Analysis
-
max time kernel
145s -
max time network
134s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
05-02-2022 18:13
Static task
static1
Behavioral task
behavioral1
Sample
Payment Comfirmation.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
Payment Comfirmation.exe
Resource
win10v2004-en-20220112
General
-
Target
Payment Comfirmation.exe
-
Size
379KB
-
MD5
8cc7544c09deb420b50ef840f6f1c289
-
SHA1
d2e1989c3efc56909510b6aec7ee20f720afb1df
-
SHA256
cdf96811c3ce5645b19c096fa4fffca84bcb7dc4885008f83373fe580ea57f01
-
SHA512
a211d88e815dcd246202a69b2ea8ac02ee8a6a1329eb4b4c3112e490572de9995c7ececee2239f463f5fcd90a3f9455fb98c8225b46a01dab77f661acfcc297c
Malware Config
Extracted
Protocol: smtp- Host:
mail.baconplumbing.co.za - Port:
587 - Username:
[email protected] - Password:
Andrew@1652
Signatures
-
Cheetah Keylogger
Cheetah is a keylogger and info stealer first seen in March 2020.
-
Cheetah Keylogger Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1656-63-0x0000000000330000-0x0000000000366000-memory.dmp family_cheetahkeylogger -
Obfuscated with Agile.Net obfuscator 2 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral1/memory/1436-56-0x0000000000320000-0x0000000000338000-memory.dmp agile_net behavioral1/memory/1436-57-0x0000000002250000-0x00000000043C0000-memory.dmp agile_net -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
InstallUtil.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 ifconfig.me -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Payment Comfirmation.exedescription pid Process procid_target PID 1436 set thread context of 1656 1436 Payment Comfirmation.exe 28 -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 564 1436 WerFault.exe 26 -
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
Payment Comfirmation.exeInstallUtil.exeWerFault.exepid Process 1436 Payment Comfirmation.exe 1436 Payment Comfirmation.exe 1436 Payment Comfirmation.exe 1656 InstallUtil.exe 564 WerFault.exe 564 WerFault.exe 564 WerFault.exe 564 WerFault.exe 564 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
Payment Comfirmation.exeInstallUtil.exeWerFault.exedescription pid Process Token: SeDebugPrivilege 1436 Payment Comfirmation.exe Token: SeDebugPrivilege 1656 InstallUtil.exe Token: SeDebugPrivilege 564 WerFault.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
Payment Comfirmation.exedescription pid Process procid_target PID 1436 wrote to memory of 1656 1436 Payment Comfirmation.exe 28 PID 1436 wrote to memory of 1656 1436 Payment Comfirmation.exe 28 PID 1436 wrote to memory of 1656 1436 Payment Comfirmation.exe 28 PID 1436 wrote to memory of 1656 1436 Payment Comfirmation.exe 28 PID 1436 wrote to memory of 1656 1436 Payment Comfirmation.exe 28 PID 1436 wrote to memory of 1656 1436 Payment Comfirmation.exe 28 PID 1436 wrote to memory of 1656 1436 Payment Comfirmation.exe 28 PID 1436 wrote to memory of 1656 1436 Payment Comfirmation.exe 28 PID 1436 wrote to memory of 1656 1436 Payment Comfirmation.exe 28 PID 1436 wrote to memory of 1656 1436 Payment Comfirmation.exe 28 PID 1436 wrote to memory of 1656 1436 Payment Comfirmation.exe 28 PID 1436 wrote to memory of 564 1436 Payment Comfirmation.exe 30 PID 1436 wrote to memory of 564 1436 Payment Comfirmation.exe 30 PID 1436 wrote to memory of 564 1436 Payment Comfirmation.exe 30 PID 1436 wrote to memory of 564 1436 Payment Comfirmation.exe 30 -
outlook_office_path 1 IoCs
Processes:
InstallUtil.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
outlook_win_path 1 IoCs
Processes:
InstallUtil.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payment Comfirmation.exe"C:\Users\Admin\AppData\Local\Temp\Payment Comfirmation.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1656
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1436 -s 7522⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:564
-