Analysis
-
max time kernel
135s -
max time network
26s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
13-07-2020 11:44
Static task
static1
Behavioral task
behavioral1
Sample
DUE INVOICES.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
DUE INVOICES.exe
Resource
win10
General
-
Target
DUE INVOICES.exe
-
Size
324KB
-
MD5
1934f647b22d1dea5dfad28bf803c8af
-
SHA1
a2236e2a36ef71bb1c51023b548cd6543c418a2a
-
SHA256
65770e2bf03154fac4f5739f8a09255879ad6b0077d42c897f96f6f1bf678073
-
SHA512
ccfe41206551502a344c07a74309edf39df4881b99dd67aa73df830021ae3eb3b041613168a1c51f5f0f2e6a03866ca6bf24368eb77a47513ea283e430d814c4
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1428 wrote to memory of 1828 1428 DUE INVOICES.exe 26 PID 1428 wrote to memory of 1828 1428 DUE INVOICES.exe 26 PID 1428 wrote to memory of 1828 1428 DUE INVOICES.exe 26 PID 1428 wrote to memory of 1828 1428 DUE INVOICES.exe 26 PID 1428 wrote to memory of 1796 1428 DUE INVOICES.exe 28 PID 1428 wrote to memory of 1796 1428 DUE INVOICES.exe 28 PID 1428 wrote to memory of 1796 1428 DUE INVOICES.exe 28 PID 1428 wrote to memory of 1796 1428 DUE INVOICES.exe 28 PID 1428 wrote to memory of 1796 1428 DUE INVOICES.exe 28 PID 1428 wrote to memory of 1796 1428 DUE INVOICES.exe 28 PID 1428 wrote to memory of 1796 1428 DUE INVOICES.exe 28 PID 1428 wrote to memory of 1796 1428 DUE INVOICES.exe 28 PID 1428 wrote to memory of 1796 1428 DUE INVOICES.exe 28 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1428 set thread context of 1796 1428 DUE INVOICES.exe 28 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1796 DUE INVOICES.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1796 DUE INVOICES.exe 1796 DUE INVOICES.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1828 schtasks.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
Processes
-
C:\Users\Admin\AppData\Local\Temp\DUE INVOICES.exe"C:\Users\Admin\AppData\Local\Temp\DUE INVOICES.exe"1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
PID:1428 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\NjsGYn" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5C13.tmp"2⤵
- Creates scheduled task(s)
PID:1828
-
-
C:\Users\Admin\AppData\Local\Temp\DUE INVOICES.exe"{path}"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:1796
-