Analysis
-
max time kernel
162s -
max time network
166s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 16:16
Static task
static1
Behavioral task
behavioral1
Sample
Invoice Statement 180923.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Invoice Statement 180923.exe
Resource
win10v2004-20230915-en
General
-
Target
Invoice Statement 180923.exe
-
Size
697KB
-
MD5
6b5329a982afd72cb3af805a4bd8750d
-
SHA1
75eadea84fe95d8595e6c5a1dcbaf4febc4643db
-
SHA256
48a7f19ab15464b4b940df2d979c2ce407238f9fe422b39fee341daad7657f41
-
SHA512
9d5bc91fff60b71b550305fa3d29d145e898c946fdf3f26f78a6c3ac080567871f4dc1c51a2effbc0ba54580878755d4c37da8784ec061709b1313699c4e9eaf
-
SSDEEP
12288:EAfDuHOXRjZBVdHHMzvSKWYHSU0Oxsj2gIEGAt++Jf4WX4KnznQdI9hG+I2cXj9i:EgrjZBV1HMDSKWYHSU0OshxGWX4KzkIP
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Control Panel\International\Geo\Nation Invoice Statement 180923.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2096 set thread context of 2636 2096 Invoice Statement 180923.exe 29 PID 2636 set thread context of 1240 2636 Invoice Statement 180923.exe 15 PID 2636 set thread context of 2644 2636 Invoice Statement 180923.exe 30 PID 2644 set thread context of 1240 2644 svchost.exe 15 -
description ioc Process Key created \Registry\User\S-1-5-21-2180306848-1874213455-4093218721-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 svchost.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 2096 Invoice Statement 180923.exe 2096 Invoice Statement 180923.exe 2096 Invoice Statement 180923.exe 2096 Invoice Statement 180923.exe 2096 Invoice Statement 180923.exe 2096 Invoice Statement 180923.exe 2096 Invoice Statement 180923.exe 2636 Invoice Statement 180923.exe 2636 Invoice Statement 180923.exe 2636 Invoice Statement 180923.exe 2636 Invoice Statement 180923.exe 2636 Invoice Statement 180923.exe 2636 Invoice Statement 180923.exe 2636 Invoice Statement 180923.exe 2636 Invoice Statement 180923.exe 2644 svchost.exe 2644 svchost.exe 2644 svchost.exe 2644 svchost.exe 2644 svchost.exe 2644 svchost.exe 2644 svchost.exe 2644 svchost.exe 2644 svchost.exe 2644 svchost.exe 2644 svchost.exe 2644 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1240 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2636 Invoice Statement 180923.exe 1240 Explorer.EXE 1240 Explorer.EXE 2644 svchost.exe 2644 svchost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2096 Invoice Statement 180923.exe Token: SeDebugPrivilege 2636 Invoice Statement 180923.exe Token: SeDebugPrivilege 2644 svchost.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2636 2096 Invoice Statement 180923.exe 29 PID 2096 wrote to memory of 2636 2096 Invoice Statement 180923.exe 29 PID 2096 wrote to memory of 2636 2096 Invoice Statement 180923.exe 29 PID 2096 wrote to memory of 2636 2096 Invoice Statement 180923.exe 29 PID 2096 wrote to memory of 2636 2096 Invoice Statement 180923.exe 29 PID 2096 wrote to memory of 2636 2096 Invoice Statement 180923.exe 29 PID 2096 wrote to memory of 2636 2096 Invoice Statement 180923.exe 29 PID 1240 wrote to memory of 2644 1240 Explorer.EXE 30 PID 1240 wrote to memory of 2644 1240 Explorer.EXE 30 PID 1240 wrote to memory of 2644 1240 Explorer.EXE 30 PID 1240 wrote to memory of 2644 1240 Explorer.EXE 30
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\Invoice Statement 180923.exe"C:\Users\Admin\AppData\Local\Temp\Invoice Statement 180923.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\Invoice Statement 180923.exe"C:\Users\Admin\AppData\Local\Temp\Invoice Statement 180923.exe"3⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2636
-
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2644 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:2160
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
472KB
MD5f24f874f0a201b7c919019d8cc45cc5a
SHA1c2f99e749ce8b66b9da7cd793dc9b254c395f8c5
SHA256e1090bd71e36c943af572d13d23adcb824a38d01d8ec110bb63f29b5c9a26031
SHA5125c40b2c48e598d30e3f47c67479dc19352080a16ccf7a7eff7034e595cad1643308c070d3ac4f4fed7bcc99f4a507bc5463c7944d81baa8f0b65b3e3a839140a
-
Filesize
902KB
MD550338cc1fa2582fa0cad8a8fa7ceb4d2
SHA1ae697ef05b6bec38fb79ff4512ae50a303dcdbce
SHA2560815a80fa73286d8c6bf0982471c61833821d9f10a20612deaa134562e7a3cda
SHA51202a006e26b1d08cb53a4b3dab23ce6a6756a7275f8b3ef00b7412f10cff75411685a3542c5dc330dad7c9f7ff26288a2e94254d00bf53c1394e7252e000c9a61