| File name: | inovoice-019338.pdf |
| Full analysis: | https://app.any.run/tasks/ceda9915-b526-4c2a-81f8-26ab0cecc328 |
| Verdict: | Malicious activity |
| Threats: | FlawedAmmmyy is a RAT type malware that can be used to perform actions remotely on an infected PC. This malware is well known for being featured in especially large campaigns with wide target demographics. |
| Analysis date: | July 13, 2018, 04:45:24 |
| OS: | Windows 10 Professional (build: 16299, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/pdf |
| File info: | PDF document, version 1.4 |
| MD5: | 2F7CEC0F91A5FD23D706DC53A82B2DB7 |
| SHA1: | 162E98D89F2AE3B4B469B066EBFE02AF22E9B869 |
| SHA256: | 576A373CCB9B62C3C934ABFE1573A87759A2BFE266477155E0E59F336CC28AB4 |
| SSDEEP: | 48:/KhVqyR0ZXEKYiG4Xus2EbfQIPaL7gjwmVLeG1pCZQ8VuwySPF:/KhJeXEme44IiL7gsmVLeGnCZQGujSPF |
| | | Adobe Portable Document Format (100) |
| ModifyDate: | 2018:07:12 12:17:42+03:00 |
|---|---|
| CreateDate: | 2018:07:12 12:17:42+03:00 |
| Producer: | iTextSharp™ 5.5.10 ©2000-2016 iText Group NV (AGPL-version) |
| PageCount: | 1 |
| Linearized: | No |
| PDFVersion: | 1.4 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 80 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\WINDOWS\system32\conhost.exe | cmd.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.16299.15 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 400 | net.exe stop ammyy | C:\WINDOWS\SysWOW64\net.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Net Command Exit code: 2 Version: 10.0.16299.15 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 408 | "C:\ProgramData\Microsoft Help\wsus.exe" | C:\ProgramData\Microsoft Help\wsus.exe | update12.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 1348 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\WINDOWS\system32\conhost.exe | — | LogTransport2.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.16299.15 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1536 | "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" --channel=5756.0.1345717623 --type=renderer /prefetch:1 "C:\Users\admin\Desktop\inovoice-019338.pdf" | C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe | — | AcroRd32.exe | |||||||||||
User: admin Company: Adobe Systems Incorporated Integrity Level: LOW Description: Adobe Acrobat Reader DC Exit code: 1 Version: 15.7.20033.133275 Modules
| |||||||||||||||
| 1604 | "C:\WINDOWS\system32\cmd.exe" /c del C:\Users\admin\AppData\Local\Temp\update12.exe >> NUL | C:\WINDOWS\SysWOW64\cmd.exe | — | update12.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.16299.15 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1640 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\WINDOWS\system32\conhost.exe | PowerShell.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.16299.15 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1660 | C:\WINDOWS\system32\net1 stop ammyy | C:\WINDOWS\SysWOW64\net1.exe | — | net.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Net Command Exit code: 2 Version: 10.0.16299.15 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1712 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\WINDOWS\system32\conhost.exe | cmd.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.16299.15 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1736 | "C:\Windows\System32\cmd.exe" /C sc delete foundation | C:\Windows\SysWOW64\cmd.exe | — | update12.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 1060 Version: 10.0.16299.15 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (1536) AcroRd32.exe | Key: | HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\ExitSection |
| Operation: | write | Name: | bLastExitNormal |
Value: 0 | |||
| (PID) Process: | (1536) AcroRd32.exe | Key: | HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\Collab\cDocumentCenter |
| Operation: | write | Name: | bAlwaysUseServer |
Value: 0 | |||
| (PID) Process: | (1536) AcroRd32.exe | Key: | HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\Collab\cDocumentCenter |
| Operation: | write | Name: | bAlwaysUseServerFD |
Value: 0 | |||
| (PID) Process: | (1536) AcroRd32.exe | Key: | HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\Collab\cDocumentCenter |
| Operation: | write | Name: | bDefault |
Value: 1 | |||
| (PID) Process: | (1536) AcroRd32.exe | Key: | HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\Collab\cDocumentCenter |
| Operation: | write | Name: | bDefaultFD |
Value: 1 | |||
| (PID) Process: | (1536) AcroRd32.exe | Key: | HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\Collab\cDocumentCenter |
| Operation: | write | Name: | tDistMethod |
Value: UPLOAD | |||
| (PID) Process: | (1536) AcroRd32.exe | Key: | HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\Collab\cDocumentCenter\cSettings |
| Operation: | write | Name: | tcSetting |
Value: https://api.share.acrobat.com | |||
| (PID) Process: | (1536) AcroRd32.exe | Key: | HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\Collab\cDocumentCenter |
| Operation: | write | Name: | tUI |
Value: Adobe online services (Recommended) | |||
| (PID) Process: | (1536) AcroRd32.exe | Key: | HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\Collab\cDocumentCenter |
| Operation: | write | Name: | tURL |
Value: urn://ns.adobe.com/Collaboration/SharedReview/Acrobat.com | |||
| (PID) Process: | (1536) AcroRd32.exe | Key: | HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\Collab\cEmailDistribution |
| Operation: | write | Name: | bAlwaysUseServerFD |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 4296 | PowerShell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\S51UATOCL9JAUAJ5RCI2.temp | — | |
MD5:— | SHA256:— | |||
| 3820 | RdrCEF.exe | C:\Users\admin\AppData\Local\Temp\scoped_dir3820_16652\index | — | |
MD5:— | SHA256:— | |||
| 3820 | RdrCEF.exe | C:\Users\admin\AppData\Local\Temp\scoped_dir3820_16652\data_0 | — | |
MD5:— | SHA256:— | |||
| 3820 | RdrCEF.exe | C:\Users\admin\AppData\Local\Temp\scoped_dir3820_16652\data_1 | — | |
MD5:— | SHA256:— | |||
| 3820 | RdrCEF.exe | C:\Users\admin\AppData\Local\Temp\scoped_dir3820_16652\data_2 | — | |
MD5:— | SHA256:— | |||
| 3820 | RdrCEF.exe | C:\Users\admin\AppData\Local\Temp\scoped_dir3820_16652\data_3 | — | |
MD5:— | SHA256:— | |||
| 1536 | AcroRd32.exe | C:\Users\admin\AppData\Local\Adobe\Acrobat\DC\Cache\AdobeFnt16.lst.1536 | — | |
MD5:— | SHA256:— | |||
| 1536 | AcroRd32.exe | C:\Users\admin\AppData\Local\Adobe\Acrobat\DC\AdobeFnt16.lst.1536 | — | |
MD5:— | SHA256:— | |||
| 1536 | AcroRd32.exe | C:\Users\admin\AppData\Roaming\Adobe\LogTransport2\Logs\ulog_Acrobat12_Reader_c78b53af-8cee-4fe8-99df-aa0d3770c508_28c5e1ea-0923-44e0-bf5d-4a8f76cd2d9e_0.tmp | — | |
MD5:— | SHA256:— | |||
| 1536 | AcroRd32.exe | C:\Users\admin\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents-journal | — | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2280 | svchost.exe | GET | 304 | 104.89.34.252:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.2.crl | NL | — | — | whitelisted |
4468 | svchost.exe | GET | 200 | 93.184.220.29:80 | http://crl3.digicert.com/Omniroot2025.crl | US | der | 4.39 Kb | whitelisted |
4296 | PowerShell.exe | GET | 200 | 169.239.129.117:80 | http://169.239.129.117/cal | ZA | executable | 161 Kb | malicious |
3172 | update12.exe | GET | 200 | 169.239.129.117:80 | http://169.239.129.117/Yjdfel765Hs | ZA | binary | 653 Kb | malicious |
2188 | LogTransport2.exe | GET | 200 | 93.184.220.29:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAH9o%2BtuynXIiEOLckvPvJE%3D | US | der | 471 b | shared |
2188 | LogTransport2.exe | GET | 200 | 93.184.220.29:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQQX6Z6gAidtSefNc6DC0OInqPHDQQUD4BhHIIxYdUvKOeNRji0LOHG2eICEAnlg2ak5WARTP8yGdCgT20%3D | US | der | 471 b | shared |
2280 | svchost.exe | GET | 200 | 93.184.220.29:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEAi4elAbvpzaLRZNPjlRv1U%3D | US | der | 471 b | shared |
2280 | svchost.exe | GET | 200 | 104.89.34.252:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Secure%20Server%20CA%202.1.crl | NL | der | 820 b | whitelisted |
2280 | svchost.exe | GET | 200 | 95.101.72.27:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/pinrulesstl.cab?74a0ca68aa72da10 | unknown | compressed | 7.61 Kb | whitelisted |
2280 | svchost.exe | GET | 304 | 104.89.34.252:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.1.crl | NL | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4296 | PowerShell.exe | 169.239.129.117:80 | — | Zappie Host LLC | ZA | malicious |
2188 | LogTransport2.exe | 93.184.220.29:80 | crl3.digicert.com | MCI Communications Services, Inc. d/b/a Verizon Business | US | whitelisted |
— | — | 131.253.61.80:443 | — | Microsoft Corporation | US | whitelisted |
3820 | RdrCEF.exe | 54.173.27.0:443 | cloud.acrobat.com | Amazon.com, Inc. | US | unknown |
3172 | update12.exe | 169.239.129.117:80 | — | Zappie Host LLC | ZA | malicious |
2280 | svchost.exe | 104.89.34.252:80 | www.microsoft.com | Akamai Technologies, Inc. | NL | whitelisted |
2280 | svchost.exe | 93.184.220.29:80 | crl3.digicert.com | MCI Communications Services, Inc. d/b/a Verizon Business | US | whitelisted |
408 | wsus.exe | 185.99.132.119:443 | — | Zappie Host LLC | NZ | malicious |
2188 | LogTransport2.exe | 192.147.130.244:443 | hl2rcv.adobe.com | Adobe Systems Inc. | US | whitelisted |
2280 | svchost.exe | 95.101.72.27:80 | ctldl.windowsupdate.com | Akamai International B.V. | — | whitelisted |
Domain | IP | Reputation |
|---|---|---|
crl3.digicert.com |
| whitelisted |
cloud.acrobat.com |
| whitelisted |
hl2rcv.adobe.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
ctldl.windowsupdate.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
4296 | PowerShell.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
4296 | PowerShell.exe | Potentially Bad Traffic | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |
4296 | PowerShell.exe | Potentially Bad Traffic | ET INFO SUSPICIOUS Dotted Quad Host MZ Response |
4296 | PowerShell.exe | Misc activity | ET INFO EXE IsDebuggerPresent (Used in Malware Anti-Debugging) |
408 | wsus.exe | Misc activity | [PT SANDBOX] AMMYY RAT pkt checker #1 |
408 | wsus.exe | A Network Trojan was detected | ET TROJAN Win32/FlawedAmmyy RAT CnC Checkin |
408 | wsus.exe | A Network Trojan was detected | [PT MALWARE] AMMYY.RAT Checkin |
Process | Message |
|---|---|
conhost.exe | InitSideBySide failed create an activation context. Error: 1814 |
conhost.exe | InitSideBySide failed create an activation context. Error: 1814 |
conhost.exe | InitSideBySide failed create an activation context. Error: 1814 |
conhost.exe | InitSideBySide failed create an activation context. Error: 1814 |
conhost.exe | InitSideBySide failed create an activation context. Error: 1814 |
conhost.exe | InitSideBySide failed create an activation context. Error: 1814 |
conhost.exe | InitSideBySide failed create an activation context. Error: 1814 |