Analysis

  • max time kernel
    94s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-12-2024 05:27

General

  • Target

    9073782912,pdf.exe

  • Size

    362KB

  • MD5

    a7fcbd96b8a0db116079de4ea0e996d6

  • SHA1

    890e3cc679fbd6e7ab63153e19d3cadfedd6cee0

  • SHA256

    173c70809b04f14f357dde36d17bd02b075dcfdecf0e8cc5c69fb4266e452bb7

  • SHA512

    e9cba770b543daf9c90e856a476aac1c44ea6f892b62ae31ea7c9fb565f7f7f4cee8ef430cf8fa8bd3b995b5a15af063b53d0e963d4c7630111ca37674547b9f

  • SSDEEP

    6144:QBlL/UyTeiB0PJo3zzj9XJkhtXyofdY4Z2M7b2Y2TTzp1K:iDnfj9XmLJbZ2M7b27jK

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9073782912,pdf.exe
    "C:\Users\Admin\AppData\Local\Temp\9073782912,pdf.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1544
    • C:\Users\Admin\AppData\Local\Temp\9073782912,pdf.exe
      "C:\Users\Admin\AppData\Local\Temp\9073782912,pdf.exe"
      2⤵
        PID:3092
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1544 -s 1064
        2⤵
        • Program crash
        PID:400
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1544 -ip 1544
      1⤵
        PID:3568

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\nsp7986.tmp\c163.dll

        Filesize

        149KB

        MD5

        ff92e869d01daa3746d2cec2646ad093

        SHA1

        8550d250841652780bc92379fadf5a39244bc64e

        SHA256

        af33fde8b5a9f218f92278d6c1c17e91624242262fa65e9a770fb81b14b42bb4

        SHA512

        9899011426347267a98ca13c5dda0f20a3d9976e33c0be4aa21d4bfc656d094088403bf9cfb6f443efb4b24748b207a6af0f723bebfc7209baff334cdba16cdb

      • memory/1544-5-0x0000000074F70000-0x0000000074F7B000-memory.dmp

        Filesize

        44KB

      • memory/1544-7-0x0000000074F70000-0x0000000074F7B000-memory.dmp

        Filesize

        44KB