Analysis
-
max time kernel
429s -
max time network
581s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-01-2023 19:33
Static task
static1
Behavioral task
behavioral1
Sample
Cancelar Factura.exe
Resource
win7-20221111-en
6 signatures
600 seconds
Behavioral task
behavioral2
Sample
Cancelar Factura.exe
Resource
win10v2004-20221111-en
6 signatures
600 seconds
General
-
Target
Cancelar Factura.exe
-
Size
2.9MB
-
MD5
5c3cb19563848d0bee7238a6bf55abc9
-
SHA1
766737ca6149bcd018ef7cfce49b3b90fe0325d9
-
SHA256
c1c7a5fe3203fe7ecd6b4581a12f85803174d5e2b8df2e98cccb8a5d740b1d36
-
SHA512
bbf31136b59edfc1c630a96e348a20d7f494e999534e19aea565ca9c2f074f27be8bac27ccf07165c5f025daa955741a131424250a543d83e6e46fed2af44341
-
SSDEEP
49152:Ofc6jhQyaOKBcZt7MUt0dfwwWC1R9Jbl8/u5K:O062yaOt
Score
10/10
Malware Config
Signatures
-
Bandook payload 4 IoCs
resource yara_rule behavioral1/memory/748-63-0x0000000013140000-0x0000000014009000-memory.dmp family_bandook behavioral1/memory/748-64-0x0000000013140000-0x0000000014009000-memory.dmp family_bandook behavioral1/memory/2008-72-0x0000000013140000-0x0000000014009000-memory.dmp family_bandook behavioral1/memory/2008-73-0x0000000013140000-0x0000000014009000-memory.dmp family_bandook -
resource yara_rule behavioral1/memory/748-60-0x0000000013140000-0x0000000014009000-memory.dmp upx behavioral1/memory/748-62-0x0000000013140000-0x0000000014009000-memory.dmp upx behavioral1/memory/748-63-0x0000000013140000-0x0000000014009000-memory.dmp upx behavioral1/memory/748-64-0x0000000013140000-0x0000000014009000-memory.dmp upx behavioral1/memory/2008-72-0x0000000013140000-0x0000000014009000-memory.dmp upx behavioral1/memory/2008-73-0x0000000013140000-0x0000000014009000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run msinfo32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\QPW = "C:\\Users\\Admin\\AppData\\Roaming\\QPW\\QPW.exe" msinfo32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 748 msinfo32.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 792 wrote to memory of 748 792 Cancelar Factura.exe 28 PID 792 wrote to memory of 748 792 Cancelar Factura.exe 28 PID 792 wrote to memory of 748 792 Cancelar Factura.exe 28 PID 792 wrote to memory of 748 792 Cancelar Factura.exe 28 PID 792 wrote to memory of 524 792 Cancelar Factura.exe 29 PID 792 wrote to memory of 524 792 Cancelar Factura.exe 29 PID 792 wrote to memory of 524 792 Cancelar Factura.exe 29 PID 792 wrote to memory of 524 792 Cancelar Factura.exe 29 PID 792 wrote to memory of 748 792 Cancelar Factura.exe 28 PID 792 wrote to memory of 748 792 Cancelar Factura.exe 28 PID 524 wrote to memory of 2008 524 Cancelar Factura.exe 30 PID 524 wrote to memory of 2008 524 Cancelar Factura.exe 30 PID 524 wrote to memory of 2008 524 Cancelar Factura.exe 30 PID 524 wrote to memory of 2008 524 Cancelar Factura.exe 30 PID 524 wrote to memory of 2008 524 Cancelar Factura.exe 30 PID 524 wrote to memory of 2008 524 Cancelar Factura.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Cancelar Factura.exe"C:\Users\Admin\AppData\Local\Temp\Cancelar Factura.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:792 -
C:\windows\syswow64\msinfo32.exeC:\windows\syswow64\msinfo32.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:748
-
-
C:\Users\Admin\AppData\Local\Temp\Cancelar Factura.exe"C:\Users\Admin\AppData\Local\Temp\Cancelar Factura.exe" ooooooooooooooo2⤵
- Suspicious use of WriteProcessMemory
PID:524 -
C:\windows\syswow64\msinfo32.exeC:\windows\syswow64\msinfo32.exe3⤵
- Adds Run key to start application
PID:2008
-
-