Analysis
-
max time kernel
142s -
max time network
165s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 01:43
Static task
static1
Behavioral task
behavioral1
Sample
Payment Notification.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Payment Notification.exe
Resource
win10v2004-20220414-en
General
-
Target
Payment Notification.exe
-
Size
381KB
-
MD5
673a1dd42a4ce1a314a1db4dcbf09a81
-
SHA1
2fdb26d92e25c38c6300123278cbcea3be6a0ecc
-
SHA256
684aa4d9c333d3ea5db101d239673a76f22e06ae5237ae24b00e43c55cb3b3ae
-
SHA512
9be66fa1b076700972797c273bce0d14594fc3cc58728e0ca5552138c9dac04152470ae70d44a7c9c6dbf2b672143085134e14a9f7c6c54cce88aa2715ad6201
Malware Config
Signatures
-
Cheetah Keylogger
Cheetah is a keylogger and info stealer first seen in March 2020.
-
Cheetah Keylogger Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/880-70-0x0000000000200000-0x0000000000236000-memory.dmp family_cheetahkeylogger -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral1/memory/1392-55-0x0000000000530000-0x0000000000546000-memory.dmp agile_net -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
InstallUtil.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 ifconfig.me -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Payment Notification.exedescription pid Process procid_target PID 1392 set thread context of 880 1392 Payment Notification.exe 28 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
Payment Notification.exeInstallUtil.exepid Process 1392 Payment Notification.exe 1392 Payment Notification.exe 1392 Payment Notification.exe 880 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Payment Notification.exeInstallUtil.exedescription pid Process Token: SeDebugPrivilege 1392 Payment Notification.exe Token: SeDebugPrivilege 880 InstallUtil.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
Payment Notification.exedescription pid Process procid_target PID 1392 wrote to memory of 880 1392 Payment Notification.exe 28 PID 1392 wrote to memory of 880 1392 Payment Notification.exe 28 PID 1392 wrote to memory of 880 1392 Payment Notification.exe 28 PID 1392 wrote to memory of 880 1392 Payment Notification.exe 28 PID 1392 wrote to memory of 880 1392 Payment Notification.exe 28 PID 1392 wrote to memory of 880 1392 Payment Notification.exe 28 PID 1392 wrote to memory of 880 1392 Payment Notification.exe 28 PID 1392 wrote to memory of 880 1392 Payment Notification.exe 28 PID 1392 wrote to memory of 880 1392 Payment Notification.exe 28 PID 1392 wrote to memory of 880 1392 Payment Notification.exe 28 PID 1392 wrote to memory of 880 1392 Payment Notification.exe 28 -
outlook_office_path 1 IoCs
Processes:
InstallUtil.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
outlook_win_path 1 IoCs
Processes:
InstallUtil.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payment Notification.exe"C:\Users\Admin\AppData\Local\Temp\Payment Notification.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:880
-