Analysis
-
max time kernel
91s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
30/05/2023, 10:33
Static task
static1
Behavioral task
behavioral1
Sample
Doklad o zaplatení.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Doklad o zaplatení.exe
Resource
win10v2004-20230220-en
General
-
Target
Doklad o zaplatení.exe
-
Size
46KB
-
MD5
b22ed88cf2c78b66fb06030674ffaf0a
-
SHA1
c5d86779c52c029e7c84112e54ba894cc497fd64
-
SHA256
965a58fe4566f227649c691d1c3d7c4e3f3f53af2b377d09a5837018a230c811
-
SHA512
2bb0605d74b831f89a8d504adf924ccfdfbc49ce0c56d5da1db4e35b6239469e75ab19fae03cf9bee931e1e326e930e03958ad54e0ca02e229940484c054e8eb
-
SSDEEP
768:dlr/cjyviHDS5PmxxxxxixXFylUpK9jg+HLr6GbOsKpeQi9c/KYP3hrvA:dlr/jiHDu3F6Uk9jg+rr6GbOsKpeQiQi
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2716 TypeId.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2716 set thread context of 2152 2716 TypeId.exe 94 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4764 powershell.exe 4764 powershell.exe 2716 TypeId.exe 2716 TypeId.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 2648 Doklad o zaplatení.exe Token: SeDebugPrivilege 2648 Doklad o zaplatení.exe Token: SeDebugPrivilege 4764 powershell.exe Token: SeDebugPrivilege 2716 TypeId.exe Token: SeDebugPrivilege 2716 TypeId.exe Token: SeDebugPrivilege 2152 InstallUtil.exe Token: SeDebugPrivilege 2152 InstallUtil.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2716 wrote to memory of 2152 2716 TypeId.exe 94 PID 2716 wrote to memory of 2152 2716 TypeId.exe 94 PID 2716 wrote to memory of 2152 2716 TypeId.exe 94 PID 2716 wrote to memory of 2152 2716 TypeId.exe 94 PID 2716 wrote to memory of 2152 2716 TypeId.exe 94 PID 2716 wrote to memory of 2152 2716 TypeId.exe 94 PID 2716 wrote to memory of 2152 2716 TypeId.exe 94 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Doklad o zaplatení.exe"C:\Users\Admin\AppData\Local\Temp\Doklad o zaplatení.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2648
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc UwBlAHQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAA==1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4764
-
C:\Users\Admin\AppData\Local\Current\wntsytz\TypeId.exeC:\Users\Admin\AppData\Local\Current\wntsytz\TypeId.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2152
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD5b22ed88cf2c78b66fb06030674ffaf0a
SHA1c5d86779c52c029e7c84112e54ba894cc497fd64
SHA256965a58fe4566f227649c691d1c3d7c4e3f3f53af2b377d09a5837018a230c811
SHA5122bb0605d74b831f89a8d504adf924ccfdfbc49ce0c56d5da1db4e35b6239469e75ab19fae03cf9bee931e1e326e930e03958ad54e0ca02e229940484c054e8eb
-
Filesize
46KB
MD5b22ed88cf2c78b66fb06030674ffaf0a
SHA1c5d86779c52c029e7c84112e54ba894cc497fd64
SHA256965a58fe4566f227649c691d1c3d7c4e3f3f53af2b377d09a5837018a230c811
SHA5122bb0605d74b831f89a8d504adf924ccfdfbc49ce0c56d5da1db4e35b6239469e75ab19fae03cf9bee931e1e326e930e03958ad54e0ca02e229940484c054e8eb
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82