Analysis
-
max time kernel
155s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2022, 07:27
Static task
static1
Behavioral task
behavioral1
Sample
Sales Receipt.exe
Resource
win7-20220812-en
General
-
Target
Sales Receipt.exe
-
Size
1.0MB
-
MD5
2a22e7d53faded181496ea4f181ffee0
-
SHA1
e185bfc39c1ac2633edbdb7ae2f9b3b9816aa11f
-
SHA256
24e086c1829385f3822044c7cdb533ba2f038cba1e088314b8f327f1e4616a75
-
SHA512
020306856b39f2b404fe0c55146f7ef536d03d820b21954e2bad958a78233ee49f693e6745d70150824ee8d2e52654b195a3571a49eddf17cad4d62d5a2df070
-
SSDEEP
12288:p3w+fwM6nMWJzbLbYHYYr9esd30+C/qt91UwN50CdcmbEqGT9KPva2GCqM:pgCqnJzbLbYHYYrHeMt91UwXPiToKZM
Malware Config
Extracted
formbook
t0uu
5qf0rEhPb4XZWXWEeURMYdG0c9s=
O8SURu/l0MHyf0tJUvLv7/WeRZXa
kZFzJB1AQJ3u0Fz27XTVZwM/RkGYzg==
MDw73V1hMFIUBiQdlBeaxgH6
fkX6oKn0/KQs1hUtH+WPrlg=
oVfkjYXcrlc=
YCJK+qt7C69/cnU4
EQtrDR+oQ4ELH24Gydpl2g==
u6tyBpCHeEwQymzoyF/lJ/1XQcpxdKpG
4tWPLz2FXGjxpkbh6A==
JBa40XxOrAHM
CMHznifqehEi2+C0WCAkjnG/na/Y
jDVN5WoRlvV/cnU4
nJu0YQw28gJM0psiKd4/nxUms+AYgEs=
lHU12ew9HDMtGHwC8w==
SEy8YF/WbgHV2IwI9w==
nFqQTQAk3fGvbmMXvotnsZgu6gl9xA==
kD7Pf5IhdrN/cnU4
Mje0add7KHqYjq9xOBMFbWS/na/Y
FMU92tVWrscB7HkLBYzobhHIVtE=
MSNfGZSCSmI47CE=
HCN/kTEq1XZv+jY=
6upmIk3VcAsb04H/BM9BumF4DDuJgzeQEw==
uIdqA9xIvAHK
04Ui3QJn13qSUBeuXVrQN6rJkQ==
8eWWTVPZMomXTYL+8w==
fz0YtTtCFy937kzWmBud
bxepSz++DVtw+30Fs4X1d08=
bWCiUIoGcTsMjg==
7fL4mwz5qba9aYE1/Q==
sGRhd4L2Hc/D
WlUzD8R+whXU
paGoT+mhzvs//WukbfDcGOhJYxtPlvSIDg==
g0HckZ8qeMfjZON3dg5w9I+miI9XBZVRGw==
PUBmE6dw2Og65CI4I+WPrlg=
OEPit4JepUVLCWPw6g==
VRHJcXvkp/VEOvBC6w==
dx+RPWLBQOnfVO2IgRqGtvy/na/Y
Xh7LgYIPYIfaCWPw6g==
ol0duEvoetKeVFkszmI7W9G0c9s=
LCX5uOGExKHhHyno8pGCthEoCl1uI0M=
//9e9vFqttFlGYH08w==
5qDZep0jvhYOCWPw6g==
lEWLNKplviYpqTm7MqiSJVE=
JjG9UQPj03u9aYE1/Q==
rqOWPcvasYyCPNIw
w6duG+I9D71/cnU4
3dfIe2s3AlbklwjG0aCI
zsKtQ/If3AfLWdFWRMgooQYoBVnlolU=
UEk44H1zkDS+e5l8OrW7+X1sHoJ2IUM=
hG8v2/1TY7iLQ01CKK0=
l0lXBYyKpUnZWm3BfUgwzQ==
SDMDtMcLGrM48QsLEOWPrlg=
1siQSaKyvFQ=
LOGfSU+nbItH/PTxdPVFxw==
0MY75/9Roe+A/hLRhkcDHluUWuB4gzeQEw==
RgGJNDm7XQA1Nj8=
cGVI8OgrFjJudXwy/Q==
m4Eu1e84UjWKScxl73iJ3w==
pWJ7HrB0BVAVz2y7KelFxw==
rCo2IMKBpEk=
tIcKnkZQKX+9aYE1/Q==
PvEZx1kJgA3V2IwI9w==
XhplCHk1jfHrcx9f/ss3VQwImQ==
etherneteducation.online
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation Sales Receipt.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 5072 set thread context of 1876 5072 Sales Receipt.exe 83 PID 1876 set thread context of 376 1876 Sales Receipt.exe 12 PID 3416 set thread context of 376 3416 NETSTAT.EXE 12 -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 3416 NETSTAT.EXE -
description ioc Process Key created \Registry\User\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 NETSTAT.EXE -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 1876 Sales Receipt.exe 1876 Sales Receipt.exe 1876 Sales Receipt.exe 1876 Sales Receipt.exe 1876 Sales Receipt.exe 1876 Sales Receipt.exe 1876 Sales Receipt.exe 1876 Sales Receipt.exe 3416 NETSTAT.EXE 3416 NETSTAT.EXE 3416 NETSTAT.EXE 3416 NETSTAT.EXE 3416 NETSTAT.EXE 3416 NETSTAT.EXE 3416 NETSTAT.EXE 3416 NETSTAT.EXE 3416 NETSTAT.EXE 3416 NETSTAT.EXE 3416 NETSTAT.EXE 3416 NETSTAT.EXE 3416 NETSTAT.EXE 3416 NETSTAT.EXE 3416 NETSTAT.EXE 3416 NETSTAT.EXE 3416 NETSTAT.EXE 3416 NETSTAT.EXE 3416 NETSTAT.EXE 3416 NETSTAT.EXE 3416 NETSTAT.EXE 3416 NETSTAT.EXE 3416 NETSTAT.EXE 3416 NETSTAT.EXE 3416 NETSTAT.EXE 3416 NETSTAT.EXE 3416 NETSTAT.EXE 3416 NETSTAT.EXE 3416 NETSTAT.EXE 3416 NETSTAT.EXE 3416 NETSTAT.EXE 3416 NETSTAT.EXE 3416 NETSTAT.EXE 3416 NETSTAT.EXE 3416 NETSTAT.EXE 3416 NETSTAT.EXE 3416 NETSTAT.EXE 3416 NETSTAT.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 376 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 1876 Sales Receipt.exe 1876 Sales Receipt.exe 1876 Sales Receipt.exe 3416 NETSTAT.EXE 3416 NETSTAT.EXE 3416 NETSTAT.EXE 3416 NETSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1876 Sales Receipt.exe Token: SeDebugPrivilege 3416 NETSTAT.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 5072 wrote to memory of 1876 5072 Sales Receipt.exe 83 PID 5072 wrote to memory of 1876 5072 Sales Receipt.exe 83 PID 5072 wrote to memory of 1876 5072 Sales Receipt.exe 83 PID 5072 wrote to memory of 1876 5072 Sales Receipt.exe 83 PID 5072 wrote to memory of 1876 5072 Sales Receipt.exe 83 PID 5072 wrote to memory of 1876 5072 Sales Receipt.exe 83 PID 376 wrote to memory of 3416 376 Explorer.EXE 84 PID 376 wrote to memory of 3416 376 Explorer.EXE 84 PID 376 wrote to memory of 3416 376 Explorer.EXE 84 PID 3416 wrote to memory of 836 3416 NETSTAT.EXE 91 PID 3416 wrote to memory of 836 3416 NETSTAT.EXE 91 PID 3416 wrote to memory of 836 3416 NETSTAT.EXE 91
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Users\Admin\AppData\Local\Temp\Sales Receipt.exe"C:\Users\Admin\AppData\Local\Temp\Sales Receipt.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Users\Admin\AppData\Local\Temp\Sales Receipt.exe"C:\Users\Admin\AppData\Local\Temp\Sales Receipt.exe"3⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1876
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXE"C:\Windows\SysWOW64\NETSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- Gathers network information
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:836
-
-