Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
06/10/2022, 10:00
Static task
static1
Behavioral task
behavioral1
Sample
PAYMENT SWIFT.jar
Resource
win7-20220812-en
General
-
Target
PAYMENT SWIFT.jar
-
Size
81KB
-
MD5
5f49f9e0adbfb9aa8a3001511918e219
-
SHA1
3f5e25c46c605fa5e9e2681b1a7e3003802580e3
-
SHA256
2a6d83a4c367c9f0d23874ee32aa05c30e5d80e13d4b9d7d31ac5f7b0308eeff
-
SHA512
28d60b13919bfb812e7c99b63edd558b2e6a05c27b1dae9bd4dbaf6aa0c6a5942ddd0f553bf2f909cf18380b3e2e0e6ca8acca661e1cd905ba217a95a75948c8
-
SSDEEP
1536:yEru81UBVOdxyo5g8puLyGuB/+78WSrjHynsrHYtHSyDMmFeWuaWvVGApDt7p+zL:frueUBWW8pFHBkCnWAYVS+MautkApDtU
Malware Config
Signatures
-
Blocklisted process makes network request 5 IoCs
flow pid Process 15 4468 WScript.exe 30 4468 WScript.exe 39 4468 WScript.exe 42 4468 WScript.exe 44 4468 WScript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\aoGofoNzDc.js WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\aoGofoNzDc.js WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings wscript.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1960 javaw.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4060 wrote to memory of 984 4060 java.exe 84 PID 4060 wrote to memory of 984 4060 java.exe 84 PID 984 wrote to memory of 4468 984 wscript.exe 85 PID 984 wrote to memory of 4468 984 wscript.exe 85 PID 984 wrote to memory of 1960 984 wscript.exe 86 PID 984 wrote to memory of 1960 984 wscript.exe 86
Processes
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar "C:\Users\Admin\AppData\Local\Temp\PAYMENT SWIFT.jar"1⤵
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Windows\SYSTEM32\wscript.exewscript C:\Users\Admin\cbnyinpadw.js2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:984 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\aoGofoNzDc.js"3⤵
- Blocklisted process makes network request
- Drops startup file
PID:4468
-
-
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\skkgwpkkik.txt"3⤵
- Suspicious use of SetWindowsHookEx
PID:1960
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50B
MD5738d7d27508a452a4aa25f30506f986a
SHA13203600645aa3937e706d5d94fc3d83203110b42
SHA256e28bd8c68606b65ee7767c4143588ad50e15067b2195b9d25f06c1c578559e89
SHA5128e475470061e223575d481625c1cf9b927780e07685a6bedb24812437e975f3a4ba4e191969f387ed9f479e08bce94609433e2845dee59614ef0e43d156108a4
-
Filesize
11KB
MD565fb6591e57956055eab89244ba308d0
SHA17f75b5418092875e5b637db3bba5fa7e95def85b
SHA2563be47fb6fc32f47c2acffff45389c6320f1d105a21afe00682fd3cef2eaadebe
SHA512fff6080536f5ec311834ebaf240a0db820609f532def00a90da86ac4237a245dcd46f4152710886ac7b472e91829d815fa9c00c730f7d3d090bb4491e4d97df1
-
Filesize
51KB
MD5c1783ea3118978252aa6c8891d0ea61c
SHA19986142768fd83fb445f8ac6dfd196aba3fb3139
SHA25623b78abed63ac1a61a43873aa4bc168f30a4bef0e1fa9132a89f479c02805855
SHA5126a22b6683589c981eaa8d1aad2bfaffc06789ec9671b3a6ec6b7279f4fcbaf6d2c1b1bf8ed3ffb047a86e711294d66b532d313805b4973566afd27b2fc182006
-
Filesize
130KB
MD56b953009e26aa623b6e644bfb8bcdbcd
SHA1ba8466a391ef31e1f5dd2e14e714ea4b46236098
SHA256b85406c325c6249bb8442256152056e89e270cc14c430ba7c2aa35d0289dddf2
SHA512b8923f09990134ab8587df0f84b290a381e409dbe2a448e9a48b482ada8162524ef1bd5ce81bf13200cd4a22d487882f8f2218a81787b5e04cd4d5d624a2a6ae