Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2023 10:40
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Invoice & SOA ready for dispatch.exe
Resource
win7-20231023-en
windows7-x64
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
Invoice & SOA ready for dispatch.exe
Resource
win10v2004-20231023-en
windows10-2004-x64
8 signatures
150 seconds
General
-
Target
Invoice & SOA ready for dispatch.exe
-
Size
943KB
-
MD5
eea9bf4a16ab377328a59bde0a0c76df
-
SHA1
d6015abe7bd2ac246af5656410c7f7c7dc5f5637
-
SHA256
fd2ac4af2e4d90f117a8ba49d77cc480f0ad6a8a6cfa7479384d68ce27939f1a
-
SHA512
ca360f0d3572e09ca8f737af9137dd44ae0e1cdba25065876bc20fbd92463f1dd532d30e1c008af56dbc6f664107f688f9397ce4a7a75af3dc3bb5c1728b6ba5
-
SSDEEP
24576:6JOiQEUDJiJMHCxRCilWY+G348OYyVDWLr3IFE:6RaFKdLWYjECH3I
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1004 set thread context of 3432 1004 Invoice & SOA ready for dispatch.exe 101 PID 3432 set thread context of 3320 3432 RegSvcs.exe 58 PID 3432 set thread context of 2608 3432 RegSvcs.exe 109 PID 2608 set thread context of 3320 2608 fontview.exe 58 -
description ioc Process Key created \Registry\User\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 fontview.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 1004 Invoice & SOA ready for dispatch.exe 1004 Invoice & SOA ready for dispatch.exe 3432 RegSvcs.exe 3432 RegSvcs.exe 3432 RegSvcs.exe 3432 RegSvcs.exe 3432 RegSvcs.exe 3432 RegSvcs.exe 3432 RegSvcs.exe 3432 RegSvcs.exe 3432 RegSvcs.exe 3432 RegSvcs.exe 3432 RegSvcs.exe 3432 RegSvcs.exe 3432 RegSvcs.exe 3432 RegSvcs.exe 3432 RegSvcs.exe 3432 RegSvcs.exe 2608 fontview.exe 2608 fontview.exe 2608 fontview.exe 2608 fontview.exe 2608 fontview.exe 2608 fontview.exe 2608 fontview.exe 2608 fontview.exe 2608 fontview.exe 2608 fontview.exe 2608 fontview.exe 2608 fontview.exe 2608 fontview.exe 2608 fontview.exe 2608 fontview.exe 2608 fontview.exe 2608 fontview.exe 2608 fontview.exe 2608 fontview.exe 2608 fontview.exe 2608 fontview.exe 2608 fontview.exe 2608 fontview.exe 2608 fontview.exe 2608 fontview.exe 2608 fontview.exe 2608 fontview.exe 2608 fontview.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3320 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 3432 RegSvcs.exe 3320 Explorer.EXE 3320 Explorer.EXE 2608 fontview.exe 2608 fontview.exe 2608 fontview.exe 2608 fontview.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 1004 Invoice & SOA ready for dispatch.exe Token: SeShutdownPrivilege 3320 Explorer.EXE Token: SeCreatePagefilePrivilege 3320 Explorer.EXE Token: SeShutdownPrivilege 3320 Explorer.EXE Token: SeCreatePagefilePrivilege 3320 Explorer.EXE Token: SeShutdownPrivilege 3320 Explorer.EXE Token: SeCreatePagefilePrivilege 3320 Explorer.EXE Token: SeShutdownPrivilege 3320 Explorer.EXE Token: SeCreatePagefilePrivilege 3320 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3320 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1004 wrote to memory of 3432 1004 Invoice & SOA ready for dispatch.exe 101 PID 1004 wrote to memory of 3432 1004 Invoice & SOA ready for dispatch.exe 101 PID 1004 wrote to memory of 3432 1004 Invoice & SOA ready for dispatch.exe 101 PID 1004 wrote to memory of 3432 1004 Invoice & SOA ready for dispatch.exe 101 PID 1004 wrote to memory of 3432 1004 Invoice & SOA ready for dispatch.exe 101 PID 1004 wrote to memory of 3432 1004 Invoice & SOA ready for dispatch.exe 101 PID 3320 wrote to memory of 2608 3320 Explorer.EXE 109 PID 3320 wrote to memory of 2608 3320 Explorer.EXE 109 PID 3320 wrote to memory of 2608 3320 Explorer.EXE 109 PID 2608 wrote to memory of 1816 2608 fontview.exe 111 PID 2608 wrote to memory of 1816 2608 fontview.exe 111 PID 2608 wrote to memory of 1816 2608 fontview.exe 111
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Users\Admin\AppData\Local\Temp\Invoice & SOA ready for dispatch.exe"C:\Users\Admin\AppData\Local\Temp\Invoice & SOA ready for dispatch.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3432
-
-
-
C:\Windows\SysWOW64\fontview.exe"C:\Windows\SysWOW64\fontview.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1816
-
-