Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10_x64 -
resource
win10 -
submitted
10/07/2020, 17:48
Static task
static1
Behavioral task
behavioral1
Sample
Remittance advice.exe
Resource
win7v200430
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Remittance advice.exe
Resource
win10
0 signatures
0 seconds
General
-
Target
Remittance advice.exe
-
Size
832KB
-
MD5
6b72bf98756a106ce4ffb0d7ef1be954
-
SHA1
2153b926fbb23eac4af1235f3dc3ff867cbaf174
-
SHA256
ab12a111885480b3518449ff615d118b0ba908e4f3f0179c8da797c7c815cbfe
-
SHA512
34e79cbde4f94b779af05677e04e8276bb303d2270c545e43a7ab31a54ab5fa4bafb875fa51c9e24d2de714b4e156bdf062df502d3d86ed2c6e61a0efe7d5e13
Score
10/10
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Remittance advice.vbs notepad.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Bztbxnxlx\llmqlr.exe raserver.exe -
Adds Run entry to start application 2 TTPs 2 IoCs
description ioc Process Key created \Registry\Machine\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run raserver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\XPXD4HTH = "C:\\Program Files (x86)\\Bztbxnxlx\\llmqlr.exe" raserver.exe -
Suspicious behavior: EnumeratesProcesses 56 IoCs
pid Process 3676 Remittance advice.exe 3676 Remittance advice.exe 3872 Remittance advice.exe 3872 Remittance advice.exe 3872 Remittance advice.exe 3872 Remittance advice.exe 3844 raserver.exe 3844 raserver.exe 3844 raserver.exe 3844 raserver.exe 3844 raserver.exe 3844 raserver.exe 3844 raserver.exe 3844 raserver.exe 3844 raserver.exe 3844 raserver.exe 3844 raserver.exe 3844 raserver.exe 3844 raserver.exe 3844 raserver.exe 3844 raserver.exe 3844 raserver.exe 3844 raserver.exe 3844 raserver.exe 3844 raserver.exe 3844 raserver.exe 3844 raserver.exe 3844 raserver.exe 3844 raserver.exe 3844 raserver.exe 3844 raserver.exe 3844 raserver.exe 3844 raserver.exe 3844 raserver.exe 3844 raserver.exe 3844 raserver.exe 3844 raserver.exe 3844 raserver.exe 3844 raserver.exe 3844 raserver.exe 3844 raserver.exe 3844 raserver.exe 3844 raserver.exe 3844 raserver.exe 3844 raserver.exe 3844 raserver.exe 3844 raserver.exe 3844 raserver.exe 3844 raserver.exe 3844 raserver.exe 3844 raserver.exe 3844 raserver.exe 3844 raserver.exe 3844 raserver.exe 3844 raserver.exe 3844 raserver.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 3676 wrote to memory of 3468 3676 Remittance advice.exe 67 PID 3676 wrote to memory of 3468 3676 Remittance advice.exe 67 PID 3676 wrote to memory of 3468 3676 Remittance advice.exe 67 PID 3676 wrote to memory of 3468 3676 Remittance advice.exe 67 PID 3676 wrote to memory of 3468 3676 Remittance advice.exe 67 PID 3676 wrote to memory of 3872 3676 Remittance advice.exe 68 PID 3676 wrote to memory of 3872 3676 Remittance advice.exe 68 PID 3676 wrote to memory of 3872 3676 Remittance advice.exe 68 PID 2968 wrote to memory of 3844 2968 Explorer.EXE 69 PID 2968 wrote to memory of 3844 2968 Explorer.EXE 69 PID 2968 wrote to memory of 3844 2968 Explorer.EXE 69 PID 3844 wrote to memory of 3924 3844 raserver.exe 70 PID 3844 wrote to memory of 3924 3844 raserver.exe 70 PID 3844 wrote to memory of 3924 3844 raserver.exe 70 PID 3844 wrote to memory of 364 3844 raserver.exe 78 PID 3844 wrote to memory of 364 3844 raserver.exe 78 PID 3844 wrote to memory of 364 3844 raserver.exe 78 PID 3844 wrote to memory of 1224 3844 raserver.exe 80 PID 3844 wrote to memory of 1224 3844 raserver.exe 80 PID 3844 wrote to memory of 1224 3844 raserver.exe 80 -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3676 set thread context of 3872 3676 Remittance advice.exe 68 PID 3872 set thread context of 2968 3872 Remittance advice.exe 56 PID 3844 set thread context of 2968 3844 raserver.exe 56 -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 3872 Remittance advice.exe Token: SeDebugPrivilege 3844 raserver.exe Token: SeShutdownPrivilege 2968 Explorer.EXE Token: SeCreatePagefilePrivilege 2968 Explorer.EXE Token: SeShutdownPrivilege 2968 Explorer.EXE Token: SeCreatePagefilePrivilege 2968 Explorer.EXE Token: SeShutdownPrivilege 2968 Explorer.EXE Token: SeCreatePagefilePrivilege 2968 Explorer.EXE Token: SeShutdownPrivilege 2968 Explorer.EXE Token: SeCreatePagefilePrivilege 2968 Explorer.EXE -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 3676 Remittance advice.exe 3872 Remittance advice.exe 3872 Remittance advice.exe 3872 Remittance advice.exe 3844 raserver.exe 3844 raserver.exe 3844 raserver.exe 3844 raserver.exe -
description ioc Process Key created \Registry\User\S-1-5-21-2066881839-3229799743-3576549721-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 raserver.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of AdjustPrivilegeToken
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\Remittance advice.exe"C:\Users\Admin\AppData\Local\Temp\Remittance advice.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:3676 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"3⤵
- Drops startup file
PID:3468
-
-
C:\Users\Admin\AppData\Local\Temp\Remittance advice.exe"C:\Users\Admin\AppData\Local\Temp\Remittance advice.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: MapViewOfSection
PID:3872
-
-
-
C:\Windows\SysWOW64\raserver.exe"C:\Windows\SysWOW64\raserver.exe"2⤵
- Drops file in Program Files directory
- Adds Run entry to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: MapViewOfSection
- Modifies Internet Explorer settings
PID:3844 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Remittance advice.exe"3⤵PID:3924
-
-
C:\Windows\SysWOW64\cmd.exe/c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V3⤵PID:364
-
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1224
-
-