Analysis
-
max time kernel
122s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 11:53
Static task
static1
Behavioral task
behavioral1
Sample
Notice of Payment.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Notice of Payment.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
Notice of Payment.exe
-
Size
347KB
-
MD5
0b7b2acd93a784e3af07bd3acaec2e97
-
SHA1
069c15a1913cd506ffc306a14075e7dd28a3d122
-
SHA256
d70b1d7ebfde15715b3e63d8b4cf75c9025de1e3744d83c78278d7e939d459de
-
SHA512
aecdfc30af77e6500c0fc5951a5bb0d476d7e932e77b3303044b26a99e6d0b328db72623e076174d6a6d56dfe792ef43d71e145d73500fc39842ef0e061e9807
Score
10/10
Malware Config
Extracted
Credentials
Protocol: smtp- Host:
mail.baconplumbing.co.za - Port:
587 - Username:
[email protected] - Password:
Andrew@1652
Signatures
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 33 ifconfig.me -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 400 set thread context of 1512 400 Notice of Payment.exe 89 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 400 Notice of Payment.exe 400 Notice of Payment.exe 400 Notice of Payment.exe 1512 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 400 Notice of Payment.exe Token: SeDebugPrivilege 1512 InstallUtil.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 400 wrote to memory of 1512 400 Notice of Payment.exe 89 PID 400 wrote to memory of 1512 400 Notice of Payment.exe 89 PID 400 wrote to memory of 1512 400 Notice of Payment.exe 89 PID 400 wrote to memory of 1512 400 Notice of Payment.exe 89 PID 400 wrote to memory of 1512 400 Notice of Payment.exe 89 PID 400 wrote to memory of 1512 400 Notice of Payment.exe 89 PID 400 wrote to memory of 1512 400 Notice of Payment.exe 89 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Notice of Payment.exe"C:\Users\Admin\AppData\Local\Temp\Notice of Payment.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1512
-