Analysis
-
max time kernel
146s -
max time network
118s -
platform
windows7_x64 -
resource
win7 -
submitted
10-07-2020 07:04
Static task
static1
Behavioral task
behavioral1
Sample
invoice.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
invoice.exe
Resource
win10v200430
windows10_x64
0 signatures
0 seconds
General
-
Target
invoice.exe
-
Size
339KB
-
MD5
8f76d465d04393a7e53d7ac84bc7a73f
-
SHA1
d904130c434417ea57d2d4198743231aad25118c
-
SHA256
fa355139bfaa9fcf4324154194f2cb280899be4863fd278c7b06440d84a14d39
-
SHA512
1b3946e09684f0c6b7980546776164bc785e0e6e443e554360dc2f81fa38186a5a4487de928ffd8d1d12175d3b742c69501d73972b8c61c08d442267b8c3e4e9
Malware Config
Signatures
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1124 set thread context of 1436 1124 invoice.exe 24 PID 1436 set thread context of 1312 1436 invoice.exe 20 PID 1436 set thread context of 1312 1436 invoice.exe 20 PID 292 set thread context of 1312 292 raserver.exe 20 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1436 invoice.exe Token: SeDebugPrivilege 292 raserver.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1124 wrote to memory of 1436 1124 invoice.exe 24 PID 1124 wrote to memory of 1436 1124 invoice.exe 24 PID 1124 wrote to memory of 1436 1124 invoice.exe 24 PID 1124 wrote to memory of 1436 1124 invoice.exe 24 PID 1124 wrote to memory of 1436 1124 invoice.exe 24 PID 1124 wrote to memory of 1436 1124 invoice.exe 24 PID 1124 wrote to memory of 1436 1124 invoice.exe 24 PID 1436 wrote to memory of 292 1436 invoice.exe 25 PID 1436 wrote to memory of 292 1436 invoice.exe 25 PID 1436 wrote to memory of 292 1436 invoice.exe 25 PID 1436 wrote to memory of 292 1436 invoice.exe 25 PID 292 wrote to memory of 672 292 raserver.exe 26 PID 292 wrote to memory of 672 292 raserver.exe 26 PID 292 wrote to memory of 672 292 raserver.exe 26 PID 292 wrote to memory of 672 292 raserver.exe 26 -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 1436 invoice.exe 1436 invoice.exe 1436 invoice.exe 1436 invoice.exe 292 raserver.exe 292 raserver.exe -
Deletes itself 1 IoCs
pid Process 672 cmd.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 1312 Explorer.EXE 1312 Explorer.EXE 1312 Explorer.EXE 1312 Explorer.EXE 1312 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1312 Explorer.EXE 1312 Explorer.EXE 1312 Explorer.EXE 1312 Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 1436 invoice.exe 1436 invoice.exe 1436 invoice.exe 292 raserver.exe 292 raserver.exe 292 raserver.exe 292 raserver.exe 292 raserver.exe 292 raserver.exe 292 raserver.exe 292 raserver.exe 292 raserver.exe 292 raserver.exe 292 raserver.exe 292 raserver.exe 292 raserver.exe 292 raserver.exe 292 raserver.exe 292 raserver.exe 292 raserver.exe 292 raserver.exe 292 raserver.exe 292 raserver.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Checks whether UAC is enabled
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\invoice.exe"C:\Users\Admin\AppData\Local\Temp\invoice.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Users\Admin\AppData\Local\Temp\invoice.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- Suspicious behavior: MapViewOfSection
- Suspicious behavior: EnumeratesProcesses
PID:1436 -
C:\Windows\SysWOW64\raserver.exe"C:\Windows\SysWOW64\raserver.exe"4⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- Suspicious behavior: MapViewOfSection
- Suspicious behavior: EnumeratesProcesses
PID:292 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\invoice.exe"5⤵
- Deletes itself
PID:672
-
-
-
-