Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/02/2025, 14:32
Static task
static1
Behavioral task
behavioral1
Sample
AkBankPaymentAdvice25.02.25.PDF.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
AkBankPaymentAdvice25.02.25.PDF.exe
Resource
win10v2004-20250217-en
General
-
Target
AkBankPaymentAdvice25.02.25.PDF.exe
-
Size
810KB
-
MD5
aa803cd51f3e60c2b20243bb9daf0ecc
-
SHA1
55a459947d00e90778254731697f7c0483ea8bee
-
SHA256
bd8fd6be04313a5a4eb8fa44ebfab32d3a3f070f704aab64a1942385f96bc5b5
-
SHA512
63f1105ccb841bf68938710bdd2b3db98fa427f0e3e49f1e2f775f13c4d1cdc057f695d8177b5832fb923fe3aeb5f9e9263bed51a470d2d2d714907f765562db
-
SSDEEP
12288:bXlJzDftpn5sJdU0FwCUcOpIKtuMmjjvF+aTfX+Q+szg8wtS1HirSnVHNYRSD6H8:bXLPX6bCCCGMm/Fr+NswStikt+H
Malware Config
Signatures
-
pid Process 2396 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AkBankPaymentAdvice25.02.25.PDF.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2396 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2396 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2396 2252 AkBankPaymentAdvice25.02.25.PDF.exe 30 PID 2252 wrote to memory of 2396 2252 AkBankPaymentAdvice25.02.25.PDF.exe 30 PID 2252 wrote to memory of 2396 2252 AkBankPaymentAdvice25.02.25.PDF.exe 30 PID 2252 wrote to memory of 2396 2252 AkBankPaymentAdvice25.02.25.PDF.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\AkBankPaymentAdvice25.02.25.PDF.exe"C:\Users\Admin\AppData\Local\Temp\AkBankPaymentAdvice25.02.25.PDF.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle minimized "$Disbase=gc -Raw 'C:\Users\Admin\AppData\Local\overmitigating\Semimatureness.Syn';$Portended=$Disbase.SubString(2330,3);.$Portended($Disbase)" "$Disbase=gc -Raw 'C:\Users\Admin\AppData\Local\overmitigating\Semimatureness.Syn';$Portended=$Disbase.SubString(2330,3);.$Portended($Disbase)"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2396
-