Analysis
-
max time kernel
116s -
max time network
120s -
platform
windows10_x64 -
resource
win10 -
submitted
13-07-2020 11:44
Static task
static1
Behavioral task
behavioral1
Sample
DUE INVOICES.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
DUE INVOICES.exe
Resource
win10
General
-
Target
DUE INVOICES.exe
-
Size
324KB
-
MD5
1934f647b22d1dea5dfad28bf803c8af
-
SHA1
a2236e2a36ef71bb1c51023b548cd6543c418a2a
-
SHA256
65770e2bf03154fac4f5739f8a09255879ad6b0077d42c897f96f6f1bf678073
-
SHA512
ccfe41206551502a344c07a74309edf39df4881b99dd67aa73df830021ae3eb3b041613168a1c51f5f0f2e6a03866ca6bf24368eb77a47513ea283e430d814c4
Malware Config
Extracted
Protocol: smtp- Host:
smtp.yandex.ru - Port:
587 - Username:
[email protected] - Password:
bigboy5570@@@@
Signatures
-
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3412 wrote to memory of 3000 3412 DUE INVOICES.exe 68 PID 3412 wrote to memory of 3000 3412 DUE INVOICES.exe 68 PID 3412 wrote to memory of 3000 3412 DUE INVOICES.exe 68 PID 3412 wrote to memory of 2652 3412 DUE INVOICES.exe 70 PID 3412 wrote to memory of 2652 3412 DUE INVOICES.exe 70 PID 3412 wrote to memory of 2652 3412 DUE INVOICES.exe 70 PID 3412 wrote to memory of 2652 3412 DUE INVOICES.exe 70 PID 3412 wrote to memory of 2652 3412 DUE INVOICES.exe 70 PID 3412 wrote to memory of 2652 3412 DUE INVOICES.exe 70 PID 3412 wrote to memory of 2652 3412 DUE INVOICES.exe 70 PID 3412 wrote to memory of 2652 3412 DUE INVOICES.exe 70 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3412 set thread context of 2652 3412 DUE INVOICES.exe 70 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3412 DUE INVOICES.exe Token: SeDebugPrivilege 2652 DUE INVOICES.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3412 DUE INVOICES.exe 2652 DUE INVOICES.exe 2652 DUE INVOICES.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3000 schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\DUE INVOICES.exe"C:\Users\Admin\AppData\Local\Temp\DUE INVOICES.exe"1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:3412 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\NjsGYn" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8623.tmp"2⤵
- Creates scheduled task(s)
PID:3000
-
-
C:\Users\Admin\AppData\Local\Temp\DUE INVOICES.exe"{path}"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:2652
-
-
C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exeC:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe1⤵PID:3864