Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
10/07/2020, 17:48
Static task
static1
Behavioral task
behavioral1
Sample
Remittance advice.exe
Resource
win7v200430
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Remittance advice.exe
Resource
win10
0 signatures
0 seconds
General
-
Target
Remittance advice.exe
-
Size
832KB
-
MD5
6b72bf98756a106ce4ffb0d7ef1be954
-
SHA1
2153b926fbb23eac4af1235f3dc3ff867cbaf174
-
SHA256
ab12a111885480b3518449ff615d118b0ba908e4f3f0179c8da797c7c815cbfe
-
SHA512
34e79cbde4f94b779af05677e04e8276bb303d2270c545e43a7ab31a54ab5fa4bafb875fa51c9e24d2de714b4e156bdf062df502d3d86ed2c6e61a0efe7d5e13
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 1032 Remittance advice.exe 1052 Remittance advice.exe 1052 Remittance advice.exe 1492 help.exe 1492 help.exe 1492 help.exe 1492 help.exe 1492 help.exe 1492 help.exe 1492 help.exe 1492 help.exe 1492 help.exe 1492 help.exe 1492 help.exe 1492 help.exe 1492 help.exe 1492 help.exe 1492 help.exe 1492 help.exe 1492 help.exe 1492 help.exe 1492 help.exe 1492 help.exe 1492 help.exe 1492 help.exe 1492 help.exe 1492 help.exe 1492 help.exe 1492 help.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Nsdv\gdirfgx.exe help.exe -
System policy modification 1 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer help.exe -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 1032 Remittance advice.exe 1052 Remittance advice.exe 1052 Remittance advice.exe 1052 Remittance advice.exe 1492 help.exe 1492 help.exe 1492 help.exe 1492 help.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 1320 Explorer.EXE 1320 Explorer.EXE 1320 Explorer.EXE 1320 Explorer.EXE 1320 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1320 Explorer.EXE 1320 Explorer.EXE 1320 Explorer.EXE 1320 Explorer.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Explorer.EXE -
description ioc Process Key created \Registry\User\S-1-5-21-910373003-3952921535-3480519689-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 help.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 1032 wrote to memory of 732 1032 Remittance advice.exe 24 PID 1032 wrote to memory of 732 1032 Remittance advice.exe 24 PID 1032 wrote to memory of 732 1032 Remittance advice.exe 24 PID 1032 wrote to memory of 732 1032 Remittance advice.exe 24 PID 1032 wrote to memory of 732 1032 Remittance advice.exe 24 PID 1032 wrote to memory of 732 1032 Remittance advice.exe 24 PID 1032 wrote to memory of 1052 1032 Remittance advice.exe 25 PID 1032 wrote to memory of 1052 1032 Remittance advice.exe 25 PID 1032 wrote to memory of 1052 1032 Remittance advice.exe 25 PID 1032 wrote to memory of 1052 1032 Remittance advice.exe 25 PID 1320 wrote to memory of 1492 1320 Explorer.EXE 26 PID 1320 wrote to memory of 1492 1320 Explorer.EXE 26 PID 1320 wrote to memory of 1492 1320 Explorer.EXE 26 PID 1320 wrote to memory of 1492 1320 Explorer.EXE 26 PID 1492 wrote to memory of 1348 1492 help.exe 27 PID 1492 wrote to memory of 1348 1492 help.exe 27 PID 1492 wrote to memory of 1348 1492 help.exe 27 PID 1492 wrote to memory of 1348 1492 help.exe 27 PID 1492 wrote to memory of 560 1492 help.exe 32 PID 1492 wrote to memory of 560 1492 help.exe 32 PID 1492 wrote to memory of 560 1492 help.exe 32 PID 1492 wrote to memory of 560 1492 help.exe 32 PID 1492 wrote to memory of 560 1492 help.exe 32 -
Deletes itself 1 IoCs
pid Process 1348 cmd.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Remittance advice.vbs notepad.exe -
Adds Run entry to policy start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run help.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\HTODEFSHWLH0 = "C:\\Program Files (x86)\\Nsdv\\gdirfgx.exe" help.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1032 set thread context of 1052 1032 Remittance advice.exe 25 PID 1052 set thread context of 1320 1052 Remittance advice.exe 20 PID 1492 set thread context of 1320 1492 help.exe 20 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1052 Remittance advice.exe Token: SeDebugPrivilege 1492 help.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Checks whether UAC is enabled
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\Remittance advice.exe"C:\Users\Admin\AppData\Local\Temp\Remittance advice.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
PID:1032 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"3⤵
- Drops startup file
PID:732
-
-
C:\Users\Admin\AppData\Local\Temp\Remittance advice.exe"C:\Users\Admin\AppData\Local\Temp\Remittance advice.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1052
-
-
-
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Drops file in Program Files directory
- System policy modification
- Suspicious behavior: MapViewOfSection
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
- Adds Run entry to policy start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1492 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Remittance advice.exe"3⤵
- Deletes itself
PID:1348
-
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:560
-
-