Analysis
-
max time kernel
105s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2022, 07:51
Behavioral task
behavioral1
Sample
Payment Confirmation Invoice.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Payment Confirmation Invoice.exe
Resource
win10v2004-20220901-en
General
-
Target
Payment Confirmation Invoice.exe
-
Size
408KB
-
MD5
226bea0278f6534c83992d1ceac1c211
-
SHA1
b1a3df7bedbb45b0a2df9e575293d795996da01a
-
SHA256
29b194f5409b24a2bdf4b74f35e13a73e7e133dab36339f7b2cc9a0e4f007e17
-
SHA512
e889315f6609ace41811e0f7379cccb802b0ed3012337f9653241b3a0bdaf9b9bf523b9134b2e373d9117118fef68565c1a5e7eb57ddb53c2656277f2957277e
-
SSDEEP
6144:ax9Xwhm7c/n10V7cMW4Es+CS/wUcvzUjSa5pK2mKdl0TruunfD09gfJChgGJhCj:abXwhm7a1gB4/8vYjDpK8atfx8hDu
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation cmd.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1860 mspaint.exe 1860 mspaint.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 4504 Payment Confirmation Invoice.exe 4504 Payment Confirmation Invoice.exe 4504 Payment Confirmation Invoice.exe 1860 mspaint.exe 1860 mspaint.exe 1860 mspaint.exe 1860 mspaint.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4504 wrote to memory of 4536 4504 Payment Confirmation Invoice.exe 83 PID 4504 wrote to memory of 4536 4504 Payment Confirmation Invoice.exe 83 PID 4504 wrote to memory of 4536 4504 Payment Confirmation Invoice.exe 83 PID 4536 wrote to memory of 1860 4536 cmd.exe 85 PID 4536 wrote to memory of 1860 4536 cmd.exe 85 PID 4536 wrote to memory of 1860 4536 cmd.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payment Confirmation Invoice.exe"C:\Users\Admin\AppData\Local\Temp\Payment Confirmation Invoice.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Windows\SysWOW64\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp"3⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1860
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:672