Analysis
-
max time kernel
178s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 06:56
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1ST HIRE REMITANCE SLIP_USD280,000.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
1ST HIRE REMITANCE SLIP_USD280,000.exe
Resource
win10v2004-20231215-en
8 signatures
150 seconds
General
-
Target
1ST HIRE REMITANCE SLIP_USD280,000.exe
-
Size
649KB
-
MD5
eccf07847afbea25a8df68c3351375cf
-
SHA1
f5841cb1d9f7d8de1a08ceba7b4b68564f410e63
-
SHA256
5037f383f15e45cb88828e53082b6b643a024fafc8602dda686564e7b1f88dad
-
SHA512
0bc381908d518df6034a8c26963869b0061652bd01085b65613d4b238a1562230b7a05e75e4524b579935ac3e3fe3b60e7dc2366b899ef44a3d68dfabbed7f29
-
SSDEEP
12288:3KJmomWOHSn9KVsFQSeo/h8NFe8lasp16a1Ya+cnsP67go6se66rnNvTM5NncD:4b/BEkQSeo/h7clRUa96pvTWyD
Score
7/10
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 1300 icacls.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2944 set thread context of 532 2944 1ST HIRE REMITANCE SLIP_USD280,000.exe 93 PID 532 set thread context of 3452 532 1ST HIRE REMITANCE SLIP_USD280,000.exe 45 PID 532 set thread context of 1300 532 1ST HIRE REMITANCE SLIP_USD280,000.exe 96 PID 1300 set thread context of 3452 1300 icacls.exe 45 -
description ioc Process Key created \Registry\User\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 icacls.exe -
Suspicious behavior: EnumeratesProcesses 54 IoCs
pid Process 532 1ST HIRE REMITANCE SLIP_USD280,000.exe 532 1ST HIRE REMITANCE SLIP_USD280,000.exe 532 1ST HIRE REMITANCE SLIP_USD280,000.exe 532 1ST HIRE REMITANCE SLIP_USD280,000.exe 532 1ST HIRE REMITANCE SLIP_USD280,000.exe 532 1ST HIRE REMITANCE SLIP_USD280,000.exe 532 1ST HIRE REMITANCE SLIP_USD280,000.exe 532 1ST HIRE REMITANCE SLIP_USD280,000.exe 532 1ST HIRE REMITANCE SLIP_USD280,000.exe 532 1ST HIRE REMITANCE SLIP_USD280,000.exe 532 1ST HIRE REMITANCE SLIP_USD280,000.exe 532 1ST HIRE REMITANCE SLIP_USD280,000.exe 532 1ST HIRE REMITANCE SLIP_USD280,000.exe 532 1ST HIRE REMITANCE SLIP_USD280,000.exe 532 1ST HIRE REMITANCE SLIP_USD280,000.exe 532 1ST HIRE REMITANCE SLIP_USD280,000.exe 1300 icacls.exe 1300 icacls.exe 1300 icacls.exe 1300 icacls.exe 1300 icacls.exe 1300 icacls.exe 1300 icacls.exe 1300 icacls.exe 1300 icacls.exe 1300 icacls.exe 1300 icacls.exe 1300 icacls.exe 1300 icacls.exe 1300 icacls.exe 1300 icacls.exe 1300 icacls.exe 1300 icacls.exe 1300 icacls.exe 1300 icacls.exe 1300 icacls.exe 1300 icacls.exe 1300 icacls.exe 1300 icacls.exe 1300 icacls.exe 1300 icacls.exe 1300 icacls.exe 1300 icacls.exe 1300 icacls.exe 1300 icacls.exe 1300 icacls.exe 1300 icacls.exe 1300 icacls.exe 1300 icacls.exe 1300 icacls.exe 1300 icacls.exe 1300 icacls.exe 1300 icacls.exe 1300 icacls.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 532 1ST HIRE REMITANCE SLIP_USD280,000.exe 3452 Explorer.EXE 3452 Explorer.EXE 1300 icacls.exe 1300 icacls.exe 1300 icacls.exe 1300 icacls.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 3452 Explorer.EXE Token: SeCreatePagefilePrivilege 3452 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3452 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2944 wrote to memory of 532 2944 1ST HIRE REMITANCE SLIP_USD280,000.exe 93 PID 2944 wrote to memory of 532 2944 1ST HIRE REMITANCE SLIP_USD280,000.exe 93 PID 2944 wrote to memory of 532 2944 1ST HIRE REMITANCE SLIP_USD280,000.exe 93 PID 2944 wrote to memory of 532 2944 1ST HIRE REMITANCE SLIP_USD280,000.exe 93 PID 2944 wrote to memory of 532 2944 1ST HIRE REMITANCE SLIP_USD280,000.exe 93 PID 2944 wrote to memory of 532 2944 1ST HIRE REMITANCE SLIP_USD280,000.exe 93 PID 3452 wrote to memory of 1300 3452 Explorer.EXE 96 PID 3452 wrote to memory of 1300 3452 Explorer.EXE 96 PID 3452 wrote to memory of 1300 3452 Explorer.EXE 96 PID 1300 wrote to memory of 1728 1300 icacls.exe 97 PID 1300 wrote to memory of 1728 1300 icacls.exe 97 PID 1300 wrote to memory of 1728 1300 icacls.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ST HIRE REMITANCE SLIP_USD280,000.exe"C:\Users\Admin\AppData\Local\Temp\1ST HIRE REMITANCE SLIP_USD280,000.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\1ST HIRE REMITANCE SLIP_USD280,000.exe"C:\Users\Admin\AppData\Local\Temp\1ST HIRE REMITANCE SLIP_USD280,000.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:532
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Windows\SysWOW64\icacls.exe"C:\Windows\SysWOW64\icacls.exe"2⤵
- Modifies file permissions
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1728
-
-