Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 11:53
Static task
static1
Behavioral task
behavioral1
Sample
Notice of Payment.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Notice of Payment.exe
Resource
win10v2004-20220414-en
General
-
Target
Notice of Payment.exe
-
Size
347KB
-
MD5
0b7b2acd93a784e3af07bd3acaec2e97
-
SHA1
069c15a1913cd506ffc306a14075e7dd28a3d122
-
SHA256
d70b1d7ebfde15715b3e63d8b4cf75c9025de1e3744d83c78278d7e939d459de
-
SHA512
aecdfc30af77e6500c0fc5951a5bb0d476d7e932e77b3303044b26a99e6d0b328db72623e076174d6a6d56dfe792ef43d71e145d73500fc39842ef0e061e9807
Malware Config
Signatures
-
Cheetah Keylogger
Cheetah is a keylogger and info stealer first seen in March 2020.
-
Cheetah Keylogger Payload 1 IoCs
resource yara_rule behavioral1/memory/1120-70-0x00000000005D0000-0x0000000000606000-memory.dmp family_cheetahkeylogger -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral1/memory/1516-55-0x00000000008D0000-0x00000000008E8000-memory.dmp agile_net -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ifconfig.me -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1516 set thread context of 1120 1516 Notice of Payment.exe 27 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1516 Notice of Payment.exe 1516 Notice of Payment.exe 1516 Notice of Payment.exe 1120 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1516 Notice of Payment.exe Token: SeDebugPrivilege 1120 InstallUtil.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1516 wrote to memory of 1120 1516 Notice of Payment.exe 27 PID 1516 wrote to memory of 1120 1516 Notice of Payment.exe 27 PID 1516 wrote to memory of 1120 1516 Notice of Payment.exe 27 PID 1516 wrote to memory of 1120 1516 Notice of Payment.exe 27 PID 1516 wrote to memory of 1120 1516 Notice of Payment.exe 27 PID 1516 wrote to memory of 1120 1516 Notice of Payment.exe 27 PID 1516 wrote to memory of 1120 1516 Notice of Payment.exe 27 PID 1516 wrote to memory of 1120 1516 Notice of Payment.exe 27 PID 1516 wrote to memory of 1120 1516 Notice of Payment.exe 27 PID 1516 wrote to memory of 1120 1516 Notice of Payment.exe 27 PID 1516 wrote to memory of 1120 1516 Notice of Payment.exe 27 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Notice of Payment.exe"C:\Users\Admin\AppData\Local\Temp\Notice of Payment.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1120
-