Analysis
-
max time kernel
59s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25-01-2023 10:46
Static task
static1
Behavioral task
behavioral1
Sample
invoice and packing list.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
invoice and packing list.exe
Resource
win10v2004-20220901-en
General
-
Target
invoice and packing list.exe
-
Size
863KB
-
MD5
629650941c646616da246f363ac31b64
-
SHA1
61c75662747d73543a4fd4ef522fa4e1d68a2123
-
SHA256
5fd88707644b5c51752f574b44b60add5b279713e5fd1b47fe95f5cf97fa634e
-
SHA512
f762d0d13fdaf114e6e646686e7c425c015d1cec2dc3fa2207ed51cd1c1fc8c6e16dbfd85e52ea832c16ed5aa7cdc2e23a1cf1768e7743cd116290c6d5047c67
-
SSDEEP
24576:rVO8kyGyOMQzlG27ScBABcU9Ny6AAgZy:w8kypOMj27EcUry6Au
Malware Config
Signatures
-
Accesses Microsoft Outlook profiles ⋅ 1 TTPs 3 IoCs
TTPs:
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Adds Run key to start application ⋅ 2 TTPs 1 IoCs
Processes:
RegSvcs.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\zOwta = "C:\\Users\\Admin\\AppData\\Roaming\\zOwta\\zOwta.exe" RegSvcs.exe -
Looks up external IP address via web service ⋅ 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext ⋅ 1 IoCs
Processes:
invoice and packing list.exedescription pid process target process PID 1116 set thread context of 1700 1116 invoice and packing list.exe RegSvcs.exe -
Enumerates physical storage devices ⋅ 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) ⋅ 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses ⋅ 3 IoCs
Processes:
invoice and packing list.exepowershell.exepid process 1116 invoice and packing list.exe 1116 invoice and packing list.exe 2008 powershell.exe -
Suspicious use of AdjustPrivilegeToken ⋅ 3 IoCs
Processes:
invoice and packing list.exeRegSvcs.exepowershell.exedescription pid process Token: SeDebugPrivilege 1116 invoice and packing list.exe Token: SeDebugPrivilege 1700 RegSvcs.exe Token: SeDebugPrivilege 2008 powershell.exe -
Suspicious use of SetWindowsHookEx ⋅ 1 IoCs
Processes:
RegSvcs.exepid process 1700 RegSvcs.exe -
Suspicious use of WriteProcessMemory ⋅ 20 IoCs
Processes:
invoice and packing list.exedescription pid process target process PID 1116 wrote to memory of 2008 1116 invoice and packing list.exe powershell.exe PID 1116 wrote to memory of 2008 1116 invoice and packing list.exe powershell.exe PID 1116 wrote to memory of 2008 1116 invoice and packing list.exe powershell.exe PID 1116 wrote to memory of 2008 1116 invoice and packing list.exe powershell.exe PID 1116 wrote to memory of 1888 1116 invoice and packing list.exe schtasks.exe PID 1116 wrote to memory of 1888 1116 invoice and packing list.exe schtasks.exe PID 1116 wrote to memory of 1888 1116 invoice and packing list.exe schtasks.exe PID 1116 wrote to memory of 1888 1116 invoice and packing list.exe schtasks.exe PID 1116 wrote to memory of 1700 1116 invoice and packing list.exe RegSvcs.exe PID 1116 wrote to memory of 1700 1116 invoice and packing list.exe RegSvcs.exe PID 1116 wrote to memory of 1700 1116 invoice and packing list.exe RegSvcs.exe PID 1116 wrote to memory of 1700 1116 invoice and packing list.exe RegSvcs.exe PID 1116 wrote to memory of 1700 1116 invoice and packing list.exe RegSvcs.exe PID 1116 wrote to memory of 1700 1116 invoice and packing list.exe RegSvcs.exe PID 1116 wrote to memory of 1700 1116 invoice and packing list.exe RegSvcs.exe PID 1116 wrote to memory of 1700 1116 invoice and packing list.exe RegSvcs.exe PID 1116 wrote to memory of 1700 1116 invoice and packing list.exe RegSvcs.exe PID 1116 wrote to memory of 1700 1116 invoice and packing list.exe RegSvcs.exe PID 1116 wrote to memory of 1700 1116 invoice and packing list.exe RegSvcs.exe PID 1116 wrote to memory of 1700 1116 invoice and packing list.exe RegSvcs.exe -
outlook_office_path ⋅ 1 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path ⋅ 1 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\invoice and packing list.exe"C:\Users\Admin\AppData\Local\Temp\invoice and packing list.exe"Suspicious use of SetThreadContextSuspicious behavior: EnumeratesProcessesSuspicious use of AdjustPrivilegeTokenSuspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\JZJXVF.exe"Suspicious behavior: EnumeratesProcessesSuspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JZJXVF" /XML "C:\Users\Admin\AppData\Local\Temp\tmpDECC.tmp"Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Accesses Microsoft Outlook profilesAdds Run key to start applicationSuspicious use of AdjustPrivilegeTokenSuspicious use of SetWindowsHookExoutlook_office_pathoutlook_win_path
Network
MITRE ATT&CK Matrix
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Replay Monitor
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpDECC.tmpMD5
e8384c7feb63671bf3adc464e7fe8623
SHA148673166dac1d919647e88915c2a3d4b76bdfce1
SHA2560c885673641f60cfc8488e8b2e9017e1c71961f2c5af592d9628f5e9636aa171
SHA512f9b924e633108391b63183fbbdbf2cf38b374e4330935a0fff7d6e701772221002d381edb2660ef9178f54848dac8367ab74ebbe841a9a419673441598767d10
-
memory/1116-63-0x0000000000D40000-0x0000000000D72000-memory.dmp
-
memory/1116-55-0x0000000074FB1000-0x0000000074FB3000-memory.dmp
-
memory/1116-56-0x0000000000890000-0x00000000008A0000-memory.dmp
-
memory/1116-58-0x00000000053A0000-0x000000000540A000-memory.dmp
-
memory/1116-57-0x00000000008D0000-0x00000000008DA000-memory.dmp
-
memory/1116-54-0x0000000000FD0000-0x00000000010AE000-memory.dmp
-
memory/1700-70-0x000000000042AB8E-mapping.dmp
-
memory/1700-67-0x0000000000400000-0x0000000000430000-memory.dmp
-
memory/1700-68-0x0000000000400000-0x0000000000430000-memory.dmp
-
memory/1700-69-0x0000000000400000-0x0000000000430000-memory.dmp
-
memory/1700-65-0x0000000000400000-0x0000000000430000-memory.dmp
-
memory/1700-72-0x0000000000400000-0x0000000000430000-memory.dmp
-
memory/1700-74-0x0000000000400000-0x0000000000430000-memory.dmp
-
memory/1700-64-0x0000000000400000-0x0000000000430000-memory.dmp
-
memory/1888-60-0x0000000000000000-mapping.dmp
-
memory/2008-77-0x000000006E9A0000-0x000000006EF4B000-memory.dmp
-
memory/2008-59-0x0000000000000000-mapping.dmp
-
memory/2008-76-0x000000006E9A0000-0x000000006EF4B000-memory.dmp