Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
29-09-2022 07:16
Static task
static1
Behavioral task
behavioral1
Sample
Invoice_Tracking_657895995845HKFDHKLFDLKHDFKLFDKHLFDKL89634.cab
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Invoice_Tracking_657895995845HKFDHKLFDLKHDFKLFDKHLFDKL89634.cab
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
Invoice_Tracking_657895995845HKFDHKLFDLKHDFKLFDKHLFDKL89634.exe
Resource
win7-20220812-en
General
-
Target
Invoice_Tracking_657895995845HKFDHKLFDLKHDFKLFDKHLFDKL89634.exe
-
Size
277KB
-
MD5
adfbf0d0858c2ccf0c3070967f1c5a3e
-
SHA1
e723c9f072504c3345f91829000ec7d96ac6661a
-
SHA256
54d71b452ceceb7769f2ab610d157005849ec32aae5544acaa99d08f8d12cd95
-
SHA512
7c08f20307f27a8f91fdf53efd1280b898e78fbc8382c4b3dd3fc3f7f75204e0c4fafb5e7bc97d53872d46fc3ab72851703c8f0d6e932c407d3b5e6e68f07749
-
SSDEEP
6144:KAJjLwdO06a3KpeQnaMDCbd9D+E2fCos4OianeAsIJ/8kAG:KjO06IKpRnacCxx+EcCBnbX8kL
Malware Config
Extracted
formbook
f4ca
QYZ6iE9Y+CsiZpCBareS0uU=
N2FQLAaH6xXE
Vc6t0MQXN+Llxsqg
ElBedmSvYGGm6yLDhHqzAtmlCxWl
4VpIWShqHR5cpjfQ4bs=
mepO9miu/iFiQQ==
Z8Owqh54IlwEpDfQ4bs=
qcq4uT5HecWZG3EVwKTiUE7slrGQGiyo
IaYYoJikKDDqgV/NigZCLA==
4Xz5pfoCCW/76NnOUrFEOw==
xiijSkVJ3Yuh9OKDcmui/d2lCxWl
cr8MmfpCEu0ULsO3p6w=
JLm2yKHo7hdVb8O3p6w=
Hriy5svWm2Qfq9mPQib9jJI65gOr
2G3nkRpidunlxsqg
gPHUAeXmi8Q9ARy3
6l5WaOf8BxhQDkp5gKQ=
KHHiXs4WOqXZdPhpaw==
+UQ5Vz5O0Ms9ARy3
pNQygKu0OziAvjOHRGLnJA==
M5qPrHO70XILJV/OigZCLA==
Bwz2AdUUvLPoNoBcySTO
KJjsht/Of6qQeYo=
9RZ4FHl1i9tjjLtcaQ==
IHbpfXRupy3AuY53YbeS0uU=
b6mkuLnwenslCkJjG1iATee5mGNJZA==
8zSsXODtGdFshtAAq8/84qAdyWHlSRb8OA==
1mO8Rr4ZsdaKHyjIigZCLA==
/ui43zLv/iFiQQ==
awBv/mmr/iFiQQ==
FzPXOR1MP6LCeacQ230v4cZCSg==
71peZiwr4LDIKTXLigZCLA==
skAiLfTuomFyKFjKigZCLA==
MWxMWMDIzlv8FmCRTC1sEK8smGNJZA==
bdIXrhYkUpPgGFTGigZCLA==
KVi0U6AAgX0bm69LRH+44WFEXQ==
+D5ILQaH6xXE
KXNjcguH6xXE
uUw4NsLMwznO8DCok5284WFEXQ==
bpTmlRJhlBtTIWXQigZCLA==
hgLX9+LVB44xMU7MigZCLA==
9eIK+99sbak=
wEQyQx5W7vq2QGYf2SZtRqSoV+8=
ofjaCQZVBhGwWZd9YbeS0uU=
suPZ6swTIqqQeYo=
U+ZbBWlkdr7vEzXhm/mwHhbKuJ19fA==
1l/oh36HBv2RMXxcySTO
d5wkrq+mz3ZP/1W/
y+Za+XOo1HklJE/6tbU=
MrobxTxIXZ0lwwDx8DuhOB2u
h6nQ6B9ca6o=
niYQHxujFCDG
ITyqOJbtbWmceMO3p6w=
exCIJzB+kFbIzsq9Yw==
R8BN7ertksNfB0c2MGKdjFrtlax0SRb8OA==
ygaUPcYVRNRoV0lrZaunAPI=
u+BS4kyibTLlxsqg
FX5XcVKp1I9JHmyinq4=
1AABJPxNW5kknYkiGzgpWCrE2uc=
e7KTvkWOes4AQHtcySTO
Y8uNpo+SKOIIwvSkOLeS0uU=
wvFsBI3N3VmiZpqxcLeS0uU=
o0s+RSt6lUPH8xcD+W3AEgKm
XCJ0FKy6zloOGiRYXbeS0uU=
mettafizzix.org
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4992 set thread context of 1392 4992 Invoice_Tracking_657895995845HKFDHKLFDLKHDFKLFDKHLFDKL89634.exe 84 PID 1392 set thread context of 2416 1392 cvtres.exe 41 PID 3132 set thread context of 2416 3132 cmstp.exe 41 -
description ioc Process Key created \Registry\User\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 cmstp.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4992 Invoice_Tracking_657895995845HKFDHKLFDLKHDFKLFDKHLFDKL89634.exe 4992 Invoice_Tracking_657895995845HKFDHKLFDLKHDFKLFDKHLFDKL89634.exe 1392 cvtres.exe 1392 cvtres.exe 1392 cvtres.exe 1392 cvtres.exe 1392 cvtres.exe 1392 cvtres.exe 1392 cvtres.exe 1392 cvtres.exe 3132 cmstp.exe 3132 cmstp.exe 3132 cmstp.exe 3132 cmstp.exe 3132 cmstp.exe 3132 cmstp.exe 3132 cmstp.exe 3132 cmstp.exe 3132 cmstp.exe 3132 cmstp.exe 3132 cmstp.exe 3132 cmstp.exe 3132 cmstp.exe 3132 cmstp.exe 3132 cmstp.exe 3132 cmstp.exe 3132 cmstp.exe 3132 cmstp.exe 3132 cmstp.exe 3132 cmstp.exe 3132 cmstp.exe 3132 cmstp.exe 3132 cmstp.exe 3132 cmstp.exe 3132 cmstp.exe 3132 cmstp.exe 3132 cmstp.exe 3132 cmstp.exe 3132 cmstp.exe 3132 cmstp.exe 3132 cmstp.exe 3132 cmstp.exe 3132 cmstp.exe 3132 cmstp.exe 3132 cmstp.exe 3132 cmstp.exe 3132 cmstp.exe 3132 cmstp.exe 3132 cmstp.exe 3132 cmstp.exe 3132 cmstp.exe 3132 cmstp.exe 3132 cmstp.exe 3132 cmstp.exe 3132 cmstp.exe 3132 cmstp.exe 3132 cmstp.exe 3132 cmstp.exe 3132 cmstp.exe 3132 cmstp.exe 3132 cmstp.exe 3132 cmstp.exe 3132 cmstp.exe 3132 cmstp.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2416 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 1392 cvtres.exe 1392 cvtres.exe 1392 cvtres.exe 3132 cmstp.exe 3132 cmstp.exe 3132 cmstp.exe 3132 cmstp.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeDebugPrivilege 4992 Invoice_Tracking_657895995845HKFDHKLFDLKHDFKLFDKHLFDKL89634.exe Token: SeDebugPrivilege 1392 cvtres.exe Token: SeDebugPrivilege 3132 cmstp.exe Token: SeShutdownPrivilege 2416 Explorer.EXE Token: SeCreatePagefilePrivilege 2416 Explorer.EXE Token: SeShutdownPrivilege 2416 Explorer.EXE Token: SeCreatePagefilePrivilege 2416 Explorer.EXE Token: SeShutdownPrivilege 2416 Explorer.EXE Token: SeCreatePagefilePrivilege 2416 Explorer.EXE Token: SeShutdownPrivilege 2416 Explorer.EXE Token: SeCreatePagefilePrivilege 2416 Explorer.EXE Token: SeShutdownPrivilege 2416 Explorer.EXE Token: SeCreatePagefilePrivilege 2416 Explorer.EXE Token: SeShutdownPrivilege 2416 Explorer.EXE Token: SeCreatePagefilePrivilege 2416 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4992 wrote to memory of 936 4992 Invoice_Tracking_657895995845HKFDHKLFDLKHDFKLFDKHLFDKL89634.exe 83 PID 4992 wrote to memory of 936 4992 Invoice_Tracking_657895995845HKFDHKLFDLKHDFKLFDKHLFDKL89634.exe 83 PID 4992 wrote to memory of 936 4992 Invoice_Tracking_657895995845HKFDHKLFDLKHDFKLFDKHLFDKL89634.exe 83 PID 4992 wrote to memory of 1392 4992 Invoice_Tracking_657895995845HKFDHKLFDLKHDFKLFDKHLFDKL89634.exe 84 PID 4992 wrote to memory of 1392 4992 Invoice_Tracking_657895995845HKFDHKLFDLKHDFKLFDKHLFDKL89634.exe 84 PID 4992 wrote to memory of 1392 4992 Invoice_Tracking_657895995845HKFDHKLFDLKHDFKLFDKHLFDKL89634.exe 84 PID 4992 wrote to memory of 1392 4992 Invoice_Tracking_657895995845HKFDHKLFDLKHDFKLFDKHLFDKL89634.exe 84 PID 4992 wrote to memory of 1392 4992 Invoice_Tracking_657895995845HKFDHKLFDLKHDFKLFDKHLFDKL89634.exe 84 PID 4992 wrote to memory of 1392 4992 Invoice_Tracking_657895995845HKFDHKLFDLKHDFKLFDKHLFDKL89634.exe 84 PID 2416 wrote to memory of 3132 2416 Explorer.EXE 85 PID 2416 wrote to memory of 3132 2416 Explorer.EXE 85 PID 2416 wrote to memory of 3132 2416 Explorer.EXE 85 PID 3132 wrote to memory of 2292 3132 cmstp.exe 92 PID 3132 wrote to memory of 2292 3132 cmstp.exe 92 PID 3132 wrote to memory of 2292 3132 cmstp.exe 92
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\Invoice_Tracking_657895995845HKFDHKLFDLKHDFKLFDKHLFDKL89634.exe"C:\Users\Admin\AppData\Local\Temp\Invoice_Tracking_657895995845HKFDHKLFDLKHDFKLFDKHLFDKL89634.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"3⤵PID:936
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1392
-
-
-
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:2292
-
-