Analysis

  • max time kernel
    145s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    17-07-2023 06:22

General

  • Target

    TT payment.exe

  • Size

    280KB

  • MD5

    0b53570dda412c985f1913d0ad097b6f

  • SHA1

    69e8648f91033de6b221c969fa1804b370f9fea1

  • SHA256

    00d4da9d4fbc98752b5b2d9ada463a4c5cd3ebfde5b81821525727b3c258a4de

  • SHA512

    12042e8ac4ec3554c0e847c3d92114e031f6c2d526421cfa0e5373d6caeb957858f277a2f90099a14a873715fae2fa654e53bce0265b0182435ff1ebe98c5089

  • SSDEEP

    6144:/Ya6R+XvLSi08M0pKNQkK/1D7oTr+xGZ/e3AaNAJpm3hAjttdNYFb2upPI:/YDqL68MNXuDaPWw9jttdFupA

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 29 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\TT payment.exe
    "C:\Users\Admin\AppData\Local\Temp\TT payment.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:2504
    • C:\Users\Admin\AppData\Local\Temp\TT payment.exe
      "C:\Users\Admin\AppData\Local\Temp\TT payment.exe"
      2⤵
      • Checks computer location settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2632

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nsj7DE9.tmp\hyjmxpu.dll

    Filesize

    62KB

    MD5

    ca24e7e81aefb3cb413667d916a21d95

    SHA1

    459b0078de3126776cd6969b2b7740a07aafe7d7

    SHA256

    e25490e7846e48655bf0339f7713568f40a9f21cf5a97ebdbfc4103d131f1421

    SHA512

    1ba52bb357cc805cf323ad50ef95ea1a4f1c9681502aebd82ef24fb1ecd4a29af88da14fc6a99c36d16b544a0950dec8d623caad9ca27d80ccd25376cef475be

  • memory/2504-60-0x0000000074750000-0x0000000074763000-memory.dmp

    Filesize

    76KB

  • memory/2504-62-0x0000000074750000-0x0000000074763000-memory.dmp

    Filesize

    76KB

  • memory/2632-61-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/2632-63-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/2632-64-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/2632-65-0x0000000000910000-0x0000000000C13000-memory.dmp

    Filesize

    3.0MB

  • memory/2632-66-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB