Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
13/03/2023, 09:33
Static task
static1
Behavioral task
behavioral1
Sample
HSBC Payment Advice_pdf.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
HSBC Payment Advice_pdf.exe
Resource
win10v2004-20230220-en
General
-
Target
HSBC Payment Advice_pdf.exe
-
Size
380KB
-
MD5
77cdc00597ec524e4d445a274a55a053
-
SHA1
6d0d79d464dac3a5ee563f5afabae73b0317fe20
-
SHA256
4dc1d7f5403f147bc8bd69fe671d86c1a990ed0c3727d07b757ef95fbcd232b9
-
SHA512
c1da4c0b0b2995363700be3f0f6bb1268abce7356929846291a8727046af2f92385454dd1aea940ed2ae537fbad5e8ea205c7b3b1bad11c8d067deb0a38f47bb
-
SSDEEP
6144:sYa6sMA6sjf9FmJT0NBu8FpCUmAUwL1/ghd9AoFGBZZdwEhT:sYCnHjf9FA0zzFpRNgBAOGDZWEd
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 7 320 cmd.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Control Panel\International\Geo\Nation vvzosluykp.exe -
Executes dropped EXE 2 IoCs
pid Process 1956 vvzosluykp.exe 2012 vvzosluykp.exe -
Loads dropped DLL 4 IoCs
pid Process 1696 HSBC Payment Advice_pdf.exe 1696 HSBC Payment Advice_pdf.exe 1956 vvzosluykp.exe 320 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1956 set thread context of 2012 1956 vvzosluykp.exe 28 PID 2012 set thread context of 1228 2012 vvzosluykp.exe 9 PID 320 set thread context of 1228 320 cmd.exe 9 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \Registry\User\S-1-5-21-1563773381-2037468142-1146002597-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 cmd.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 2012 vvzosluykp.exe 2012 vvzosluykp.exe 2012 vvzosluykp.exe 2012 vvzosluykp.exe 320 cmd.exe 320 cmd.exe 320 cmd.exe 320 cmd.exe 320 cmd.exe 320 cmd.exe 320 cmd.exe 320 cmd.exe 320 cmd.exe 320 cmd.exe 320 cmd.exe 320 cmd.exe 320 cmd.exe 320 cmd.exe 320 cmd.exe 320 cmd.exe 320 cmd.exe 320 cmd.exe 320 cmd.exe 320 cmd.exe 320 cmd.exe 320 cmd.exe 320 cmd.exe 320 cmd.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1228 Explorer.EXE -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 1956 vvzosluykp.exe 2012 vvzosluykp.exe 2012 vvzosluykp.exe 2012 vvzosluykp.exe 320 cmd.exe 320 cmd.exe 320 cmd.exe 320 cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2012 vvzosluykp.exe Token: SeDebugPrivilege 320 cmd.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1228 Explorer.EXE 1228 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1228 Explorer.EXE 1228 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1696 wrote to memory of 1956 1696 HSBC Payment Advice_pdf.exe 27 PID 1696 wrote to memory of 1956 1696 HSBC Payment Advice_pdf.exe 27 PID 1696 wrote to memory of 1956 1696 HSBC Payment Advice_pdf.exe 27 PID 1696 wrote to memory of 1956 1696 HSBC Payment Advice_pdf.exe 27 PID 1956 wrote to memory of 2012 1956 vvzosluykp.exe 28 PID 1956 wrote to memory of 2012 1956 vvzosluykp.exe 28 PID 1956 wrote to memory of 2012 1956 vvzosluykp.exe 28 PID 1956 wrote to memory of 2012 1956 vvzosluykp.exe 28 PID 1956 wrote to memory of 2012 1956 vvzosluykp.exe 28 PID 1228 wrote to memory of 320 1228 Explorer.EXE 29 PID 1228 wrote to memory of 320 1228 Explorer.EXE 29 PID 1228 wrote to memory of 320 1228 Explorer.EXE 29 PID 1228 wrote to memory of 320 1228 Explorer.EXE 29 PID 320 wrote to memory of 340 320 cmd.exe 32 PID 320 wrote to memory of 340 320 cmd.exe 32 PID 320 wrote to memory of 340 320 cmd.exe 32 PID 320 wrote to memory of 340 320 cmd.exe 32 PID 320 wrote to memory of 340 320 cmd.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\HSBC Payment Advice_pdf.exe"C:\Users\Admin\AppData\Local\Temp\HSBC Payment Advice_pdf.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\vvzosluykp.exe"C:\Users\Admin\AppData\Local\Temp\vvzosluykp.exe" C:\Users\Admin\AppData\Local\Temp\tcierbayyx.w3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\vvzosluykp.exe"C:\Users\Admin\AppData\Local\Temp\vvzosluykp.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2012
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:340
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
205KB
MD56ee1765b846c05a265f228d9d3cafaa6
SHA1b901fa5dad01abd6d3770641f40c15f5fd5f8c26
SHA2564306cf72fd5bc403a379beaa76b0d7fe6e395cbe0731fd794a58eb7b098ea155
SHA5127b696dccf255938200f481b1a23a24875cf7160c031e769cab3b0627bbb34fab19a23250d5a9bdb503c970b72bae907e299015c07777cd111b49a2b719d947a4
-
Filesize
5KB
MD520b31645bcf70da6d175a19a89fc94e7
SHA15a26a35b0e660ba3aca245e0f999ece974302b38
SHA256e612dc2385a49115c4df88c10bdf3535a83daef27f7293f15f15a1ad7784d4d3
SHA512abdac4a7c6980dc7624f9b278d5b04b2ec46e44f1f050b68a3fb5fcc18339b31897eff005fc3fe4f120d041a4323faf1d65cb17a14a49a4e4b4159b22e9932dc
-
Filesize
60KB
MD5b43f5aa7e768abb0f4ed72288c5b76b3
SHA192b6620384eb0c218ff16bf9adff940928734809
SHA2563bf3ed6a245662efc963da4b085f256f10d18f0215187e535e376d749c04e05a
SHA5128a6e5c7367e5899c68c58c2594f7307ff80284332a3f0cf69fcab24bc4da236cd45751eb172d725b7b21d197d20146dc78acad23aaa0ce96f9a2dffb3c90834e
-
Filesize
60KB
MD5b43f5aa7e768abb0f4ed72288c5b76b3
SHA192b6620384eb0c218ff16bf9adff940928734809
SHA2563bf3ed6a245662efc963da4b085f256f10d18f0215187e535e376d749c04e05a
SHA5128a6e5c7367e5899c68c58c2594f7307ff80284332a3f0cf69fcab24bc4da236cd45751eb172d725b7b21d197d20146dc78acad23aaa0ce96f9a2dffb3c90834e
-
Filesize
60KB
MD5b43f5aa7e768abb0f4ed72288c5b76b3
SHA192b6620384eb0c218ff16bf9adff940928734809
SHA2563bf3ed6a245662efc963da4b085f256f10d18f0215187e535e376d749c04e05a
SHA5128a6e5c7367e5899c68c58c2594f7307ff80284332a3f0cf69fcab24bc4da236cd45751eb172d725b7b21d197d20146dc78acad23aaa0ce96f9a2dffb3c90834e
-
Filesize
60KB
MD5b43f5aa7e768abb0f4ed72288c5b76b3
SHA192b6620384eb0c218ff16bf9adff940928734809
SHA2563bf3ed6a245662efc963da4b085f256f10d18f0215187e535e376d749c04e05a
SHA5128a6e5c7367e5899c68c58c2594f7307ff80284332a3f0cf69fcab24bc4da236cd45751eb172d725b7b21d197d20146dc78acad23aaa0ce96f9a2dffb3c90834e
-
Filesize
444KB
MD5d71848944418c67f6eb230682f9a969a
SHA111d37a0eccbaf9995c6b236ff1a99d174a2566bd
SHA256efff0464180fcb34ec33e7835086ea58adc84bc3f0b08a7323ef1d58b258e59e
SHA5127baef376fb5f87e43124f79f81fe45567b7926be277a05abbbfe74bdbbe8dc49c238999e432fb4c457dff23ca78915d2a899bdde9a2ee79b77c655c17ebe706d
-
Filesize
849KB
MD587f9e5a6318ac1ec5ee05aa94a919d7a
SHA17a9956e8de89603dba99772da29493d3fd0fe37d
SHA2567705b87603e0d772e1753441001fcf1ac2643ee41bf14a8177de2c056628665c
SHA512c45c03176142918e34f746711e83384572bd6a8ed0a005600aa4a18cf22eade06c76eda190b37db49ec1971c4649e086affd19eee108c5f405df27c0c8cb23d2
-
Filesize
60KB
MD5b43f5aa7e768abb0f4ed72288c5b76b3
SHA192b6620384eb0c218ff16bf9adff940928734809
SHA2563bf3ed6a245662efc963da4b085f256f10d18f0215187e535e376d749c04e05a
SHA5128a6e5c7367e5899c68c58c2594f7307ff80284332a3f0cf69fcab24bc4da236cd45751eb172d725b7b21d197d20146dc78acad23aaa0ce96f9a2dffb3c90834e
-
Filesize
60KB
MD5b43f5aa7e768abb0f4ed72288c5b76b3
SHA192b6620384eb0c218ff16bf9adff940928734809
SHA2563bf3ed6a245662efc963da4b085f256f10d18f0215187e535e376d749c04e05a
SHA5128a6e5c7367e5899c68c58c2594f7307ff80284332a3f0cf69fcab24bc4da236cd45751eb172d725b7b21d197d20146dc78acad23aaa0ce96f9a2dffb3c90834e
-
Filesize
60KB
MD5b43f5aa7e768abb0f4ed72288c5b76b3
SHA192b6620384eb0c218ff16bf9adff940928734809
SHA2563bf3ed6a245662efc963da4b085f256f10d18f0215187e535e376d749c04e05a
SHA5128a6e5c7367e5899c68c58c2594f7307ff80284332a3f0cf69fcab24bc4da236cd45751eb172d725b7b21d197d20146dc78acad23aaa0ce96f9a2dffb3c90834e