Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2024 09:57

General

  • Target

    Fattura 00384788-00849838.pdf.exe

  • Size

    884KB

  • MD5

    23c1fa39c8cb4a46d54b2c9ea9df952d

  • SHA1

    815dfd495271d7792e5d0dbb3e78a14bf4a8fd90

  • SHA256

    97be6754d010714743932afa3f4ea308e2f0b19212e8b8b150af7cdd3383f44b

  • SHA512

    78106662327d856f05bc98bc700ab0f5d719fd2365c46db26400ad140b96004a86acd9831cba3799de4eeffa959c82c5ee557c1a1db266f79c49aa4b910e5d60

  • SSDEEP

    24576:dRHuj2I8hyf+fJGV8HiukodYP+gIHB7wcmZtpU:2jL8cf+xIsDWlVBZt6

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 49 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 2 IoCs
  • Modifies data under HKEY_USERS 23 IoCs
  • Modifies registry class 11 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k DcomLaunch -p
    1⤵
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:816
    • C:\Windows\system32\backgroundTaskHost.exe
      "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
      2⤵
        PID:4420
      • C:\Windows\system32\backgroundTaskHost.exe
        "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
        2⤵
          PID:1536
        • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
          C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
          2⤵
            PID:4596
          • C:\Windows\system32\DllHost.exe
            C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
            2⤵
              PID:2392
            • C:\Windows\system32\backgroundTaskHost.exe
              "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
              2⤵
                PID:1604
            • C:\Users\Admin\AppData\Local\Temp\Fattura 00384788-00849838.pdf.exe
              "C:\Users\Admin\AppData\Local\Temp\Fattura 00384788-00849838.pdf.exe"
              1⤵
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1792
              • C:\Users\Admin\AppData\Local\Temp\Fattura 00384788-00849838.pdf.exe
                "C:\Users\Admin\AppData\Local\Temp\Fattura 00384788-00849838.pdf.exe"
                2⤵
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:4496
            • C:\Users\Admin\AppData\Local\Temp\cuvlong.exe
              C:\Users\Admin\AppData\Local\Temp\cuvlong.exe
              1⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:3120
              • C:\Users\Admin\AppData\Local\Temp\cuvlong.exe
                C:\Users\Admin\AppData\Local\Temp\cuvlong.exe
                2⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:4184
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 4184 -s 636
                  3⤵
                  • Program crash
                  PID:3152
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 4184 -s 656
                  3⤵
                  • Program crash
                  PID:1384
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4184 -ip 4184
              1⤵
                PID:1376
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4184 -ip 4184
                1⤵
                  PID:1744

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\ProgramData\Microsoft OneDrive\dbcfgyj

                  Filesize

                  654B

                  MD5

                  819c843e14951e6a1b2cb123dada1ed3

                  SHA1

                  91450a1f4f02913802159e0e386673e205f489a1

                  SHA256

                  a35c443dbfe9e12741a6f6c3cd3ee8156b810c68a616fdc761d337a779235c12

                  SHA512

                  690c990b256e2a156ac7a7d854a27a1d84dc3595864128de2ee41b9f55b1a86145023b2085461a22362ce767d3f65e63f4e3dceed045bfd0627d576ffd53d2c2

                • C:\Users\Admin\AppData\Local\Temp\cuvlong.exe

                  Filesize

                  884KB

                  MD5

                  23c1fa39c8cb4a46d54b2c9ea9df952d

                  SHA1

                  815dfd495271d7792e5d0dbb3e78a14bf4a8fd90

                  SHA256

                  97be6754d010714743932afa3f4ea308e2f0b19212e8b8b150af7cdd3383f44b

                  SHA512

                  78106662327d856f05bc98bc700ab0f5d719fd2365c46db26400ad140b96004a86acd9831cba3799de4eeffa959c82c5ee557c1a1db266f79c49aa4b910e5d60

                • C:\Users\Admin\AppData\Local\Temp\nsr8BB6.tmp\System.dll

                  Filesize

                  11KB

                  MD5

                  883eff06ac96966270731e4e22817e11

                  SHA1

                  523c87c98236cbc04430e87ec19b977595092ac8

                  SHA256

                  44e5dfd551b38e886214bd6b9c8ee913c4c4d1f085a6575d97c3e892b925da82

                  SHA512

                  60333253342476911c84bbc1d9bf8a29f811207787fdd6107dce8d2b6e031669303f28133ffc811971ed7792087fe90fb1faabc0af4e91c298ba51e28109a390

                • C:\Users\Admin\AppData\Roaming\Nwiz.dll

                  Filesize

                  54KB

                  MD5

                  af5cfacd0e4f50aea5e1353131d31ee1

                  SHA1

                  2c25083e39c4604bcde7ebc1ea966d45646eead8

                  SHA256

                  60737caef33db58b24924eecaeb13e9d6c6cbc27408fd2c59cda67d326b1495e

                  SHA512

                  5c58ecb55ca6a82bfe6d5647058b4d2e852010029d4a356d7cbd4a4e7fa3f31ca3fb88a8e81c9566e9d9736e104e8d8375053ff89d90802cc145e27349155db9

                • C:\Users\Admin\AppData\Roaming\README_te.TXT

                  Filesize

                  884B

                  MD5

                  0c041dcb1d9bb1c91548c46b484be783

                  SHA1

                  882c3e8e97fe1dacf3b30d250c3da72667b95417

                  SHA256

                  20c311f57374a8734d48426cca56e3a132daf65c3d01925f04cacf62ed82ffcf

                  SHA512

                  b0ffd5ed8e93e811a6b52ab70a4df807fa2f8c161f9c66737621b397f0b474c45402456c711a3a6931f98b78547a63c7ac3a17f7b58c2b62933ed98753ec5ca6

                • F:\$RECYCLE.BIN\S-1-5-18\desktop.ini

                  Filesize

                  129B

                  MD5

                  a526b9e7c716b3489d8cc062fbce4005

                  SHA1

                  2df502a944ff721241be20a9e449d2acd07e0312

                  SHA256

                  e1b9ce9b57957b1a0607a72a057d6b7a9b34ea60f3f8aa8f38a3af979bd23066

                  SHA512

                  d83d4c656c96c3d1809ad06ce78fa09a77781461c99109e4b81d1a186fc533a7e72d65a4cb7edf689eeccda8f687a13d3276f1111a1e72f7c3cd92a49bce0f88

                • memory/816-355-0x000000002DDF0000-0x000000002DE67000-memory.dmp

                  Filesize

                  476KB

                • memory/816-3507-0x000000002DDF0000-0x000000002DE67000-memory.dmp

                  Filesize

                  476KB

                • memory/816-149-0x000000002DDF0000-0x000000002DE67000-memory.dmp

                  Filesize

                  476KB

                • memory/816-178-0x000000002DDF0000-0x000000002DE67000-memory.dmp

                  Filesize

                  476KB

                • memory/816-161-0x000000002DDF0000-0x000000002DE67000-memory.dmp

                  Filesize

                  476KB

                • memory/816-146-0x000000002DDF0000-0x000000002DE67000-memory.dmp

                  Filesize

                  476KB

                • memory/816-143-0x000000002DDF0000-0x000000002DE67000-memory.dmp

                  Filesize

                  476KB

                • memory/816-145-0x000000002DDF0000-0x000000002DE67000-memory.dmp

                  Filesize

                  476KB

                • memory/816-151-0x000000002DDF0000-0x000000002DE67000-memory.dmp

                  Filesize

                  476KB

                • memory/1792-64-0x0000000003070000-0x0000000003083000-memory.dmp

                  Filesize

                  76KB

                • memory/1792-61-0x0000000003070000-0x0000000003083000-memory.dmp

                  Filesize

                  76KB

                • memory/1792-57-0x0000000003070000-0x0000000003083000-memory.dmp

                  Filesize

                  76KB

                • memory/3120-133-0x0000000000D60000-0x0000000000D73000-memory.dmp

                  Filesize

                  76KB

                • memory/3120-139-0x0000000000D60000-0x0000000000D73000-memory.dmp

                  Filesize

                  76KB

                • memory/3120-128-0x0000000000D60000-0x0000000000D73000-memory.dmp

                  Filesize

                  76KB

                • memory/4184-140-0x0000000000940000-0x0000000000B8B000-memory.dmp

                  Filesize

                  2.3MB

                • memory/4496-67-0x0000000000980000-0x0000000000BCB000-memory.dmp

                  Filesize

                  2.3MB

                • memory/4496-65-0x0000000000760000-0x000000000097A000-memory.dmp

                  Filesize

                  2.1MB

                • memory/4496-63-0x0000000000400000-0x00000000004A5000-memory.dmp

                  Filesize

                  660KB

                • memory/4496-66-0x0000000000400000-0x00000000004A4600-memory.dmp

                  Filesize

                  657KB

                • memory/4496-60-0x0000000000400000-0x00000000004A5000-memory.dmp

                  Filesize

                  660KB