Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231023-es -
resource tags
arch:x64arch:x86image:win7-20231023-eslocale:es-esos:windows7-x64systemwindows -
submitted
22-11-2023 11:08
Static task
static1
Behavioral task
behavioral1
Sample
justificante de pago.exe
Resource
win7-20231023-es
Behavioral task
behavioral2
Sample
justificante de pago.exe
Resource
win10v2004-20231020-es
General
-
Target
justificante de pago.exe
-
Size
290KB
-
MD5
7f45d3ae1250a354a3c0955e0414f9ec
-
SHA1
e2242211da4349bb85d1935831957405a4f98669
-
SHA256
206b596f2a06c33b636698217854ab8c417ae20f50ba59247a7a2bed74ccacf2
-
SHA512
eda0da12d190ce6e03a4f9ab8c1e9e24b3be5a0db186619f167fd54359fbdbf6a40d42162ef67b58c73a012ae73cd99b5b4c6d0e56b77f697ae8bc181480f3ef
-
SSDEEP
6144:TT4DtPsbFhPYwPL0cMVTmsmOriSyygpCFccq22SWJtC3yv9gg3rZ/m:TTAsbzPT0rVasjSFoF5qltCi9hVm
Malware Config
Signatures
-
Loads dropped DLL 6 IoCs
pid Process 1940 justificante de pago.exe 1940 justificante de pago.exe 1940 justificante de pago.exe 1940 justificante de pago.exe 1940 justificante de pago.exe 2804 bitsadmin.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\pessimize\pantets\borghalpenny\octals.ini justificante de pago.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 2768 justificante de pago.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1940 justificante de pago.exe 2768 justificante de pago.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1940 set thread context of 2768 1940 justificante de pago.exe 30 PID 2768 set thread context of 1212 2768 justificante de pago.exe 15 PID 2768 set thread context of 2804 2768 justificante de pago.exe 33 PID 2804 set thread context of 1212 2804 bitsadmin.exe 15 -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\Fonts\kneepan\Feteringerne27\luise\Traceback\overcircumspect\furrowed\lizbets\gastrocnemii\ubeskrivelig.fje justificante de pago.exe File opened for modification C:\Windows\Fonts\textures\toggler\unmobbed\eskamoteringernes.Kre216 justificante de pago.exe File opened for modification C:\Windows\resources\0c0a\Rygmarvs\baghaves\svndrukkent\eskorternes\racier\Coercivity.ini justificante de pago.exe File opened for modification C:\Windows\resources\0c0a\fineredes\Azured73\skulpens.Fou94 justificante de pago.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \Registry\User\S-1-5-21-2085049433-1067986815-1244098655-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 bitsadmin.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 2768 justificante de pago.exe 2768 justificante de pago.exe 2768 justificante de pago.exe 2768 justificante de pago.exe 2768 justificante de pago.exe 2768 justificante de pago.exe 2768 justificante de pago.exe 2768 justificante de pago.exe 2804 bitsadmin.exe 2804 bitsadmin.exe 2804 bitsadmin.exe 2804 bitsadmin.exe 2804 bitsadmin.exe 2804 bitsadmin.exe 2804 bitsadmin.exe 2804 bitsadmin.exe 2804 bitsadmin.exe 2804 bitsadmin.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1212 Explorer.EXE -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 1940 justificante de pago.exe 2768 justificante de pago.exe 1212 Explorer.EXE 1212 Explorer.EXE 2804 bitsadmin.exe 2804 bitsadmin.exe 2804 bitsadmin.exe 2804 bitsadmin.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1940 wrote to memory of 2768 1940 justificante de pago.exe 30 PID 1940 wrote to memory of 2768 1940 justificante de pago.exe 30 PID 1940 wrote to memory of 2768 1940 justificante de pago.exe 30 PID 1940 wrote to memory of 2768 1940 justificante de pago.exe 30 PID 1940 wrote to memory of 2768 1940 justificante de pago.exe 30 PID 1940 wrote to memory of 2768 1940 justificante de pago.exe 30 PID 1212 wrote to memory of 2804 1212 Explorer.EXE 33 PID 1212 wrote to memory of 2804 1212 Explorer.EXE 33 PID 1212 wrote to memory of 2804 1212 Explorer.EXE 33 PID 1212 wrote to memory of 2804 1212 Explorer.EXE 33 PID 2804 wrote to memory of 932 2804 bitsadmin.exe 34 PID 2804 wrote to memory of 932 2804 bitsadmin.exe 34 PID 2804 wrote to memory of 932 2804 bitsadmin.exe 34 PID 2804 wrote to memory of 932 2804 bitsadmin.exe 34 PID 2804 wrote to memory of 932 2804 bitsadmin.exe 34
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\justificante de pago.exe"C:\Users\Admin\AppData\Local\Temp\justificante de pago.exe"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\justificante de pago.exe"C:\Users\Admin\AppData\Local\Temp\justificante de pago.exe"3⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2768
-
-
-
C:\Windows\SysWOW64\bitsadmin.exe"C:\Windows\SysWOW64\bitsadmin.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:932
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5014a3be4a7c1ccb217916dbf4f222bd1
SHA19b4c41eb0e84886beb5591d8357155e27f9c68ed
SHA25609acfc5ee34a1dfa1af3a9d34f00c3b1327b56641feebd536e13752349c08ac8
SHA5120f3d1bf548e29a136150b699665a3f22c6ea2821701737363fa2920b51c391d735f1eae92dea8af655e7d07304bd3d06e4aff3f5a82fa22bcf5d1690013eb922
-
Filesize
433KB
MD5ecc8ac417181d4885ef8c208d1f073dc
SHA133154e45485bc0ae3bb0203ffcb9baaaed4038d3
SHA256d01c69d09282f9050f6b113c45884fe9b9abf3bdf5bd93b45927d9b6bfb233fe
SHA512f7601763447bed9b7b45fef2bd584da669636d2657c6066516c949e713ce1caf0641a1889345e92e584b84f438fa19029d13c6f6f1583d35fcc1eb3f998631da
-
Filesize
5KB
MD5014a3be4a7c1ccb217916dbf4f222bd1
SHA19b4c41eb0e84886beb5591d8357155e27f9c68ed
SHA25609acfc5ee34a1dfa1af3a9d34f00c3b1327b56641feebd536e13752349c08ac8
SHA5120f3d1bf548e29a136150b699665a3f22c6ea2821701737363fa2920b51c391d735f1eae92dea8af655e7d07304bd3d06e4aff3f5a82fa22bcf5d1690013eb922
-
Filesize
5KB
MD5014a3be4a7c1ccb217916dbf4f222bd1
SHA19b4c41eb0e84886beb5591d8357155e27f9c68ed
SHA25609acfc5ee34a1dfa1af3a9d34f00c3b1327b56641feebd536e13752349c08ac8
SHA5120f3d1bf548e29a136150b699665a3f22c6ea2821701737363fa2920b51c391d735f1eae92dea8af655e7d07304bd3d06e4aff3f5a82fa22bcf5d1690013eb922
-
Filesize
5KB
MD5014a3be4a7c1ccb217916dbf4f222bd1
SHA19b4c41eb0e84886beb5591d8357155e27f9c68ed
SHA25609acfc5ee34a1dfa1af3a9d34f00c3b1327b56641feebd536e13752349c08ac8
SHA5120f3d1bf548e29a136150b699665a3f22c6ea2821701737363fa2920b51c391d735f1eae92dea8af655e7d07304bd3d06e4aff3f5a82fa22bcf5d1690013eb922
-
Filesize
5KB
MD5014a3be4a7c1ccb217916dbf4f222bd1
SHA19b4c41eb0e84886beb5591d8357155e27f9c68ed
SHA25609acfc5ee34a1dfa1af3a9d34f00c3b1327b56641feebd536e13752349c08ac8
SHA5120f3d1bf548e29a136150b699665a3f22c6ea2821701737363fa2920b51c391d735f1eae92dea8af655e7d07304bd3d06e4aff3f5a82fa22bcf5d1690013eb922
-
Filesize
12KB
MD5564bb0373067e1785cba7e4c24aab4bf
SHA17c9416a01d821b10b2eef97b80899d24014d6fc1
SHA2567a9ddee34562cd3703f1502b5c70e99cd5bba15de2b6845a3555033d7f6cb2a5
SHA51222c61a323cb9293d7ec5c7e7e60674d0e2f7b29d55be25eb3c128ea2cd7440a1400cee17c43896b996278007c0d247f331a9b8964e3a40a0eb1404a9596c4472
-
Filesize
828KB
MD5d5ea9b5814553bd2f9bbb8bf0ea94ed6
SHA129629836c088dcd968efb321832edcbcfaac5b51
SHA2565ea67d6b7f67301ca214af511740f26b9e6cc9e16b2c0ec7bba071d05b9bde78
SHA5126867452995c8354622fe22ce4fb4868d2b9cb28bb31aa60b42f06e494b952f66c427aa66c7af09240954bf55ebcde62d4c7feb9d99e742ea3bc5beb3756a7a1e