Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2022, 13:16
Static task
static1
Behavioral task
behavioral1
Sample
Payment_Advice.pdf.exe
Resource
win7-20220812-en
General
-
Target
Payment_Advice.pdf.exe
-
Size
780KB
-
MD5
86855fd89cf9d73b25db56cfddcb26bb
-
SHA1
c176adca26aefc687a5a89108b0276e0f8dfd22c
-
SHA256
6f74e80cc1e0428e9c04ade080df738cd9206a4ef51e55737af9c5b5d62ca7f4
-
SHA512
8b378e20dd307bc345ac2f800c62e9c2ac3235f782ef2fd5d8fe9b550ef82dc76182d6cb25bb592d918161da9bc5bbfd220c256848c993dcc2634721b6a12ce7
-
SSDEEP
12288:wA52iNUDjyTOhNWcAsmP55Fgf/JUni6a7n/W+ZHkOYLD:j1CfOsmP55mJOFa7//ZE5L
Malware Config
Extracted
formbook
nquy
a3sidprVANFTG0llIjdA
amYQhcIbS9blLB0=
GOqH7AZQZTYBOB8vWeHGwCVnUw==
kp1yw+EwVCesxslPY5gtZ2aiBcRa
zV/0O1+y47mCh6+5
uX0OU3R898WRBa/Rog==
6val8whPkGM9wuxTFGNI
ozzlSYzyF/XOgNSKG5fsoNYzkk+pxgDF
sHo2h6PuHfFwtOdTFGNI
xZ54yOceUB/thMxtzhp4wCVnUw==
s4pIou5HdD3C1snrARcqXw==
jiOqEVW81qEjTIs5ouY+1hZ3MGvCJg==
Nga3BkamwZ4gVmz0fb5KkYs=
DNeA3Bp8vJpd8VPogb5KkYs=
tbZjsdPoeu0sRcPUqA==
RToES3S3EqV3+g2XLLtFzOHPMXwE7JvN
+c+C3eYzcETJ8hehDlIno5I=
3KE0kK71Hf/ODgNTFGNI
MPrCqTAJbjGx
fkXl/0uKuIgIDPB+aeTYSA==
Ie+2DzGk0K1uGmsDfr5KkYs=
scl/0wJ2pH4FSI87r/1NjNEtmk0=
nWwsjsYkVTEOPibGARKeHxl5bnTMplI=
FZ49p8ECLCHhmPWAaeTYSA==
PxjG5EeL6XNB1g==
4WsBX6cCMg6hxu1TFGNI
fj4IV2Kw4sRGb5OuQnbUWpalEsbKJ1o=
9APMETJ6ppJD1gIoIGMDUXnl
HdRquMEPOhbj2ewevw==
BdiC4xZxmoIXPl1xUJwr8UWCa3TMplI=
exLLJ0KHxKEkKAxcNsFj4R9sWw==
ydKJ1SSC6XNB1g==
nnoyh9I0QCa107xgARcqXw==
8QCwFyl7s5EO2ewevw==
s3waX6YHZPO7Tmv0fL1OqyRXLlluLg==
USC3IFO8871JETXBa/U=
UxbBGjVqrIZA6FnqfL5KkYs=
WxrbI13Y+eCp9e0K2yR2wCVnUw==
e4onfccrXkQSVm/qLEC+VFeRbnTMplI=
4t2Gz+MySyf1RcPUqA==
MdaT9DdMa0bZ+wNTFGNI
LXj8J8noEus=
EuKs+zaszqgyWF3aRb4fbZalEsbKJ1o=
oqZjr8QDRCGhyuxTFGNI
zZ5Vn7X4N9blLB0=
z4gWW4LD8duvVL1f7fuG/HPj
iYgcjMgrPNWwvcXrntX2snm8HZypxgDF
M/Ps/x9enn46wuxTFGNI
WzrTM3bgEeNztedTFGNI
q2D1SXPc/dtjp/0p+EGcFhyD+nTMplI=
pmUkbq4RMPF7fmPpH18DUXnl
7e+e+gBDnTK36AQ=
LQak8gpGdEHh/wNTFGNI
YyDKFjh5lnM4ID8hcPE=
SCraRlqxyaFiUnmg
Uye1FT+42bVEebnFkK6M3iOHbHTMplI=
Acd0xd85VObjGFS25exEEIM=
BZE0SPLpVjy7
AtR73OwIe2E8cpY3hzwednfIpbV6k+O9fA==
woItf6YTRi/tRcPUqA==
dT/vTYv0H9+4UH+apjMDUXnl
WFwXe4ngC+d+sNBgARcqXw==
7KpDjaz4OBnng7xX4SrGDfcCLFo=
xJQ7iabxCPTJfNZTFGNI
lascypaaadvisory.org
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation Payment_Advice.pdf.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4588 set thread context of 5048 4588 Payment_Advice.pdf.exe 90 PID 5048 set thread context of 3092 5048 Payment_Advice.pdf.exe 43 PID 4348 set thread context of 3092 4348 msiexec.exe 43 -
description ioc Process Key created \Registry\User\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 msiexec.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 5048 Payment_Advice.pdf.exe 5048 Payment_Advice.pdf.exe 5048 Payment_Advice.pdf.exe 5048 Payment_Advice.pdf.exe 5048 Payment_Advice.pdf.exe 5048 Payment_Advice.pdf.exe 5048 Payment_Advice.pdf.exe 5048 Payment_Advice.pdf.exe 4348 msiexec.exe 4348 msiexec.exe 4348 msiexec.exe 4348 msiexec.exe 4348 msiexec.exe 4348 msiexec.exe 4348 msiexec.exe 4348 msiexec.exe 4348 msiexec.exe 4348 msiexec.exe 4348 msiexec.exe 4348 msiexec.exe 4348 msiexec.exe 4348 msiexec.exe 4348 msiexec.exe 4348 msiexec.exe 4348 msiexec.exe 4348 msiexec.exe 4348 msiexec.exe 4348 msiexec.exe 4348 msiexec.exe 4348 msiexec.exe 4348 msiexec.exe 4348 msiexec.exe 4348 msiexec.exe 4348 msiexec.exe 4348 msiexec.exe 4348 msiexec.exe 4348 msiexec.exe 4348 msiexec.exe 4348 msiexec.exe 4348 msiexec.exe 4348 msiexec.exe 4348 msiexec.exe 4348 msiexec.exe 4348 msiexec.exe 4348 msiexec.exe 4348 msiexec.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3092 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 5048 Payment_Advice.pdf.exe 5048 Payment_Advice.pdf.exe 5048 Payment_Advice.pdf.exe 4348 msiexec.exe 4348 msiexec.exe 4348 msiexec.exe 4348 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5048 Payment_Advice.pdf.exe Token: SeDebugPrivilege 4348 msiexec.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4588 wrote to memory of 5048 4588 Payment_Advice.pdf.exe 90 PID 4588 wrote to memory of 5048 4588 Payment_Advice.pdf.exe 90 PID 4588 wrote to memory of 5048 4588 Payment_Advice.pdf.exe 90 PID 4588 wrote to memory of 5048 4588 Payment_Advice.pdf.exe 90 PID 4588 wrote to memory of 5048 4588 Payment_Advice.pdf.exe 90 PID 4588 wrote to memory of 5048 4588 Payment_Advice.pdf.exe 90 PID 3092 wrote to memory of 4348 3092 Explorer.EXE 91 PID 3092 wrote to memory of 4348 3092 Explorer.EXE 91 PID 3092 wrote to memory of 4348 3092 Explorer.EXE 91 PID 4348 wrote to memory of 5024 4348 msiexec.exe 92 PID 4348 wrote to memory of 5024 4348 msiexec.exe 92 PID 4348 wrote to memory of 5024 4348 msiexec.exe 92
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Users\Admin\AppData\Local\Temp\Payment_Advice.pdf.exe"C:\Users\Admin\AppData\Local\Temp\Payment_Advice.pdf.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Users\Admin\AppData\Local\Temp\Payment_Advice.pdf.exe"C:\Users\Admin\AppData\Local\Temp\Payment_Advice.pdf.exe"3⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:5048
-
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:5024
-
-