Overview
overview
10Static
static
23-07-2021...df.exe
windows7_x64
323-07-2021...df.exe
windows10_x64
323-07-2021...r .exe
windows7_x64
1023-07-2021...r .exe
windows10_x64
10New order ...df.exe
windows7_x64
10New order ...df.exe
windows10_x64
1023-07-2021...at.exe
windows7_x64
1023-07-2021...at.exe
windows10_x64
1023-07-2021...2).exe
windows7_x64
1023-07-2021...2).exe
windows10_x64
10Payment copy.pdf.exe
windows7_x64
1Payment copy.pdf.exe
windows10_x64
1023-07-2021...TA.exe
windows7_x64
1023-07-2021...TA.exe
windows10_x64
1023-07-2021...PY.exe
windows7_x64
1023-07-2021...PY.exe
windows10_x64
1023-07-2021...at.exe
windows7_x64
1023-07-2021...at.exe
windows10_x64
10payment re...df.exe
windows7_x64
10payment re...df.exe
windows10_x64
10Analysis
-
max time kernel
49s -
max time network
26s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
25-07-2021 23:28
Static task
static1
Behavioral task
behavioral1
Sample
23-07-2021/????????-pdf.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
23-07-2021/????????-pdf.exe
Resource
win10v20210408
Behavioral task
behavioral3
Sample
23-07-2021/New Order .exe
Resource
win7v20210410
Behavioral task
behavioral4
Sample
23-07-2021/New Order .exe
Resource
win10v20210408
Behavioral task
behavioral5
Sample
New order 11244332.pdf.exe
Resource
win7v20210410
Behavioral task
behavioral6
Sample
New order 11244332.pdf.exe
Resource
win10v20210408
Behavioral task
behavioral7
Sample
23-07-2021/ORIGINAL DOCUMENTS.bat.exe
Resource
win7v20210410
Behavioral task
behavioral8
Sample
23-07-2021/ORIGINAL DOCUMENTS.bat.exe
Resource
win10v20210410
Behavioral task
behavioral9
Sample
23-07-2021/PREVENTIVO RICHIESTO (2).exe
Resource
win7v20210408
Behavioral task
behavioral10
Sample
23-07-2021/PREVENTIVO RICHIESTO (2).exe
Resource
win10v20210410
Behavioral task
behavioral11
Sample
Payment copy.pdf.exe
Resource
win7v20210408
Behavioral task
behavioral12
Sample
Payment copy.pdf.exe
Resource
win10v20210410
Behavioral task
behavioral13
Sample
23-07-2021/RICHIESTA DI OFFERTA.exe
Resource
win7v20210408
Behavioral task
behavioral14
Sample
23-07-2021/RICHIESTA DI OFFERTA.exe
Resource
win10v20210410
Behavioral task
behavioral15
Sample
23-07-2021/SWIFT COPY.exe
Resource
win7v20210410
Behavioral task
behavioral16
Sample
23-07-2021/SWIFT COPY.exe
Resource
win10v20210408
Behavioral task
behavioral17
Sample
23-07-2021/Swift.bat.exe
Resource
win7v20210410
Behavioral task
behavioral18
Sample
23-07-2021/Swift.bat.exe
Resource
win10v20210408
Behavioral task
behavioral19
Sample
payment receipt.pdf.exe
Resource
win7v20210410
Behavioral task
behavioral20
Sample
payment receipt.pdf.exe
Resource
win10v20210408
General
-
Target
Payment copy.pdf.exe
-
Size
597KB
-
MD5
59ebd03380ec88b7543ce53775402ad4
-
SHA1
ffdcf1b54a27cfe803cdb97a9be8da8f4d451e88
-
SHA256
6bc597969852f50b5c80dcd7efaa0792d170999456c6f8bd0a5ce274ae4eb63b
-
SHA512
293e276d463fdcf37e193536929badb42cce238f76a2e2c375eaa92fd0eccc933b6efa3f2f102c9f076ff701a3940e1788e2a2a45930460153054a7806b82f92
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
Payment copy.pdf.exepid process 940 Payment copy.pdf.exe 940 Payment copy.pdf.exe 940 Payment copy.pdf.exe 940 Payment copy.pdf.exe 940 Payment copy.pdf.exe 940 Payment copy.pdf.exe 940 Payment copy.pdf.exe 940 Payment copy.pdf.exe 940 Payment copy.pdf.exe 940 Payment copy.pdf.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Payment copy.pdf.exedescription pid process Token: SeDebugPrivilege 940 Payment copy.pdf.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
Payment copy.pdf.exedescription pid process target process PID 940 wrote to memory of 1648 940 Payment copy.pdf.exe Payment copy.pdf.exe PID 940 wrote to memory of 1648 940 Payment copy.pdf.exe Payment copy.pdf.exe PID 940 wrote to memory of 1648 940 Payment copy.pdf.exe Payment copy.pdf.exe PID 940 wrote to memory of 1648 940 Payment copy.pdf.exe Payment copy.pdf.exe PID 940 wrote to memory of 1572 940 Payment copy.pdf.exe Payment copy.pdf.exe PID 940 wrote to memory of 1572 940 Payment copy.pdf.exe Payment copy.pdf.exe PID 940 wrote to memory of 1572 940 Payment copy.pdf.exe Payment copy.pdf.exe PID 940 wrote to memory of 1572 940 Payment copy.pdf.exe Payment copy.pdf.exe PID 940 wrote to memory of 1580 940 Payment copy.pdf.exe Payment copy.pdf.exe PID 940 wrote to memory of 1580 940 Payment copy.pdf.exe Payment copy.pdf.exe PID 940 wrote to memory of 1580 940 Payment copy.pdf.exe Payment copy.pdf.exe PID 940 wrote to memory of 1580 940 Payment copy.pdf.exe Payment copy.pdf.exe PID 940 wrote to memory of 1604 940 Payment copy.pdf.exe Payment copy.pdf.exe PID 940 wrote to memory of 1604 940 Payment copy.pdf.exe Payment copy.pdf.exe PID 940 wrote to memory of 1604 940 Payment copy.pdf.exe Payment copy.pdf.exe PID 940 wrote to memory of 1604 940 Payment copy.pdf.exe Payment copy.pdf.exe PID 940 wrote to memory of 1456 940 Payment copy.pdf.exe Payment copy.pdf.exe PID 940 wrote to memory of 1456 940 Payment copy.pdf.exe Payment copy.pdf.exe PID 940 wrote to memory of 1456 940 Payment copy.pdf.exe Payment copy.pdf.exe PID 940 wrote to memory of 1456 940 Payment copy.pdf.exe Payment copy.pdf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payment copy.pdf.exe"C:\Users\Admin\AppData\Local\Temp\Payment copy.pdf.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Payment copy.pdf.exe"{path}"2⤵
-
C:\Users\Admin\AppData\Local\Temp\Payment copy.pdf.exe"{path}"2⤵
-
C:\Users\Admin\AppData\Local\Temp\Payment copy.pdf.exe"{path}"2⤵
-
C:\Users\Admin\AppData\Local\Temp\Payment copy.pdf.exe"{path}"2⤵
-
C:\Users\Admin\AppData\Local\Temp\Payment copy.pdf.exe"{path}"2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/940-60-0x00000000003C0000-0x00000000003C1000-memory.dmpFilesize
4KB
-
memory/940-62-0x0000000000370000-0x0000000000371000-memory.dmpFilesize
4KB
-
memory/940-63-0x00000000003B0000-0x00000000003B2000-memory.dmpFilesize
8KB
-
memory/940-64-0x0000000007CD0000-0x0000000007D43000-memory.dmpFilesize
460KB
-
memory/940-65-0x0000000001FA0000-0x0000000001FCC000-memory.dmpFilesize
176KB