Analysis
-
max time kernel
1200s -
max time network
1200s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2022, 08:40
Static task
static1
Behavioral task
behavioral1
Sample
Invoice.exe
Resource
win7-20220812-en
General
-
Target
Invoice.exe
-
Size
1.1MB
-
MD5
fb009fdbd8542d823c4cc9fb02ecc6dc
-
SHA1
76837f628081a7e7f620de9d44c92ead052efe46
-
SHA256
527d523ec8da849e44e381f4cd8feaa74af309972ef59d505193cf56f8223fb1
-
SHA512
637e8a164ca98b0d5187030ce6eebdd2297efbe8ac4dcf2aaa27f003fae23778c8f3547b4bea4504ec7660de00cbe818f96bcddc56dd7c281af1b9bf97707e4c
-
SSDEEP
24576:QxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxNussxvfCBBVa:5vfovu8yBthQoJFdj
Malware Config
Extracted
formbook
xoqd
H5Xrxamh0f+N/tax
kD7yxmoTHSewkFqlnqV14wuw
RLsWzULVoCMc+A==
SOzPYHAMr8HKhU4b3XZSPb+gnUc=
Li195vujSFxYOpMGx2n2
kH4rLttwbW703GwH2z4=
uWRYsosnwsGcigoCt4ePgDDQZzr3d9ST
OrIL0WgG9VNBHvP2lkE1vnt0oE0=
NG2ALNd/l8Mw4WwH2z4=
VgnfELdrcdvMsD0uz3t3gBWUyas7gw==
DxNwymeJ/lPRqndL+WzAVUy4
mYxRaXV1X6WuqB4Op2d5MgrgIg==
8Um50qpVPodey2OVew==
irKA6NyNP0oxy2OVew==
KVo8zsszovt9JkmEbxfAVUy4
ZrSnCLtRSTV9Ujx9LigBEFq+
ty/Fn16LA2isSw5fYg==
MLFtv3Tmp+zu0Rr3nEhJLnt0oE0=
qTDnPBatWH9CF5jPvmhnVr+gnUc=
SXhRqlXv6M8V8d0hJ/93b/g=
zA0JiHcj8iMky2OVew==
cG4AlURs6uHMshcFoWl5MgrgIg==
MgTotpKOipMfAHNYtrSRWw==
0kQKUyjRksynhmqnWP93b/g=
Q3RO3ueRSFxWUL32vzkN/391gqo6gQ==
nsyhEeGp6g9+GTVvGgr5
hzgqr7iNa46KhPrlfjtJP8hKSaKvof0=
5p2U/rs35xUcBowLvjQ=
KjCuE6zYWk9vy2OVew==
/mzGnJm07yeTQx1yRQtqPeE=
b14GzHltitLojlk=
ObgiMe5hGTMy773GPxj/
aeRVNNR2gdLojlk=
tLlvQSpkrclSPBN0cBjAVUy4
VFW0G7XhVKVV/vO7
NXRQqnDve05Es7iTbA==
rz6vuqhU1z0sCsX/qVDL3Sfk54lniw==
YD+T7Zl8N5kI
TnosjPZn7uHsVV427amIWQ==
NlIBymMJ6ycqy2OVew==
hhBsXnOVyvVvWE2vlmxzbQeWyas7gw==
/3MdZRaZVpBiy2OVew==
Zbx1F58WoCMc+A==
W2C1ICOSBmfHpmh9NhH9
oF2zbPOTWtLojlk=
HmhixGzbdnVJMKqZ7+7asi809UAJwPU=
241xwZk14xr218MAixmxHlYtyas7gw==
0BPxbW4gx8yqivbitUoUf2yeZjr3d9ST
PT702p62HWDAo9SQoVT6
sVfk8r6Uw78+KxtrPMyVkFQVSIsR
tJZFFPoxieJULWxdtrSRWw==
3Rz6eYAOQYBK9w==
+56G+LUb1a30zskhwqOXTA==
r7AavTTQoCMc+A==
w5h4foux5RaZiH/buTL69oggL6Kvof0=
62UNajje2D85KBFOCevfsXE9ZJYb
7GQbayvRz9Ml12wH2z4=
t1S9j3mWy9Y2s7iTbA==
BYHj6tOOLYPdt7bGPxj/
ofDXNfuZhG23ZjqHcxzAVUy4
vTizr4g4/iH4o+1BGp0eJ64rRgDFcc6F
JJb0xHeqq7Q=
sPvxjaZQDzQW+GFP97ygMgrgIg==
tKX1WGoToCMc+A==
tbwtaobao.org
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3932 gjohsxap02tq4y8.exe 1692 gjohsxap02tq4y8.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Invoice.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \Registry\Machine\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\7NQLPZLHB4 = "C:\\Program Files (x86)\\Jynj4ane0\\gjohsxap02tq4y8.exe" msiexec.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4940 set thread context of 2392 4940 Invoice.exe 90 PID 2392 set thread context of 3048 2392 Invoice.exe 52 PID 816 set thread context of 3048 816 msiexec.exe 52 PID 3932 set thread context of 1692 3932 gjohsxap02tq4y8.exe 94 -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Jynj4ane0\gjohsxap02tq4y8.exe msiexec.exe File opened for modification C:\Program Files (x86)\Jynj4ane0 Explorer.EXE File created C:\Program Files (x86)\Jynj4ane0\gjohsxap02tq4y8.exe Explorer.EXE File opened for modification C:\Program Files (x86)\Jynj4ane0\gjohsxap02tq4y8.exe Explorer.EXE -
description ioc Process Key created \Registry\User\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 msiexec.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2392 Invoice.exe 2392 Invoice.exe 2392 Invoice.exe 2392 Invoice.exe 2392 Invoice.exe 2392 Invoice.exe 2392 Invoice.exe 2392 Invoice.exe 816 msiexec.exe 816 msiexec.exe 816 msiexec.exe 816 msiexec.exe 816 msiexec.exe 816 msiexec.exe 816 msiexec.exe 816 msiexec.exe 816 msiexec.exe 816 msiexec.exe 816 msiexec.exe 816 msiexec.exe 816 msiexec.exe 816 msiexec.exe 816 msiexec.exe 816 msiexec.exe 816 msiexec.exe 816 msiexec.exe 816 msiexec.exe 816 msiexec.exe 816 msiexec.exe 816 msiexec.exe 816 msiexec.exe 816 msiexec.exe 816 msiexec.exe 816 msiexec.exe 816 msiexec.exe 816 msiexec.exe 816 msiexec.exe 816 msiexec.exe 816 msiexec.exe 816 msiexec.exe 816 msiexec.exe 816 msiexec.exe 816 msiexec.exe 816 msiexec.exe 816 msiexec.exe 816 msiexec.exe 816 msiexec.exe 816 msiexec.exe 816 msiexec.exe 816 msiexec.exe 816 msiexec.exe 816 msiexec.exe 816 msiexec.exe 816 msiexec.exe 816 msiexec.exe 816 msiexec.exe 816 msiexec.exe 816 msiexec.exe 816 msiexec.exe 816 msiexec.exe 816 msiexec.exe 816 msiexec.exe 816 msiexec.exe 816 msiexec.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3048 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 2392 Invoice.exe 2392 Invoice.exe 2392 Invoice.exe 816 msiexec.exe 816 msiexec.exe 816 msiexec.exe 816 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeDebugPrivilege 2392 Invoice.exe Token: SeDebugPrivilege 816 msiexec.exe Token: SeShutdownPrivilege 3048 Explorer.EXE Token: SeCreatePagefilePrivilege 3048 Explorer.EXE Token: SeShutdownPrivilege 3048 Explorer.EXE Token: SeCreatePagefilePrivilege 3048 Explorer.EXE Token: SeShutdownPrivilege 3048 Explorer.EXE Token: SeCreatePagefilePrivilege 3048 Explorer.EXE Token: SeShutdownPrivilege 3048 Explorer.EXE Token: SeCreatePagefilePrivilege 3048 Explorer.EXE Token: SeDebugPrivilege 1692 gjohsxap02tq4y8.exe Token: SeShutdownPrivilege 3048 Explorer.EXE Token: SeCreatePagefilePrivilege 3048 Explorer.EXE Token: SeShutdownPrivilege 3048 Explorer.EXE Token: SeCreatePagefilePrivilege 3048 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3048 Explorer.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4940 wrote to memory of 2392 4940 Invoice.exe 90 PID 4940 wrote to memory of 2392 4940 Invoice.exe 90 PID 4940 wrote to memory of 2392 4940 Invoice.exe 90 PID 4940 wrote to memory of 2392 4940 Invoice.exe 90 PID 4940 wrote to memory of 2392 4940 Invoice.exe 90 PID 4940 wrote to memory of 2392 4940 Invoice.exe 90 PID 3048 wrote to memory of 816 3048 Explorer.EXE 91 PID 3048 wrote to memory of 816 3048 Explorer.EXE 91 PID 3048 wrote to memory of 816 3048 Explorer.EXE 91 PID 816 wrote to memory of 4012 816 msiexec.exe 92 PID 816 wrote to memory of 4012 816 msiexec.exe 92 PID 816 wrote to memory of 4012 816 msiexec.exe 92 PID 3048 wrote to memory of 3932 3048 Explorer.EXE 93 PID 3048 wrote to memory of 3932 3048 Explorer.EXE 93 PID 3048 wrote to memory of 3932 3048 Explorer.EXE 93 PID 3932 wrote to memory of 1692 3932 gjohsxap02tq4y8.exe 94 PID 3932 wrote to memory of 1692 3932 gjohsxap02tq4y8.exe 94 PID 3932 wrote to memory of 1692 3932 gjohsxap02tq4y8.exe 94 PID 3932 wrote to memory of 1692 3932 gjohsxap02tq4y8.exe 94 PID 3932 wrote to memory of 1692 3932 gjohsxap02tq4y8.exe 94 PID 3932 wrote to memory of 1692 3932 gjohsxap02tq4y8.exe 94
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Drops file in Program Files directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\Invoice.exe"C:\Users\Admin\AppData\Local\Temp\Invoice.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\Invoice.exe"C:\Users\Admin\AppData\Local\Temp\Invoice.exe"3⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2392
-
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:4012
-
-
-
C:\Program Files (x86)\Jynj4ane0\gjohsxap02tq4y8.exe"C:\Program Files (x86)\Jynj4ane0\gjohsxap02tq4y8.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Program Files (x86)\Jynj4ane0\gjohsxap02tq4y8.exe"C:\Program Files (x86)\Jynj4ane0\gjohsxap02tq4y8.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1692
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5f308eb7c798f843c7a3d37d28f9af637
SHA138506955b3972ba3b76c85e8a06e060fdb8fd035
SHA2567f570c49739babdc7e61bf275cc98414d278144b0af6a275f39004f6bd18f149
SHA5127d75ec67fae66b6ea086b813a17ac8a7236967108150a3139a146262652615b3656984e2a1c832b97b39ad4d28e4c389342c396ad0cc1cf8416a90209b62e1f7
-
Filesize
1.1MB
MD5f308eb7c798f843c7a3d37d28f9af637
SHA138506955b3972ba3b76c85e8a06e060fdb8fd035
SHA2567f570c49739babdc7e61bf275cc98414d278144b0af6a275f39004f6bd18f149
SHA5127d75ec67fae66b6ea086b813a17ac8a7236967108150a3139a146262652615b3656984e2a1c832b97b39ad4d28e4c389342c396ad0cc1cf8416a90209b62e1f7
-
Filesize
1.1MB
MD5f308eb7c798f843c7a3d37d28f9af637
SHA138506955b3972ba3b76c85e8a06e060fdb8fd035
SHA2567f570c49739babdc7e61bf275cc98414d278144b0af6a275f39004f6bd18f149
SHA5127d75ec67fae66b6ea086b813a17ac8a7236967108150a3139a146262652615b3656984e2a1c832b97b39ad4d28e4c389342c396ad0cc1cf8416a90209b62e1f7