Resubmissions

09-11-2023 13:08

231109-qdqdnshe3t 10

09-11-2023 13:02

231109-qaa5kshd9x 10

Analysis

  • max time kernel
    173s
  • max time network
    242s
  • platform
    windows10-1703_x64
  • resource
    win10-20231023-en
  • resource tags

    arch:x64arch:x86image:win10-20231023-enlocale:en-usos:windows10-1703-x64system
  • submitted
    09-11-2023 13:02

General

  • Target

    Payment_Advice.exe

  • Size

    3.0MB

  • MD5

    004dfc0b2894f71a6e580bf96e847ccb

  • SHA1

    bce881adac787b1c3171e2c4cffbd01d8748ef58

  • SHA256

    c97ce3037f229baa9cd97ab732a4363f8d7f6cf3ebc3062ce4973414c0b1ce77

  • SHA512

    492e12c036e62b5f5a5b460318d94c23c2059ed45cfb5d76687ac3887f05f671712f97cbf387199a25d13ed90c71438b5b8b8b83146314dc76c1cb4f67745e79

  • SSDEEP

    98304:7ajJxZ942KQV9hp4jcdwr2dddddcdtlIdS9ddd/ndgRgHzdBG3tddNfmP/SA8:mtZ4mVJ+cdwr2dddddcdtlIdS9ddd/nG

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Payment_Advice.exe
    "C:\Users\Admin\AppData\Local\Temp\Payment_Advice.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4800
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c C:\Users\Admin\AppData\Local\Temp\
      2⤵
        PID:4696
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:4640

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads