Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 16:16
Static task
static1
Behavioral task
behavioral1
Sample
Invoice Statement 180923.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Invoice Statement 180923.exe
Resource
win10v2004-20230915-en
General
-
Target
Invoice Statement 180923.exe
-
Size
697KB
-
MD5
6b5329a982afd72cb3af805a4bd8750d
-
SHA1
75eadea84fe95d8595e6c5a1dcbaf4febc4643db
-
SHA256
48a7f19ab15464b4b940df2d979c2ce407238f9fe422b39fee341daad7657f41
-
SHA512
9d5bc91fff60b71b550305fa3d29d145e898c946fdf3f26f78a6c3ac080567871f4dc1c51a2effbc0ba54580878755d4c37da8784ec061709b1313699c4e9eaf
-
SSDEEP
12288:EAfDuHOXRjZBVdHHMzvSKWYHSU0Oxsj2gIEGAt++Jf4WX4KnznQdI9hG+I2cXj9i:EgrjZBV1HMDSKWYHSU0OshxGWX4KzkIP
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation Invoice Statement 180923.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1020 set thread context of 4888 1020 Invoice Statement 180923.exe 91 PID 4888 set thread context of 3124 4888 Invoice Statement 180923.exe 42 PID 4888 set thread context of 420 4888 Invoice Statement 180923.exe 92 PID 420 set thread context of 3124 420 NETSTAT.EXE 42 -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 420 NETSTAT.EXE -
description ioc Process Key created \Registry\User\S-1-5-21-1141987721-3945596982-3297311814-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 NETSTAT.EXE -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 1020 Invoice Statement 180923.exe 1020 Invoice Statement 180923.exe 1020 Invoice Statement 180923.exe 1020 Invoice Statement 180923.exe 1020 Invoice Statement 180923.exe 1020 Invoice Statement 180923.exe 4888 Invoice Statement 180923.exe 4888 Invoice Statement 180923.exe 4888 Invoice Statement 180923.exe 4888 Invoice Statement 180923.exe 4888 Invoice Statement 180923.exe 4888 Invoice Statement 180923.exe 4888 Invoice Statement 180923.exe 4888 Invoice Statement 180923.exe 4888 Invoice Statement 180923.exe 4888 Invoice Statement 180923.exe 4888 Invoice Statement 180923.exe 4888 Invoice Statement 180923.exe 4888 Invoice Statement 180923.exe 4888 Invoice Statement 180923.exe 4888 Invoice Statement 180923.exe 4888 Invoice Statement 180923.exe 420 NETSTAT.EXE 420 NETSTAT.EXE 420 NETSTAT.EXE 420 NETSTAT.EXE 420 NETSTAT.EXE 420 NETSTAT.EXE 420 NETSTAT.EXE 420 NETSTAT.EXE 420 NETSTAT.EXE 420 NETSTAT.EXE 420 NETSTAT.EXE 420 NETSTAT.EXE 420 NETSTAT.EXE 420 NETSTAT.EXE 420 NETSTAT.EXE 420 NETSTAT.EXE 420 NETSTAT.EXE 420 NETSTAT.EXE 420 NETSTAT.EXE 420 NETSTAT.EXE 420 NETSTAT.EXE 420 NETSTAT.EXE 420 NETSTAT.EXE 420 NETSTAT.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3124 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 4888 Invoice Statement 180923.exe 3124 Explorer.EXE 3124 Explorer.EXE 420 NETSTAT.EXE 420 NETSTAT.EXE 420 NETSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1020 Invoice Statement 180923.exe Token: SeDebugPrivilege 4888 Invoice Statement 180923.exe Token: SeDebugPrivilege 420 NETSTAT.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3124 Explorer.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1020 wrote to memory of 4888 1020 Invoice Statement 180923.exe 91 PID 1020 wrote to memory of 4888 1020 Invoice Statement 180923.exe 91 PID 1020 wrote to memory of 4888 1020 Invoice Statement 180923.exe 91 PID 1020 wrote to memory of 4888 1020 Invoice Statement 180923.exe 91 PID 1020 wrote to memory of 4888 1020 Invoice Statement 180923.exe 91 PID 1020 wrote to memory of 4888 1020 Invoice Statement 180923.exe 91 PID 3124 wrote to memory of 420 3124 Explorer.EXE 92 PID 3124 wrote to memory of 420 3124 Explorer.EXE 92 PID 3124 wrote to memory of 420 3124 Explorer.EXE 92 PID 420 wrote to memory of 2724 420 NETSTAT.EXE 93 PID 420 wrote to memory of 2724 420 NETSTAT.EXE 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\Invoice Statement 180923.exe"C:\Users\Admin\AppData\Local\Temp\Invoice Statement 180923.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Users\Admin\AppData\Local\Temp\Invoice Statement 180923.exe"C:\Users\Admin\AppData\Local\Temp\Invoice Statement 180923.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4888
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Windows\SysWOW64\NETSTAT.EXE"C:\Windows\SysWOW64\NETSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- Gathers network information
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:420 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:2724
-
-