Analysis
-
max time kernel
98s -
max time network
6s -
platform
windows7_x64 -
resource
win7 -
submitted
07-07-2020 08:52
Static task
static1
Behavioral task
behavioral1
Sample
Invoice.exe
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Invoice.exe
Resource
win10v200430
0 signatures
0 seconds
General
-
Target
Invoice.exe
-
Size
5.1MB
-
MD5
7f1e268e77797a3049136b2e8b67a997
-
SHA1
27c0a7cb6cf140d6ad7109cfb2c0f64af73f6e8c
-
SHA256
03a8582db8f34154ed1e18821d8d7e2df2148ce0c36b06ed7fb91f387e3f0aa6
-
SHA512
0ddd4c099c3bb57f2f836793fabe78e9679f56caa80105d1d04f90866f533d37437873379b598ce5d5e56bea849a5717de599b37175052ca389cfc80568ee8a3
Score
8/10
Malware Config
Signatures
-
Adds Run entry to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run\invoice = "C:\\Windows\\system32\\pcalua.exe -a C:\\Users\\Admin\\Desktop\\receipt.exe" reg.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1108 Invoice.exe Token: SeDebugPrivilege 1512 receipt.exe Token: SeDebugPrivilege 1848 RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1108 Invoice.exe 1108 Invoice.exe 1108 Invoice.exe 1512 receipt.exe 1512 receipt.exe 1512 receipt.exe 1848 RegAsm.exe 1848 RegAsm.exe -
Executes dropped EXE 2 IoCs
pid Process 1512 receipt.exe 1848 RegAsm.exe -
Loads dropped DLL 2 IoCs
pid Process 1512 receipt.exe 1848 RegAsm.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1848 RegAsm.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1108 wrote to memory of 1536 1108 Invoice.exe 24 PID 1108 wrote to memory of 1536 1108 Invoice.exe 24 PID 1108 wrote to memory of 1536 1108 Invoice.exe 24 PID 1108 wrote to memory of 1536 1108 Invoice.exe 24 PID 1536 wrote to memory of 364 1536 cmd.exe 26 PID 1536 wrote to memory of 364 1536 cmd.exe 26 PID 1536 wrote to memory of 364 1536 cmd.exe 26 PID 1536 wrote to memory of 364 1536 cmd.exe 26 PID 1108 wrote to memory of 1512 1108 Invoice.exe 28 PID 1108 wrote to memory of 1512 1108 Invoice.exe 28 PID 1108 wrote to memory of 1512 1108 Invoice.exe 28 PID 1108 wrote to memory of 1512 1108 Invoice.exe 28 PID 1512 wrote to memory of 1848 1512 receipt.exe 29 PID 1512 wrote to memory of 1848 1512 receipt.exe 29 PID 1512 wrote to memory of 1848 1512 receipt.exe 29 PID 1512 wrote to memory of 1848 1512 receipt.exe 29 PID 1512 wrote to memory of 1848 1512 receipt.exe 29 PID 1512 wrote to memory of 1848 1512 receipt.exe 29 PID 1512 wrote to memory of 1848 1512 receipt.exe 29 PID 1512 wrote to memory of 1848 1512 receipt.exe 29 PID 1512 wrote to memory of 1848 1512 receipt.exe 29 PID 1512 wrote to memory of 1848 1512 receipt.exe 29 PID 1512 wrote to memory of 1848 1512 receipt.exe 29 PID 1512 wrote to memory of 1848 1512 receipt.exe 29 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1512 set thread context of 1848 1512 receipt.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\Invoice.exe"C:\Users\Admin\AppData\Local\Temp\Invoice.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v invoice /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\Desktop\receipt.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v invoice /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\Desktop\receipt.exe"3⤵
- Adds Run entry to start application
PID:364
-
-
-
C:\Users\Admin\Desktop\receipt.exe"C:\Users\Admin\Desktop\receipt.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\RegAsm.exe"C:\Users\Admin\AppData\Local\Temp\RegAsm.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1848
-
-