Analysis
-
max time kernel
116s -
max time network
106s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 02:43
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Purchase Order.exe
Resource
win10v2004-20220414-en
General
-
Target
Purchase Order.exe
-
Size
399KB
-
MD5
ab969727c2995cb6f638497bf4c78624
-
SHA1
5fd9403239d12729020514292af459294a7db885
-
SHA256
0126bb5bedfa1d8a433bfa4bf885c9a86d0d98630254c7293d70e766f372432e
-
SHA512
f969bc469981180dc8bad174bc87f86d83f22f20426b4997f8c93d203f434f8a5d273044711a50830a345b81ae24bd876a605322204e3c7214f183a555cd60ed
Malware Config
Signatures
-
Cheetah Keylogger
Cheetah is a keylogger and info stealer first seen in March 2020.
-
Cheetah Keylogger Payload 1 IoCs
resource yara_rule behavioral1/memory/1992-70-0x00000000003C0000-0x00000000003F6000-memory.dmp family_cheetahkeylogger -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral1/memory/1460-55-0x00000000001E0000-0x00000000001F6000-memory.dmp agile_net -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ifconfig.me -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1460 set thread context of 1992 1460 Purchase Order.exe 27 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1460 Purchase Order.exe 1460 Purchase Order.exe 1460 Purchase Order.exe 1992 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1460 Purchase Order.exe Token: SeDebugPrivilege 1992 InstallUtil.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1460 wrote to memory of 1992 1460 Purchase Order.exe 27 PID 1460 wrote to memory of 1992 1460 Purchase Order.exe 27 PID 1460 wrote to memory of 1992 1460 Purchase Order.exe 27 PID 1460 wrote to memory of 1992 1460 Purchase Order.exe 27 PID 1460 wrote to memory of 1992 1460 Purchase Order.exe 27 PID 1460 wrote to memory of 1992 1460 Purchase Order.exe 27 PID 1460 wrote to memory of 1992 1460 Purchase Order.exe 27 PID 1460 wrote to memory of 1992 1460 Purchase Order.exe 27 PID 1460 wrote to memory of 1992 1460 Purchase Order.exe 27 PID 1460 wrote to memory of 1992 1460 Purchase Order.exe 27 PID 1460 wrote to memory of 1992 1460 Purchase Order.exe 27 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Purchase Order.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1992
-