Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
21-07-2023 06:40
Static task
static1
Behavioral task
behavioral1
Sample
Payment Slip.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Payment Slip.exe
Resource
win10v2004-20230703-en
General
-
Target
Payment Slip.exe
-
Size
336KB
-
MD5
66cc22ed167cdaef60b10efd54949ff6
-
SHA1
bbe7a39f01333346c8e3bcfbf73e4c484a3bc2cd
-
SHA256
78fbd42e5b8ac36090e1765cb86e573a4d8f2c3e1b6339c3e081343e74967943
-
SHA512
57c4c110a59c104af9ddee66d75a62330d985d83d604f3131920449265a9e2f2b5aa36f34da1b8fb86fe3875c254e27bfb87f51f32bc699ec465db4d1786640e
-
SSDEEP
6144:/Ya6D86Y0vp4i0viRcFiU+0/WHT22FtdJ9KGTV:/YpThvOi0OcFiUdeHa27dXV
Malware Config
Extracted
darkcloud
- email_from
- email_to
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 3516 Payment Slip.exe -
resource yara_rule behavioral2/memory/3120-141-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral2/memory/3120-143-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral2/memory/3120-145-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral2/memory/3120-148-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral2/memory/3120-149-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral2/memory/3120-150-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral2/memory/3120-151-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral2/memory/3120-152-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral2/memory/3120-153-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral2/memory/3120-154-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral2/memory/3120-155-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral2/memory/3120-156-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral2/memory/3120-157-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral2/memory/3120-158-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral2/memory/3120-159-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral2/memory/3120-160-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral2/memory/3120-161-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral2/memory/3120-162-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral2/memory/3120-163-0x0000000000400000-0x0000000000476000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hqavfok = "C:\\Users\\Admin\\AppData\\Roaming\\xhqmvrbkgpyuea\\jrnwgcl.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\Payment Slip.exe\"" Payment Slip.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3516 set thread context of 3120 3516 Payment Slip.exe 86 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3120 Payment Slip.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3516 Payment Slip.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3120 Payment Slip.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3516 wrote to memory of 3120 3516 Payment Slip.exe 86 PID 3516 wrote to memory of 3120 3516 Payment Slip.exe 86 PID 3516 wrote to memory of 3120 3516 Payment Slip.exe 86 PID 3516 wrote to memory of 3120 3516 Payment Slip.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3120
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD518fe03603fef1da9072e5a778fa2da79
SHA1d7bbb199679adf7d837a6fc019bd36a37c77a57b
SHA2569e7731d5cbdd2e9f9c3add54e43eda6a82d782288bf5e9f5a9388affb772e3e3
SHA5127dc9b851dce0727b44a091f2aa4274578fb1b65b77096a92a894c6876b8e2fd19327cdf333793507b519dc5208b32c8fbbc3eea2555484cb6a1005afe1271281