Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
21/11/2023, 03:58
Static task
static1
Behavioral task
behavioral1
Sample
Payment 21.23.11.exe
Resource
win7-20231023-en
General
-
Target
Payment 21.23.11.exe
-
Size
618KB
-
MD5
693abe87fc901ab02f6b63860c7b1ef3
-
SHA1
4b3759229e356b13bef0e1a201b1614f4ec40bd5
-
SHA256
c6cf092a8e5bcecbf12f34d791f6c8112c83cbd7c8f1802e4cf5c4a787742f10
-
SHA512
ecee1ef3af9aa651ccf23aa2d299e1b779666280291034c507f80fe4e298f1333df7f8c2e03fe56004bdc4a07e3192b39200d5a80c797f4d7b12f6132bfbce7e
-
SSDEEP
12288:J7vKq8EzODtTNmseaRw07Hibc9GB9Sqfti9e0eiyavMOUij:J7iq8WODTyUMfo9e0nya6i
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Control Panel\International\Geo\Nation Payment 21.23.11.exe -
Loads dropped DLL 1 IoCs
pid Process 3040 explorer.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2924 set thread context of 2644 2924 Payment 21.23.11.exe 29 PID 2644 set thread context of 1240 2644 Payment 21.23.11.exe 13 PID 2644 set thread context of 3040 2644 Payment 21.23.11.exe 32 PID 3040 set thread context of 1240 3040 explorer.exe 13 -
description ioc Process Key created \Registry\User\S-1-5-21-3618187007-3650799920-3290345941-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 explorer.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 2924 Payment 21.23.11.exe 2644 Payment 21.23.11.exe 2644 Payment 21.23.11.exe 2644 Payment 21.23.11.exe 2644 Payment 21.23.11.exe 2644 Payment 21.23.11.exe 2644 Payment 21.23.11.exe 2644 Payment 21.23.11.exe 2644 Payment 21.23.11.exe 3040 explorer.exe 3040 explorer.exe 3040 explorer.exe 3040 explorer.exe 3040 explorer.exe 3040 explorer.exe 3040 explorer.exe 3040 explorer.exe 3040 explorer.exe 3040 explorer.exe 3040 explorer.exe 3040 explorer.exe 3040 explorer.exe 3040 explorer.exe 3040 explorer.exe 3040 explorer.exe 3040 explorer.exe 3040 explorer.exe 3040 explorer.exe 3040 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1240 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 2644 Payment 21.23.11.exe 1240 Explorer.EXE 1240 Explorer.EXE 3040 explorer.exe 3040 explorer.exe 3040 explorer.exe 3040 explorer.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2924 Payment 21.23.11.exe Token: SeDebugPrivilege 2644 Payment 21.23.11.exe Token: SeDebugPrivilege 3040 explorer.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2924 wrote to memory of 2068 2924 Payment 21.23.11.exe 28 PID 2924 wrote to memory of 2068 2924 Payment 21.23.11.exe 28 PID 2924 wrote to memory of 2068 2924 Payment 21.23.11.exe 28 PID 2924 wrote to memory of 2068 2924 Payment 21.23.11.exe 28 PID 2924 wrote to memory of 2644 2924 Payment 21.23.11.exe 29 PID 2924 wrote to memory of 2644 2924 Payment 21.23.11.exe 29 PID 2924 wrote to memory of 2644 2924 Payment 21.23.11.exe 29 PID 2924 wrote to memory of 2644 2924 Payment 21.23.11.exe 29 PID 2924 wrote to memory of 2644 2924 Payment 21.23.11.exe 29 PID 2924 wrote to memory of 2644 2924 Payment 21.23.11.exe 29 PID 2924 wrote to memory of 2644 2924 Payment 21.23.11.exe 29 PID 1240 wrote to memory of 3040 1240 Explorer.EXE 32 PID 1240 wrote to memory of 3040 1240 Explorer.EXE 32 PID 1240 wrote to memory of 3040 1240 Explorer.EXE 32 PID 1240 wrote to memory of 3040 1240 Explorer.EXE 32 PID 3040 wrote to memory of 2908 3040 explorer.exe 35 PID 3040 wrote to memory of 2908 3040 explorer.exe 35 PID 3040 wrote to memory of 2908 3040 explorer.exe 35 PID 3040 wrote to memory of 2908 3040 explorer.exe 35 PID 3040 wrote to memory of 2908 3040 explorer.exe 35
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\Payment 21.23.11.exe"C:\Users\Admin\AppData\Local\Temp\Payment 21.23.11.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\Payment 21.23.11.exe"C:\Users\Admin\AppData\Local\Temp\Payment 21.23.11.exe"3⤵PID:2068
-
-
C:\Users\Admin\AppData\Local\Temp\Payment 21.23.11.exe"C:\Users\Admin\AppData\Local\Temp\Payment 21.23.11.exe"3⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2644
-
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:2908
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
553KB
MD55e2d04cb2fae4e811ca35675c472f5fc
SHA16e2359f8e81f1a1122d1fb50b064878f2aaefc68
SHA256dd46a298ab90ca9ba8a1f633f20abe2dcb805596b5aa68dcb84cce99e3a56be1
SHA51253c8701768ee4a43a6b2095af00aa5f2c53445021a91d3567d02cf8157c7b7c4e629c5c70bb24697d365a7c41c791af0c68b511ab3cf5f356d9d929618421d05
-
Filesize
1.0MB
MD5f1e5f58f9eb43ecec773acbdb410b888
SHA1f1b8076b0bbde696694bbc0ab259a77893839464
SHA256a15fd84ee61b54c92bb099dfb78226548f43d550c67fb6adf4cce3d064ab1c14
SHA5120aff96430dd99bb227285fefc258014c301f85216c84e40f45702d26cdd7e77261a41fd3811d686f5fb2ee363cc651a014e8ffa339384004cece645a36486456