Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
13/09/2022, 14:22
Static task
static1
Behavioral task
behavioral1
Sample
Invoice.exe
Resource
win7-20220812-en
General
-
Target
Invoice.exe
-
Size
1016KB
-
MD5
9b4ced2b69f0a58d749d55000eb91ae5
-
SHA1
ba4a20794dbde2aee9bee224a586a0187c050441
-
SHA256
413ad4daf54c1b3c50f35aa2afb87a3582589599bb20085ccb7b89eb5acccee8
-
SHA512
22d8c59d0aeb4e91b18ea9c0e18f9512331172063a389faeb7918b5fa2b3724c35386539a821119caa8c726dff2ab3e99c89f2f714ac56d32fa30d49ec0f4667
-
SSDEEP
12288:BkR62k+U7wxvAv/RO2jN5FszavHtVZy2lGv2t95zsF8ZxPG102efT:yU7waOoszavHE2ln9xsuZIP
Malware Config
Extracted
formbook
ejgp
+0NM3RekW0bfgQ==
iQmI3Aw2aoOljoA0XZi1
5Ei2CVwQyOgZwV/u4eiMFdKqc84=
ImSvoul9o0reZ9TKUAUkXgw=
kuCrMIco5vT3sxCUQ+pYsVoG7Q==
btgpLo8XM+qHGLzoizgjRg==
fqK2iM5vW0bfgQ==
ObS1UE+TByKRZozamdULr0naXbKPLA==
bcohBkmNNcpp3gJ/XE2/mBs=
yY5b/cLb3+0llg==
GVEVqBNXl7Kic2Sm
Tqpt2tTlW0bfgQ==
eurYRI7UFDBjDbzpIJKz
7wwDuczemAaJNrrpIJKz
bprQyLvLEj+hhMLHHg==
qdoAqq/XOjh0ItzLLJpHBgxoJgM2
gr5SnMA66BpM8+hUM+iawNKeZsQ=
XLoO6yFTsdNuEYpUPfScwqXEk7dqBnU=
vS2Cjfg0tqBF1GpuHemLV8/g4wUwPspS
U5wqXJjP/u/qg3sE+YKsgVVByFw+
6Qul0MI57A40ueX7Uh8=
IGr1GFkQxOYclTlq1dWwCpfrYMI=
cqLh+QczhrzdZ2/pIJKz
HGi2j8gM2ZZA59e8Fw==
htYvQKbmdF0SvUP67ebXcmE3/uzNMA==
5v+uDDzlnYEi1ys=
HZgZRHcj3fw3GH2WCQ==
RrCaR398Tdju
b5upYoKjGFXjloTNQrLms2lByFw+
Q7qnTXgEBa+lHRZKrRuPlU9YZLdqBnU=
D6clUYImrLoeAHaqFA==
xdrcmoa+AO/ZYVXk5sFpEtKeZsQ=
erJYeX6DtVY13U11VhE=
/D4wGJyUf5zg
uDNlLJ19Zvw=
e63EgpreYHnpZYPp1dH3jRE=
oAPyvNkPg48R8KipH1pQ5IF+TZrce3/+wA==
w/i5TF+hHlGzaZhUS+5hH+hmTNzxpAVa
ke0iGwcm3+0llg==
bbGaZYKNNrQSyflWyj2oBpcs
ha++gwt5rlQFqw1AQAg=
scSTL3/FbwOXHqajWkgqmh0=
H4jWx7vLqks1vMokkMz8Kuz4Q1aKOA==
0CViYGqjx2gOrg1AQAg=
XqhAovm0cUgU4nwrHA==
s9DajO14+Pg00F5cycZfDdKeZsQ=
/HLFmNRxdB8z3Q1AQAg=
MsYIc6M9vORxWJegDQ==
a+NfdmuRfybXudoLcbTZsUchqC4n
XMCW+zV1raKke7MgExDNZXH8+g==
r99wvAFBhLrneJhGGpLIpmlByFw+
HGgnm5S6dOdvFrTjizgjRg==
YLDq+w1ChoRmBzaUen3gul1u+w==
pu6vTWRtJ6cZAHaqFA==
nAaG1vUgYkodsNJdUE2/mBs=
X4qhboKOVCMz3Q1AQAg=
pt2iMklSGz6NIhtaufwrUg==
6UyWemOlpFZoBCTe5NUBhwY=
Ycwg9jPgC75kB59QizgjRg==
grRAZIkanoVJ3Xs5HQ==
Ep4taphAwK6ic2Sm
SW5qJj5D6BfSgA==
R7gN/vcdVnJ/i8AHeO9ldkhW3XDPNMhS
JEJUAPMTjbY9DrrpIJKz
naik138rtp.com
Signatures
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1972 set thread context of 864 1972 Invoice.exe 32 PID 864 set thread context of 1224 864 RegSvcs.exe 17 PID 1912 set thread context of 1224 1912 NETSTAT.EXE 17 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 948 schtasks.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 1912 NETSTAT.EXE -
description ioc Process Key created \Registry\User\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 NETSTAT.EXE -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 1972 Invoice.exe 1972 Invoice.exe 1776 powershell.exe 864 RegSvcs.exe 864 RegSvcs.exe 864 RegSvcs.exe 864 RegSvcs.exe 1912 NETSTAT.EXE 1912 NETSTAT.EXE 1912 NETSTAT.EXE 1912 NETSTAT.EXE 1912 NETSTAT.EXE 1912 NETSTAT.EXE 1912 NETSTAT.EXE 1912 NETSTAT.EXE 1912 NETSTAT.EXE 1912 NETSTAT.EXE 1912 NETSTAT.EXE 1912 NETSTAT.EXE 1912 NETSTAT.EXE 1912 NETSTAT.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 864 RegSvcs.exe 864 RegSvcs.exe 864 RegSvcs.exe 1912 NETSTAT.EXE 1912 NETSTAT.EXE 1912 NETSTAT.EXE 1912 NETSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1972 Invoice.exe Token: SeDebugPrivilege 1776 powershell.exe Token: SeDebugPrivilege 864 RegSvcs.exe Token: SeDebugPrivilege 1912 NETSTAT.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1224 Explorer.EXE 1224 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1224 Explorer.EXE 1224 Explorer.EXE -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 1972 wrote to memory of 1776 1972 Invoice.exe 28 PID 1972 wrote to memory of 1776 1972 Invoice.exe 28 PID 1972 wrote to memory of 1776 1972 Invoice.exe 28 PID 1972 wrote to memory of 1776 1972 Invoice.exe 28 PID 1972 wrote to memory of 948 1972 Invoice.exe 30 PID 1972 wrote to memory of 948 1972 Invoice.exe 30 PID 1972 wrote to memory of 948 1972 Invoice.exe 30 PID 1972 wrote to memory of 948 1972 Invoice.exe 30 PID 1972 wrote to memory of 864 1972 Invoice.exe 32 PID 1972 wrote to memory of 864 1972 Invoice.exe 32 PID 1972 wrote to memory of 864 1972 Invoice.exe 32 PID 1972 wrote to memory of 864 1972 Invoice.exe 32 PID 1972 wrote to memory of 864 1972 Invoice.exe 32 PID 1972 wrote to memory of 864 1972 Invoice.exe 32 PID 1972 wrote to memory of 864 1972 Invoice.exe 32 PID 1972 wrote to memory of 864 1972 Invoice.exe 32 PID 1972 wrote to memory of 864 1972 Invoice.exe 32 PID 1972 wrote to memory of 864 1972 Invoice.exe 32 PID 1224 wrote to memory of 1912 1224 Explorer.EXE 33 PID 1224 wrote to memory of 1912 1224 Explorer.EXE 33 PID 1224 wrote to memory of 1912 1224 Explorer.EXE 33 PID 1224 wrote to memory of 1912 1224 Explorer.EXE 33 PID 1912 wrote to memory of 1992 1912 NETSTAT.EXE 35 PID 1912 wrote to memory of 1992 1912 NETSTAT.EXE 35 PID 1912 wrote to memory of 1992 1912 NETSTAT.EXE 35 PID 1912 wrote to memory of 1992 1912 NETSTAT.EXE 35 PID 1912 wrote to memory of 1992 1912 NETSTAT.EXE 35
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\Invoice.exe"C:\Users\Admin\AppData\Local\Temp\Invoice.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\UxRAnn.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1776
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UxRAnn" /XML "C:\Users\Admin\AppData\Local\Temp\tmpAD02.tmp"3⤵
- Creates scheduled task(s)
PID:948
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:864
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXE"C:\Windows\SysWOW64\NETSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- Gathers network information
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1992
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5550102a252cff37e5387f984d9920512
SHA1cf7f45028c19d2180c9e13bb717dc3fac6a16acc
SHA256f6bb20c369d3324354c6514c290d86570a6c5a5da1f1599b06cf9ceb9f3163fe
SHA512d9cef89c14bb0fc6dba2952bba1fb9ae9c98a8c4060facb0af58058eba417087c9a0a34b542a1d42c1dcd9a46f716377d485b12a64d5b627396459ecf2e02720