Analysis
-
max time kernel
148s -
max time network
138s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
15-07-2020 13:44
Static task
static1
Behavioral task
behavioral1
Sample
MT103 PAYMENT COPY_PDF.exe
Resource
win7v200430
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
MT103 PAYMENT COPY_PDF.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
MT103 PAYMENT COPY_PDF.exe
-
Size
369KB
-
MD5
20a2543a7a37a75b93924dd83c03743d
-
SHA1
dacf53a9ae5c29a1d33fb2bf064ede984a0ad379
-
SHA256
8c55df1fdc1ac49e2c0a3b5b77bd044d842d2f6e38bd5f782d93853a560140fb
-
SHA512
3c49d4b09b5510e9a2ea24e75c9bf694a006cd31b9d06546aa08ac369cb8464916c40c7d0db566ef82d4b147e265582f5d081c26f3b6ad9e99f6c792c9be0d10
Score
8/10
Malware Config
Signatures
-
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 1832 MT103 PAYMENT COPY_PDF.exe 1832 MT103 PAYMENT COPY_PDF.exe 1832 MT103 PAYMENT COPY_PDF.exe 1852 svchost.exe 1852 svchost.exe 1852 svchost.exe 1852 svchost.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Zcx58f\systraymbi050.exe svchost.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1008 wrote to memory of 1832 1008 MT103 PAYMENT COPY_PDF.exe 26 PID 1008 wrote to memory of 1832 1008 MT103 PAYMENT COPY_PDF.exe 26 PID 1008 wrote to memory of 1832 1008 MT103 PAYMENT COPY_PDF.exe 26 PID 1008 wrote to memory of 1832 1008 MT103 PAYMENT COPY_PDF.exe 26 PID 1008 wrote to memory of 1832 1008 MT103 PAYMENT COPY_PDF.exe 26 PID 1008 wrote to memory of 1832 1008 MT103 PAYMENT COPY_PDF.exe 26 PID 1008 wrote to memory of 1832 1008 MT103 PAYMENT COPY_PDF.exe 26 PID 1320 wrote to memory of 1852 1320 Explorer.EXE 27 PID 1320 wrote to memory of 1852 1320 Explorer.EXE 27 PID 1320 wrote to memory of 1852 1320 Explorer.EXE 27 PID 1320 wrote to memory of 1852 1320 Explorer.EXE 27 PID 1852 wrote to memory of 1880 1852 svchost.exe 28 PID 1852 wrote to memory of 1880 1852 svchost.exe 28 PID 1852 wrote to memory of 1880 1852 svchost.exe 28 PID 1852 wrote to memory of 1880 1852 svchost.exe 28 PID 1852 wrote to memory of 1624 1852 svchost.exe 33 PID 1852 wrote to memory of 1624 1852 svchost.exe 33 PID 1852 wrote to memory of 1624 1852 svchost.exe 33 PID 1852 wrote to memory of 1624 1852 svchost.exe 33 PID 1852 wrote to memory of 1624 1852 svchost.exe 33 -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1008 set thread context of 1832 1008 MT103 PAYMENT COPY_PDF.exe 26 PID 1832 set thread context of 1320 1832 MT103 PAYMENT COPY_PDF.exe 20 PID 1852 set thread context of 1320 1852 svchost.exe 20 -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\J8TP9VR8BFE = "C:\\Program Files (x86)\\Zcx58f\\systraymbi050.exe" svchost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1008 MT103 PAYMENT COPY_PDF.exe Token: SeDebugPrivilege 1832 MT103 PAYMENT COPY_PDF.exe Token: SeDebugPrivilege 1852 svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 1008 MT103 PAYMENT COPY_PDF.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1320 Explorer.EXE 1320 Explorer.EXE 1320 Explorer.EXE 1320 Explorer.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \Registry\User\S-1-5-21-910373003-3952921535-3480519689-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 svchost.exe -
Suspicious behavior: EnumeratesProcesses 45 IoCs
pid Process 1008 MT103 PAYMENT COPY_PDF.exe 1008 MT103 PAYMENT COPY_PDF.exe 1008 MT103 PAYMENT COPY_PDF.exe 1008 MT103 PAYMENT COPY_PDF.exe 1008 MT103 PAYMENT COPY_PDF.exe 1008 MT103 PAYMENT COPY_PDF.exe 1008 MT103 PAYMENT COPY_PDF.exe 1008 MT103 PAYMENT COPY_PDF.exe 1008 MT103 PAYMENT COPY_PDF.exe 1008 MT103 PAYMENT COPY_PDF.exe 1008 MT103 PAYMENT COPY_PDF.exe 1008 MT103 PAYMENT COPY_PDF.exe 1008 MT103 PAYMENT COPY_PDF.exe 1008 MT103 PAYMENT COPY_PDF.exe 1008 MT103 PAYMENT COPY_PDF.exe 1008 MT103 PAYMENT COPY_PDF.exe 1008 MT103 PAYMENT COPY_PDF.exe 1008 MT103 PAYMENT COPY_PDF.exe 1008 MT103 PAYMENT COPY_PDF.exe 1008 MT103 PAYMENT COPY_PDF.exe 1008 MT103 PAYMENT COPY_PDF.exe 1008 MT103 PAYMENT COPY_PDF.exe 1008 MT103 PAYMENT COPY_PDF.exe 1832 MT103 PAYMENT COPY_PDF.exe 1832 MT103 PAYMENT COPY_PDF.exe 1852 svchost.exe 1852 svchost.exe 1852 svchost.exe 1852 svchost.exe 1852 svchost.exe 1852 svchost.exe 1852 svchost.exe 1852 svchost.exe 1852 svchost.exe 1852 svchost.exe 1852 svchost.exe 1852 svchost.exe 1852 svchost.exe 1852 svchost.exe 1852 svchost.exe 1852 svchost.exe 1852 svchost.exe 1852 svchost.exe 1852 svchost.exe 1852 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 1832 MT103 PAYMENT COPY_PDF.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1320 Explorer.EXE 1320 Explorer.EXE 1320 Explorer.EXE 1320 Explorer.EXE -
System policy modification 1 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer svchost.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SendNotifyMessage
- Suspicious use of FindShellTrayWindow
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\MT103 PAYMENT COPY_PDF.exe"C:\Users\Admin\AppData\Local\Temp\MT103 PAYMENT COPY_PDF.exe"2⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1008 -
C:\Users\Admin\AppData\Local\Temp\MT103 PAYMENT COPY_PDF.exe"C:\Users\Admin\AppData\Local\Temp\MT103 PAYMENT COPY_PDF.exe"3⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Executes dropped EXE
PID:1832
-
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"2⤵
- Suspicious behavior: MapViewOfSection
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
- Adds policy Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- System policy modification
PID:1852 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\MT103 PAYMENT COPY_PDF.exe"3⤵PID:1880
-
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1624
-
-