Analysis
-
max time kernel
149s -
max time network
124s -
platform
windows7_x64 -
resource
win7 -
submitted
07/07/2020, 09:19
Static task
static1
Behavioral task
behavioral1
Sample
OFFICIAL PAYMENT MODE DURING COVID-19 PANDEMIC-2020.com.exe
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
OFFICIAL PAYMENT MODE DURING COVID-19 PANDEMIC-2020.com.exe
Resource
win10v200430
0 signatures
0 seconds
General
-
Target
OFFICIAL PAYMENT MODE DURING COVID-19 PANDEMIC-2020.com.exe
-
Size
480KB
-
MD5
5ac4e04aca5a3bfaf13c7c5d429cc017
-
SHA1
3648fdde6cb192dcabde3cb7f17f58bf454ec0e1
-
SHA256
516af190e411859eafe3334997490013f00b0a6199ef034a584df640a3993440
-
SHA512
961dd27cc6e665c67be0fc0efddb1b0912890a6b13b22d342a8cad5332923013c889cf056a4faaef50a0c77ef7770393907c3493aa145e9ab0aeb2323bfdc38f
Malware Config
Signatures
-
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 1228 Explorer.EXE 1228 Explorer.EXE 1228 Explorer.EXE 1228 Explorer.EXE 1228 Explorer.EXE -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1496 wrote to memory of 112 1496 OFFICIAL PAYMENT MODE DURING COVID-19 PANDEMIC-2020.com.exe 24 PID 1496 wrote to memory of 112 1496 OFFICIAL PAYMENT MODE DURING COVID-19 PANDEMIC-2020.com.exe 24 PID 1496 wrote to memory of 112 1496 OFFICIAL PAYMENT MODE DURING COVID-19 PANDEMIC-2020.com.exe 24 PID 1496 wrote to memory of 112 1496 OFFICIAL PAYMENT MODE DURING COVID-19 PANDEMIC-2020.com.exe 24 PID 1496 wrote to memory of 1032 1496 OFFICIAL PAYMENT MODE DURING COVID-19 PANDEMIC-2020.com.exe 26 PID 1496 wrote to memory of 1032 1496 OFFICIAL PAYMENT MODE DURING COVID-19 PANDEMIC-2020.com.exe 26 PID 1496 wrote to memory of 1032 1496 OFFICIAL PAYMENT MODE DURING COVID-19 PANDEMIC-2020.com.exe 26 PID 1496 wrote to memory of 1032 1496 OFFICIAL PAYMENT MODE DURING COVID-19 PANDEMIC-2020.com.exe 26 PID 1496 wrote to memory of 1032 1496 OFFICIAL PAYMENT MODE DURING COVID-19 PANDEMIC-2020.com.exe 26 PID 1496 wrote to memory of 1032 1496 OFFICIAL PAYMENT MODE DURING COVID-19 PANDEMIC-2020.com.exe 26 PID 1496 wrote to memory of 1032 1496 OFFICIAL PAYMENT MODE DURING COVID-19 PANDEMIC-2020.com.exe 26 PID 1228 wrote to memory of 1500 1228 Explorer.EXE 27 PID 1228 wrote to memory of 1500 1228 Explorer.EXE 27 PID 1228 wrote to memory of 1500 1228 Explorer.EXE 27 PID 1228 wrote to memory of 1500 1228 Explorer.EXE 27 PID 1228 wrote to memory of 1500 1228 Explorer.EXE 27 PID 1228 wrote to memory of 1500 1228 Explorer.EXE 27 PID 1228 wrote to memory of 1500 1228 Explorer.EXE 27 PID 1500 wrote to memory of 1296 1500 msiexec.exe 28 PID 1500 wrote to memory of 1296 1500 msiexec.exe 28 PID 1500 wrote to memory of 1296 1500 msiexec.exe 28 PID 1500 wrote to memory of 1296 1500 msiexec.exe 28 -
Deletes itself 1 IoCs
pid Process 1296 cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1032 OFFICIAL PAYMENT MODE DURING COVID-19 PANDEMIC-2020.com.exe Token: SeDebugPrivilege 1500 msiexec.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 1032 OFFICIAL PAYMENT MODE DURING COVID-19 PANDEMIC-2020.com.exe 1032 OFFICIAL PAYMENT MODE DURING COVID-19 PANDEMIC-2020.com.exe 1032 OFFICIAL PAYMENT MODE DURING COVID-19 PANDEMIC-2020.com.exe 1032 OFFICIAL PAYMENT MODE DURING COVID-19 PANDEMIC-2020.com.exe 1500 msiexec.exe 1500 msiexec.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1228 Explorer.EXE 1228 Explorer.EXE 1228 Explorer.EXE 1228 Explorer.EXE -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 112 schtasks.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Explorer.EXE -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1496 set thread context of 1032 1496 OFFICIAL PAYMENT MODE DURING COVID-19 PANDEMIC-2020.com.exe 26 PID 1032 set thread context of 1228 1032 OFFICIAL PAYMENT MODE DURING COVID-19 PANDEMIC-2020.com.exe 20 PID 1032 set thread context of 1228 1032 OFFICIAL PAYMENT MODE DURING COVID-19 PANDEMIC-2020.com.exe 20 PID 1500 set thread context of 1228 1500 msiexec.exe 20 -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 1032 OFFICIAL PAYMENT MODE DURING COVID-19 PANDEMIC-2020.com.exe 1032 OFFICIAL PAYMENT MODE DURING COVID-19 PANDEMIC-2020.com.exe 1032 OFFICIAL PAYMENT MODE DURING COVID-19 PANDEMIC-2020.com.exe 1500 msiexec.exe 1500 msiexec.exe 1500 msiexec.exe 1500 msiexec.exe 1500 msiexec.exe 1500 msiexec.exe 1500 msiexec.exe 1500 msiexec.exe 1500 msiexec.exe 1500 msiexec.exe 1500 msiexec.exe 1500 msiexec.exe 1500 msiexec.exe 1500 msiexec.exe 1500 msiexec.exe 1500 msiexec.exe 1500 msiexec.exe 1500 msiexec.exe 1500 msiexec.exe 1500 msiexec.exe 1500 msiexec.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
- Suspicious use of SendNotifyMessage
- Checks whether UAC is enabled
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\OFFICIAL PAYMENT MODE DURING COVID-19 PANDEMIC-2020.com.exe"C:\Users\Admin\AppData\Local\Temp\OFFICIAL PAYMENT MODE DURING COVID-19 PANDEMIC-2020.com.exe"2⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
PID:1496 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cwylpghoIDGGCx" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8822.tmp"3⤵
- Creates scheduled task(s)
PID:112
-
-
C:\Users\Admin\AppData\Local\Temp\OFFICIAL PAYMENT MODE DURING COVID-19 PANDEMIC-2020.com.exe"{path}"3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1032
-
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1500 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\OFFICIAL PAYMENT MODE DURING COVID-19 PANDEMIC-2020.com.exe"3⤵
- Deletes itself
PID:1296
-
-