Analysis
-
max time kernel
140s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17/10/2024, 19:24
Static task
static1
Behavioral task
behavioral1
Sample
best price pdf.exe
Resource
win7-20240903-en
General
-
Target
best price pdf.exe
-
Size
664KB
-
MD5
fe5739c9d1cf440f7297a7ef831418b1
-
SHA1
5a969cdbf2dc17fc4dfd6256d63b4ddc2a11021c
-
SHA256
0b3423499f53462afd426652f26d5a2cb90347cb3265bb35d7041727912670d2
-
SHA512
fa059e1b6ea6476733d1ae12e876306680fdc7c062c0fe2f2529f42a3b3c2522a637813dbb889c50e241c433dc1a8c79729ccf39b98f4bbbd77ccef2cc4d353d
-
SSDEEP
12288:01RveBYTAMnFo+Jnyy5u3pXYapnRDdcdF1CB7pnnj0UQM2WbdbVDpQBrvdKwQk6X:01RWBYcMnFztyyecdF1Q0hWTDyBZKw16
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4316 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation best price pdf.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4700 set thread context of 2236 4700 best price pdf.exe 102 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language best price pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2088 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 4700 best price pdf.exe 4700 best price pdf.exe 4316 powershell.exe 4316 powershell.exe 2236 best price pdf.exe 2236 best price pdf.exe 2236 best price pdf.exe 2236 best price pdf.exe 2236 best price pdf.exe 2236 best price pdf.exe 2236 best price pdf.exe 2236 best price pdf.exe 2236 best price pdf.exe 2236 best price pdf.exe 2236 best price pdf.exe 2236 best price pdf.exe 2236 best price pdf.exe 2236 best price pdf.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4700 best price pdf.exe Token: SeDebugPrivilege 4316 powershell.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4700 wrote to memory of 4316 4700 best price pdf.exe 98 PID 4700 wrote to memory of 4316 4700 best price pdf.exe 98 PID 4700 wrote to memory of 4316 4700 best price pdf.exe 98 PID 4700 wrote to memory of 2088 4700 best price pdf.exe 100 PID 4700 wrote to memory of 2088 4700 best price pdf.exe 100 PID 4700 wrote to memory of 2088 4700 best price pdf.exe 100 PID 4700 wrote to memory of 2236 4700 best price pdf.exe 102 PID 4700 wrote to memory of 2236 4700 best price pdf.exe 102 PID 4700 wrote to memory of 2236 4700 best price pdf.exe 102 PID 4700 wrote to memory of 2236 4700 best price pdf.exe 102 PID 4700 wrote to memory of 2236 4700 best price pdf.exe 102 PID 4700 wrote to memory of 2236 4700 best price pdf.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\best price pdf.exe"C:\Users\Admin\AppData\Local\Temp\best price pdf.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\thBNEDb.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4316
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\thBNEDb" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD5CE.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2088
-
-
C:\Users\Admin\AppData\Local\Temp\best price pdf.exe"C:\Users\Admin\AppData\Local\Temp\best price pdf.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2236
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD5cef45f5857af6a3b2f835a3d1d29fed3
SHA135ced5c006cbf8f9663eb395df5637fc2de8cd80
SHA256d379cf99d014918f08eda84a05c57bd41eb8d8a0eab15afe74263532b72dcff9
SHA5123a08970e21c0cd2bf7b8c06613d735779bf7ae269ee45135797bd12f5a51fa7383e32129b7b1ee4be2a612e84a5a9d6701f20a3cabfb996ce8c5fcb6c7724c56