Analysis
-
max time kernel
12s -
max time network
141s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
18-01-2021 09:04
Static task
static1
Behavioral task
behavioral1
Sample
09000090INVOICE.exe
Resource
win7v20201028
General
-
Target
09000090INVOICE.exe
-
Size
210KB
-
MD5
f4d2193e00008bd236c7658fc0cff060
-
SHA1
f6b7a99d48415ebb3ab6a178e211234e11040629
-
SHA256
9d692165cbb8d2a181769b723e7300b02f534fec4563d4bd155b4c293d6ebe72
-
SHA512
3383c50ca92c0eaabd487444057783e32da41fac60a5361dbf755e610ab86b48367d3cce338ebb17abf53d03154fe609d4b15eb9a02b999a5e249d4dcab7c88c
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
09000090INVOICE.exedescription pid process target process PID 776 set thread context of 2020 776 09000090INVOICE.exe 09000090INVOICE.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
09000090INVOICE.exepid process 776 09000090INVOICE.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
09000090INVOICE.exepid process 2020 09000090INVOICE.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
09000090INVOICE.exepid process 2020 09000090INVOICE.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
09000090INVOICE.exepid process 2020 09000090INVOICE.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
09000090INVOICE.execmd.exedescription pid process target process PID 776 wrote to memory of 2004 776 09000090INVOICE.exe cmd.exe PID 776 wrote to memory of 2004 776 09000090INVOICE.exe cmd.exe PID 776 wrote to memory of 2004 776 09000090INVOICE.exe cmd.exe PID 776 wrote to memory of 2004 776 09000090INVOICE.exe cmd.exe PID 776 wrote to memory of 2020 776 09000090INVOICE.exe 09000090INVOICE.exe PID 776 wrote to memory of 2020 776 09000090INVOICE.exe 09000090INVOICE.exe PID 776 wrote to memory of 2020 776 09000090INVOICE.exe 09000090INVOICE.exe PID 776 wrote to memory of 2020 776 09000090INVOICE.exe 09000090INVOICE.exe PID 776 wrote to memory of 2020 776 09000090INVOICE.exe 09000090INVOICE.exe PID 2004 wrote to memory of 1976 2004 cmd.exe schtasks.exe PID 2004 wrote to memory of 1976 2004 cmd.exe schtasks.exe PID 2004 wrote to memory of 1976 2004 cmd.exe schtasks.exe PID 2004 wrote to memory of 1976 2004 cmd.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\09000090INVOICE.exe"C:\Users\Admin\AppData\Local\Temp\09000090INVOICE.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /Create /TN name /XML "C:\Users\Admin\AppData\Local\Temp\b4c1fd50750347b0a2612422daa06852.xml"2⤵
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /TN name /XML "C:\Users\Admin\AppData\Local\Temp\b4c1fd50750347b0a2612422daa06852.xml"3⤵
- Creates scheduled task(s)
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\09000090INVOICE.exe"C:\Users\Admin\AppData\Local\Temp\09000090INVOICE.exe"2⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2020
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
a035055e1c80bc652520df45650c690f
SHA137b8364ad46e17199eb5a7ee89bb506bba384adb
SHA2562b9948d34674d0fc0f9cb290da8298441b56205f6e341e3cfa1954df42c2b655
SHA512678279d1bfc8a71c27a5a2c3afa5fd266882a62610863a3e4ebc2489f17827ed4c680c89e6b8b52621320500294d2df9888259ccdc5d38def43e739c1f325fc1