Analysis
-
max time kernel
149s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
07/06/2023, 09:18
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Revised invoice.exe
Resource
win7-20230220-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
Revised invoice.exe
Resource
win10v2004-20230221-en
4 signatures
150 seconds
General
-
Target
Revised invoice.exe
-
Size
822KB
-
MD5
740a4d6e95ef8e4b1daf0d6aa58e120b
-
SHA1
d250f9f9c0745f172ddad67901ddff6898646cee
-
SHA256
b895af0a401b54528188c54f7ddf3421bed6e79922e8050e04a0c241ee9e5d8c
-
SHA512
f4ddb40eca7bbf8297c06abdf44d54d2c85bb3998e5e06523090a28db0830c73413b7404124576d079b80b82db21242b5d5d896516c0385c3a5a7fc4df30a7e1
-
SSDEEP
24576:hUDlWxMiQW/O4ue7kjY4Oa2ZkByJ6xuwn:clYMiQWmS7qY4KOyJ6xuy
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1732 set thread context of 840 1732 Revised invoice.exe 28 -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 1732 Revised invoice.exe 1732 Revised invoice.exe 840 RegSvcs.exe 840 RegSvcs.exe 840 RegSvcs.exe 840 RegSvcs.exe 840 RegSvcs.exe 840 RegSvcs.exe 840 RegSvcs.exe 840 RegSvcs.exe 840 RegSvcs.exe 840 RegSvcs.exe 840 RegSvcs.exe 840 RegSvcs.exe 840 RegSvcs.exe 840 RegSvcs.exe 840 RegSvcs.exe 840 RegSvcs.exe 840 RegSvcs.exe 840 RegSvcs.exe 840 RegSvcs.exe 840 RegSvcs.exe 840 RegSvcs.exe 840 RegSvcs.exe 840 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1732 Revised invoice.exe Token: SeDebugPrivilege 840 RegSvcs.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1732 wrote to memory of 840 1732 Revised invoice.exe 28 PID 1732 wrote to memory of 840 1732 Revised invoice.exe 28 PID 1732 wrote to memory of 840 1732 Revised invoice.exe 28 PID 1732 wrote to memory of 840 1732 Revised invoice.exe 28 PID 1732 wrote to memory of 840 1732 Revised invoice.exe 28 PID 1732 wrote to memory of 840 1732 Revised invoice.exe 28 PID 1732 wrote to memory of 840 1732 Revised invoice.exe 28 PID 1732 wrote to memory of 840 1732 Revised invoice.exe 28 PID 1732 wrote to memory of 840 1732 Revised invoice.exe 28 PID 1732 wrote to memory of 840 1732 Revised invoice.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\Revised invoice.exe"C:\Users\Admin\AppData\Local\Temp\Revised invoice.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:840
-