORMA FATURA pdf.exe Token: SeDebugPrivilege 2824 PROFORMA FATURA pdf.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2824 wrote to memory of 5868 2824 PROFORMA FATURA pdf.exe 30 PID 2824 wrote to memory of 5868 2824 PROFORMA FATURA pdf.exe 30 PID 2824 wrote to memory of 5868 2824 PROFORMA FATURA pdf.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\PROFORMA FATURA pdf.exe"C:\Users\Admin\AppData\Local\Temp\PROFORMA FATURA pdf.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2824 -s 6162⤵PID:5868
-