Analysis
-
max time kernel
244s -
max time network
334s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
07-12-2022 19:47
Static task
static1
Behavioral task
behavioral1
Sample
Payment Advice - Advice Ref A1T4C80vSIxi ACH credits Customer Ref1093817130.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Payment Advice - Advice Ref A1T4C80vSIxi ACH credits Customer Ref1093817130.exe
Resource
win10v2004-20221111-en
General
-
Target
Payment Advice - Advice Ref A1T4C80vSIxi ACH credits Customer Ref1093817130.exe
-
Size
1.0MB
-
MD5
af4c90f16183a6ad67d309954e852c8a
-
SHA1
4b8612090c079bf462c55e774c7199d4f182e937
-
SHA256
e42dddf5106613702329f2fa39feac15baee21cd5b543d288dc82ed621eb7037
-
SHA512
c335c1ab1b2708530424dc094a9b864155275e4d462bf726b38338b9c33f6942c355b9092fa786bf1a20f99c7ac52b4c03e399ff5ab157fff556480db15fc823
-
SSDEEP
12288:0oQgKZ/nXt7virmWhlGLaQYIyzYEmgX/Lifi1SXAe73hdw7YVCiJM2dycvQ0piws:fPNNwAe7x78OQ0Hx4xUhlWp
Malware Config
Extracted
formbook
m9ae
nWTQpX6TYm6dfT3Lcw==
7JaBLgMm8EKn2AlTy5Ksj4Jq
yWRJIhE3viQgqEpZS3o=
ES9dFo0bytF8vlvRcg==
aX/aBZn29pD+cg==
lU64sYOZV7ZVpUy1ag==
9BpOCYAPv8L8TyIFAiTp2PSqLg==
uEJ2RyQ1BcBXfFr8kT5Z1KV0
oVM42Ury9pD+cg==
0Zl3VkcuKaY+
OjZeGI8dw67Z6eWtnOoBfoI=
ytwFn9j4i+N8nKYRSgcfh3xn5LU=
xMb1+YkOyxmbxJ53JsP7Pg==
HODQpzTBS1gVoi4X0hStKQ==
fQ417ycwD+ziKt1u0hStKQ==
nsApOqE62sA8uS735uCXVP+YcrQ=
4aobG3oZ3AHqTPs=
P2LEwJatZbQZUTayTW0=
/bopO7NR6clCfT3Lcw==
bBxRRkFY01R+20pZS3o=
enylSY//R0Euo5Hc
s3hoHGn+blzIzLD2XcWsj4Jq
MvZlcWyHEnNHRGHB
qDJgM38Zlp2BriDZBnI=
JlaRDbpPJo43fT3Lcw==
aZgM/YERpLJOfT3Lcw==
dgcdTgcuKaY+
N12TQ5X0uI7/dA==
85d5Cn4gEuXNHOY=
XGyjNRUvzkzpFEb98NiZYf+YcrQ=
nUc1kamtJHlHRGHB
M+1WZ6NvT6VHRGHB
k1iSQqU6E3biHW3Ev1x/
yoeZZ9suKaY+
yiqErKzdOA==
I8FYQ4Mx9pD+cg==
e3sMggibmaRHRGHB
YBxPTjVYD4c2WVRYdfxP9f/w5W+IU0g=
A6GFXmNsA4y3ByPuEXU=
RkSck9R+79lCe5vEv1x/
c4Hf8OWx18LuWN4pPnA=
IK6UOZcpvKTL2/PbBHI=
dpbLY0FV8mxHRGHB
RoTt48Dgi/aZtJ/Ev1x/
4/FRPhpH3TPGD0uYB7Yf2PSqLg==
5A5CBZYyzanG52lgk7V7K8G4gdDu5w==
p8IpCMzdxqyj2UpZS3o=
cToa+3QRpLJOfT3Lcw==
Lat9/Yk19pD+cg==
CrjklYWQN6tXfIjEv1x/
SfQyB+TxpJSt20pZS3o=
eTEdrAOeVYJ4Cx6WSxqnYGgz01Yv7w==
NP7rnOJz7QXxQfk=
hrYdLa1V+exp20UX0hStKQ==
R+gl+MvhTQHqTPs=
CC6YqK+3hWJYpEseExvt2PSqLg==
VmybWD1f6EIreDUVP47Yw5la3rI=
Sgv5moChVKcQSZYjwYWyvbeuMw==
rtxt7QYo5mxHRGHB
cH/l/4Ecn61OfT3Lcw==
T4iddmuQEGhd1NwMviZm
cyH/sQGRb8s6e5vEv1x/
Y3DL3M3XS86ftJ7Ev1x/
U2jGyqnCYcDDJt3mAjZDxf+YcrQ=
spirituallyzen.com
Extracted
xloader
3.Æ…
m9ae
nWTQpX6TYm6dfT3Lcw==
7JaBLgMm8EKn2AlTy5Ksj4Jq
yWRJIhE3viQgqEpZS3o=
ES9dFo0bytF8vlvRcg==
aX/aBZn29pD+cg==
lU64sYOZV7ZVpUy1ag==
9BpOCYAPv8L8TyIFAiTp2PSqLg==
uEJ2RyQ1BcBXfFr8kT5Z1KV0
oVM42Ury9pD+cg==
0Zl3VkcuKaY+
OjZeGI8dw67Z6eWtnOoBfoI=
ytwFn9j4i+N8nKYRSgcfh3xn5LU=
xMb1+YkOyxmbxJ53JsP7Pg==
HODQpzTBS1gVoi4X0hStKQ==
fQ417ycwD+ziKt1u0hStKQ==
nsApOqE62sA8uS735uCXVP+YcrQ=
4aobG3oZ3AHqTPs=
P2LEwJatZbQZUTayTW0=
/bopO7NR6clCfT3Lcw==
bBxRRkFY01R+20pZS3o=
enylSY//R0Euo5Hc
s3hoHGn+blzIzLD2XcWsj4Jq
MvZlcWyHEnNHRGHB
qDJgM38Zlp2BriDZBnI=
JlaRDbpPJo43fT3Lcw==
aZgM/YERpLJOfT3Lcw==
dgcdTgcuKaY+
N12TQ5X0uI7/dA==
85d5Cn4gEuXNHOY=
XGyjNRUvzkzpFEb98NiZYf+YcrQ=
nUc1kamtJHlHRGHB
M+1WZ6NvT6VHRGHB
k1iSQqU6E3biHW3Ev1x/
yoeZZ9suKaY+
yiqErKzdOA==
I8FYQ4Mx9pD+cg==
e3sMggibmaRHRGHB
YBxPTjVYD4c2WVRYdfxP9f/w5W+IU0g=
A6GFXmNsA4y3ByPuEXU=
RkSck9R+79lCe5vEv1x/
c4Hf8OWx18LuWN4pPnA=
IK6UOZcpvKTL2/PbBHI=
dpbLY0FV8mxHRGHB
RoTt48Dgi/aZtJ/Ev1x/
4/FRPhpH3TPGD0uYB7Yf2PSqLg==
5A5CBZYyzanG52lgk7V7K8G4gdDu5w==
p8IpCMzdxqyj2UpZS3o=
cToa+3QRpLJOfT3Lcw==
Lat9/Yk19pD+cg==
CrjklYWQN6tXfIjEv1x/
SfQyB+TxpJSt20pZS3o=
eTEdrAOeVYJ4Cx6WSxqnYGgz01Yv7w==
NP7rnOJz7QXxQfk=
hrYdLa1V+exp20UX0hStKQ==
R+gl+MvhTQHqTPs=
CC6YqK+3hWJYpEseExvt2PSqLg==
VmybWD1f6EIreDUVP47Yw5la3rI=
Sgv5moChVKcQSZYjwYWyvbeuMw==
rtxt7QYo5mxHRGHB
cH/l/4Ecn61OfT3Lcw==
T4iddmuQEGhd1NwMviZm
cyH/sQGRb8s6e5vEv1x/
Y3DL3M3XS86ftJ7Ev1x/
U2jGyqnCYcDDJt3mAjZDxf+YcrQ=
spirituallyzen.com
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Payment Advice - Advice Ref A1T4C80vSIxi ACH credits Customer Ref1093817130.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Control Panel\International\Geo\Nation Payment Advice - Advice Ref A1T4C80vSIxi ACH credits Customer Ref1093817130.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
Payment Advice - Advice Ref A1T4C80vSIxi ACH credits Customer Ref1093817130.exePayment Advice - Advice Ref A1T4C80vSIxi ACH credits Customer Ref1093817130.exewlanext.exedescription pid process target process PID 432 set thread context of 1400 432 Payment Advice - Advice Ref A1T4C80vSIxi ACH credits Customer Ref1093817130.exe Payment Advice - Advice Ref A1T4C80vSIxi ACH credits Customer Ref1093817130.exe PID 1400 set thread context of 1212 1400 Payment Advice - Advice Ref A1T4C80vSIxi ACH credits Customer Ref1093817130.exe Explorer.EXE PID 1400 set thread context of 1212 1400 Payment Advice - Advice Ref A1T4C80vSIxi ACH credits Customer Ref1093817130.exe Explorer.EXE PID 1412 set thread context of 1212 1412 wlanext.exe Explorer.EXE -
Processes:
wlanext.exedescription ioc process Key created \Registry\User\S-1-5-21-1214520366-621468234-4062160515-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 wlanext.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
Payment Advice - Advice Ref A1T4C80vSIxi ACH credits Customer Ref1093817130.exewlanext.exepid process 1400 Payment Advice - Advice Ref A1T4C80vSIxi ACH credits Customer Ref1093817130.exe 1400 Payment Advice - Advice Ref A1T4C80vSIxi ACH credits Customer Ref1093817130.exe 1400 Payment Advice - Advice Ref A1T4C80vSIxi ACH credits Customer Ref1093817130.exe 1400 Payment Advice - Advice Ref A1T4C80vSIxi ACH credits Customer Ref1093817130.exe 1400 Payment Advice - Advice Ref A1T4C80vSIxi ACH credits Customer Ref1093817130.exe 1412 wlanext.exe 1412 wlanext.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 1212 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
Payment Advice - Advice Ref A1T4C80vSIxi ACH credits Customer Ref1093817130.exewlanext.exepid process 1400 Payment Advice - Advice Ref A1T4C80vSIxi ACH credits Customer Ref1093817130.exe 1400 Payment Advice - Advice Ref A1T4C80vSIxi ACH credits Customer Ref1093817130.exe 1400 Payment Advice - Advice Ref A1T4C80vSIxi ACH credits Customer Ref1093817130.exe 1400 Payment Advice - Advice Ref A1T4C80vSIxi ACH credits Customer Ref1093817130.exe 1412 wlanext.exe 1412 wlanext.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Payment Advice - Advice Ref A1T4C80vSIxi ACH credits Customer Ref1093817130.exewlanext.exedescription pid process Token: SeDebugPrivilege 1400 Payment Advice - Advice Ref A1T4C80vSIxi ACH credits Customer Ref1093817130.exe Token: SeDebugPrivilege 1412 wlanext.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
Payment Advice - Advice Ref A1T4C80vSIxi ACH credits Customer Ref1093817130.exePayment Advice - Advice Ref A1T4C80vSIxi ACH credits Customer Ref1093817130.exedescription pid process target process PID 432 wrote to memory of 1400 432 Payment Advice - Advice Ref A1T4C80vSIxi ACH credits Customer Ref1093817130.exe Payment Advice - Advice Ref A1T4C80vSIxi ACH credits Customer Ref1093817130.exe PID 432 wrote to memory of 1400 432 Payment Advice - Advice Ref A1T4C80vSIxi ACH credits Customer Ref1093817130.exe Payment Advice - Advice Ref A1T4C80vSIxi ACH credits Customer Ref1093817130.exe PID 432 wrote to memory of 1400 432 Payment Advice - Advice Ref A1T4C80vSIxi ACH credits Customer Ref1093817130.exe Payment Advice - Advice Ref A1T4C80vSIxi ACH credits Customer Ref1093817130.exe PID 432 wrote to memory of 1400 432 Payment Advice - Advice Ref A1T4C80vSIxi ACH credits Customer Ref1093817130.exe Payment Advice - Advice Ref A1T4C80vSIxi ACH credits Customer Ref1093817130.exe PID 432 wrote to memory of 1400 432 Payment Advice - Advice Ref A1T4C80vSIxi ACH credits Customer Ref1093817130.exe Payment Advice - Advice Ref A1T4C80vSIxi ACH credits Customer Ref1093817130.exe PID 432 wrote to memory of 1400 432 Payment Advice - Advice Ref A1T4C80vSIxi ACH credits Customer Ref1093817130.exe Payment Advice - Advice Ref A1T4C80vSIxi ACH credits Customer Ref1093817130.exe PID 432 wrote to memory of 1400 432 Payment Advice - Advice Ref A1T4C80vSIxi ACH credits Customer Ref1093817130.exe Payment Advice - Advice Ref A1T4C80vSIxi ACH credits Customer Ref1093817130.exe PID 1400 wrote to memory of 1412 1400 Payment Advice - Advice Ref A1T4C80vSIxi ACH credits Customer Ref1093817130.exe wlanext.exe PID 1400 wrote to memory of 1412 1400 Payment Advice - Advice Ref A1T4C80vSIxi ACH credits Customer Ref1093817130.exe wlanext.exe PID 1400 wrote to memory of 1412 1400 Payment Advice - Advice Ref A1T4C80vSIxi ACH credits Customer Ref1093817130.exe wlanext.exe PID 1400 wrote to memory of 1412 1400 Payment Advice - Advice Ref A1T4C80vSIxi ACH credits Customer Ref1093817130.exe wlanext.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Users\Admin\AppData\Local\Temp\Payment Advice - Advice Ref A1T4C80vSIxi ACH credits Customer Ref1093817130.exe"C:\Users\Admin\AppData\Local\Temp\Payment Advice - Advice Ref A1T4C80vSIxi ACH credits Customer Ref1093817130.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Payment Advice - Advice Ref A1T4C80vSIxi ACH credits Customer Ref1093817130.exe"C:\Users\Admin\AppData\Local\Temp\Payment Advice - Advice Ref A1T4C80vSIxi ACH credits Customer Ref1093817130.exe"3⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"4⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/432-54-0x00000000012A0000-0x00000000013B2000-memory.dmpFilesize
1.1MB
-
memory/432-55-0x0000000076931000-0x0000000076933000-memory.dmpFilesize
8KB
-
memory/432-56-0x0000000000910000-0x0000000000926000-memory.dmpFilesize
88KB
-
memory/432-57-0x0000000000920000-0x000000000092E000-memory.dmpFilesize
56KB
-
memory/432-58-0x0000000007E40000-0x0000000007ED4000-memory.dmpFilesize
592KB
-
memory/432-59-0x0000000000AF0000-0x0000000000B4C000-memory.dmpFilesize
368KB
-
memory/1212-87-0x00000000073D0000-0x0000000007541000-memory.dmpFilesize
1.4MB
-
memory/1212-84-0x00000000073D0000-0x0000000007541000-memory.dmpFilesize
1.4MB
-
memory/1212-76-0x0000000004C20000-0x0000000004CF0000-memory.dmpFilesize
832KB
-
memory/1212-72-0x0000000006890000-0x00000000069D8000-memory.dmpFilesize
1.3MB
-
memory/1400-71-0x00000000000E0000-0x00000000000F0000-memory.dmpFilesize
64KB
-
memory/1400-63-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1400-68-0x0000000000401000-0x000000000042F000-memory.dmpFilesize
184KB
-
memory/1400-69-0x0000000000810000-0x0000000000B13000-memory.dmpFilesize
3.0MB
-
memory/1400-66-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1400-70-0x0000000000422000-0x0000000000424000-memory.dmpFilesize
8KB
-
memory/1400-64-0x00000000004012B0-mapping.dmp
-
memory/1400-74-0x0000000000422000-0x0000000000424000-memory.dmpFilesize
8KB
-
memory/1400-75-0x0000000000290000-0x00000000002A0000-memory.dmpFilesize
64KB
-
memory/1400-67-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1400-77-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1400-78-0x0000000000401000-0x000000000042F000-memory.dmpFilesize
184KB
-
memory/1400-60-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1400-61-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1412-81-0x0000000000080000-0x00000000000AD000-memory.dmpFilesize
180KB
-
memory/1412-82-0x00000000009A0000-0x0000000000CA3000-memory.dmpFilesize
3.0MB
-
memory/1412-83-0x0000000000CB0000-0x0000000000D3F000-memory.dmpFilesize
572KB
-
memory/1412-80-0x0000000000D80000-0x0000000000D96000-memory.dmpFilesize
88KB
-
memory/1412-86-0x0000000000080000-0x00000000000AD000-memory.dmpFilesize
180KB
-
memory/1412-79-0x0000000000000000-mapping.dmp