Analysis
-
max time kernel
149s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
07/06/2023, 06:45
Static task
static1
Behavioral task
behavioral1
Sample
逾期形式發票-payload.exe
Resource
win7-20230220-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
逾期形式發票-payload.exe
Resource
win10v2004-20230220-en
4 signatures
150 seconds
General
-
Target
逾期形式發票-payload.exe
-
Size
778KB
-
MD5
90f2f956c4cb4a08203fa9a9320699bd
-
SHA1
93eb5d9a3f8bf277b9583d420273c62a3ce8cf54
-
SHA256
ea87677874c1bf9754cf9b13d14d49c3841ac648fa54844f74866334befbbb64
-
SHA512
1df851d5cc0ae5e5d36bdfffd78a68852fb16ec75724a98c0fa120a59e36b55dc6afdf542c6126854fafc3cfa0acf3950f3f9d2137f49945624702068693e5b3
-
SSDEEP
24576:wXhP7pbPY9CQRzwGKFV7t4A4OpjrlQ0FCloCa3oJd:wXhP7pbPY9COwG2xt4pOpXlQrRd
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 920 set thread context of 1428 920 逾期形式發票-payload.exe 28 -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 1428 Caspol.exe 1428 Caspol.exe 1428 Caspol.exe 1428 Caspol.exe 1428 Caspol.exe 1428 Caspol.exe 1428 Caspol.exe 1428 Caspol.exe 1428 Caspol.exe 1428 Caspol.exe 1428 Caspol.exe 1428 Caspol.exe 1428 Caspol.exe 1428 Caspol.exe 1428 Caspol.exe 1428 Caspol.exe 1428 Caspol.exe 1428 Caspol.exe 1428 Caspol.exe 1428 Caspol.exe 1428 Caspol.exe 1428 Caspol.exe 1428 Caspol.exe 1428 Caspol.exe 1428 Caspol.exe 1428 Caspol.exe 1428 Caspol.exe 1428 Caspol.exe 1428 Caspol.exe 1428 Caspol.exe 1428 Caspol.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1428 Caspol.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 920 wrote to memory of 1428 920 逾期形式發票-payload.exe 28 PID 920 wrote to memory of 1428 920 逾期形式發票-payload.exe 28 PID 920 wrote to memory of 1428 920 逾期形式發票-payload.exe 28 PID 920 wrote to memory of 1428 920 逾期形式發票-payload.exe 28 PID 920 wrote to memory of 1428 920 逾期形式發票-payload.exe 28 PID 920 wrote to memory of 1428 920 逾期形式發票-payload.exe 28 PID 920 wrote to memory of 1428 920 逾期形式發票-payload.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\逾期形式發票-payload.exe"C:\Users\Admin\AppData\Local\Temp\逾期形式發票-payload.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1428
-