Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/03/2024, 13:59
Static task
static1
Behavioral task
behavioral1
Sample
PAYMENT CONFIRMATION URGENT ATTENTION NEEDED.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
PAYMENT CONFIRMATION URGENT ATTENTION NEEDED.exe
Resource
win10-20240221-en
Behavioral task
behavioral3
Sample
PAYMENT CONFIRMATION URGENT ATTENTION NEEDED.exe
Resource
win10v2004-20240226-en
General
-
Target
PAYMENT CONFIRMATION URGENT ATTENTION NEEDED.exe
-
Size
759KB
-
MD5
8112f2b670cb05ca4f3729228e580bdb
-
SHA1
cda41721469846c7d7ff46eeaaee59238ea613eb
-
SHA256
3954509f8c88aa06aa91564d36418ac72e9e03cb09a19778bb7521e2d0a8736a
-
SHA512
5070a005f092f122528994dfc2064892f27654c045835b86bfbc4813636808e24fe5b571b408c708d68ffa4e3c6a7e5da5f4ed945ebf917d0a6116f0a6022e8e
-
SSDEEP
12288:WbKpzN6SmqepTkUzxeJG5lTpktrcXntQ4HdpgfH5yMhC10zURZW:qKpESGTtxG81irYtQYdpWyb
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2564 proquota.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 2076 set thread context of 2596 2076 PAYMENT CONFIRMATION URGENT ATTENTION NEEDED.exe 28 PID 2596 set thread context of 2076 2596 PAYMENT CONFIRMATION URGENT ATTENTION NEEDED.exe 27 PID 2596 set thread context of 1208 2596 PAYMENT CONFIRMATION URGENT ATTENTION NEEDED.exe 21 PID 2596 set thread context of 2564 2596 PAYMENT CONFIRMATION URGENT ATTENTION NEEDED.exe 31 PID 2564 set thread context of 1208 2564 proquota.exe 21 -
description ioc Process Key created \Registry\User\S-1-5-21-1298544033-3225604241-2703760938-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 proquota.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 2076 PAYMENT CONFIRMATION URGENT ATTENTION NEEDED.exe 2076 PAYMENT CONFIRMATION URGENT ATTENTION NEEDED.exe 2076 PAYMENT CONFIRMATION URGENT ATTENTION NEEDED.exe 2076 PAYMENT CONFIRMATION URGENT ATTENTION NEEDED.exe 2076 PAYMENT CONFIRMATION URGENT ATTENTION NEEDED.exe 2076 PAYMENT CONFIRMATION URGENT ATTENTION NEEDED.exe 2076 PAYMENT CONFIRMATION URGENT ATTENTION NEEDED.exe 2596 PAYMENT CONFIRMATION URGENT ATTENTION NEEDED.exe 2596 PAYMENT CONFIRMATION URGENT ATTENTION NEEDED.exe 2596 PAYMENT CONFIRMATION URGENT ATTENTION NEEDED.exe 2596 PAYMENT CONFIRMATION URGENT ATTENTION NEEDED.exe 2596 PAYMENT CONFIRMATION URGENT ATTENTION NEEDED.exe 2596 PAYMENT CONFIRMATION URGENT ATTENTION NEEDED.exe 2596 PAYMENT CONFIRMATION URGENT ATTENTION NEEDED.exe 2596 PAYMENT CONFIRMATION URGENT ATTENTION NEEDED.exe 2596 PAYMENT CONFIRMATION URGENT ATTENTION NEEDED.exe 2564 proquota.exe 2564 proquota.exe 2564 proquota.exe 2564 proquota.exe 2564 proquota.exe 2564 proquota.exe 2564 proquota.exe 2564 proquota.exe 2564 proquota.exe 2564 proquota.exe 2564 proquota.exe 2564 proquota.exe 2564 proquota.exe 2564 proquota.exe 2564 proquota.exe 2564 proquota.exe 2564 proquota.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1208 Explorer.EXE -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 2596 PAYMENT CONFIRMATION URGENT ATTENTION NEEDED.exe 2596 PAYMENT CONFIRMATION URGENT ATTENTION NEEDED.exe 1208 Explorer.EXE 1208 Explorer.EXE 2564 proquota.exe 2564 proquota.exe 2564 proquota.exe 2564 proquota.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2076 PAYMENT CONFIRMATION URGENT ATTENTION NEEDED.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2596 2076 PAYMENT CONFIRMATION URGENT ATTENTION NEEDED.exe 28 PID 2076 wrote to memory of 2596 2076 PAYMENT CONFIRMATION URGENT ATTENTION NEEDED.exe 28 PID 2076 wrote to memory of 2596 2076 PAYMENT CONFIRMATION URGENT ATTENTION NEEDED.exe 28 PID 2076 wrote to memory of 2596 2076 PAYMENT CONFIRMATION URGENT ATTENTION NEEDED.exe 28 PID 2076 wrote to memory of 2596 2076 PAYMENT CONFIRMATION URGENT ATTENTION NEEDED.exe 28 PID 2076 wrote to memory of 2596 2076 PAYMENT CONFIRMATION URGENT ATTENTION NEEDED.exe 28 PID 2076 wrote to memory of 2596 2076 PAYMENT CONFIRMATION URGENT ATTENTION NEEDED.exe 28 PID 1208 wrote to memory of 2564 1208 Explorer.EXE 31 PID 1208 wrote to memory of 2564 1208 Explorer.EXE 31 PID 1208 wrote to memory of 2564 1208 Explorer.EXE 31 PID 1208 wrote to memory of 2564 1208 Explorer.EXE 31 PID 2564 wrote to memory of 1964 2564 proquota.exe 34 PID 2564 wrote to memory of 1964 2564 proquota.exe 34 PID 2564 wrote to memory of 1964 2564 proquota.exe 34 PID 2564 wrote to memory of 1964 2564 proquota.exe 34 PID 2564 wrote to memory of 1964 2564 proquota.exe 34
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\PAYMENT CONFIRMATION URGENT ATTENTION NEEDED.exe"C:\Users\Admin\AppData\Local\Temp\PAYMENT CONFIRMATION URGENT ATTENTION NEEDED.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\PAYMENT CONFIRMATION URGENT ATTENTION NEEDED.exe"C:\Users\Admin\AppData\Local\Temp\PAYMENT CONFIRMATION URGENT ATTENTION NEEDED.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2596
-
-
-
C:\Windows\SysWOW64\proquota.exe"C:\Windows\SysWOW64\proquota.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1964
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
486KB
MD51e73cacce02ae20026a81f1e56416aa3
SHA1f491a7301ce11cf11a92c0245c7e03d927422286
SHA2560dd0dd38cde5a14e7d6d0830db62cc7037e521fd042b0b8da0763128b2c0b3f2
SHA512afe77facd8b16cc744ac2277414ffaf83436999d15eb8ac707f8098e2f8ed4cb29b430392ebe46b7fa65b20730615bc33dee9416f7141da5032a630894980a0a
-
Filesize
927KB
MD57fd80b1cc72dc580c02ca4cfbfb2592d
SHA118da905af878b27151b359cf1a7d0a650764e8a1
SHA2561e6dccbdf8527abb53c289da920463b7895300d0d984cc7e91a3ecda4e673190
SHA51213f7f29b5ed31c551aa5f27742557aa4d026a226087d6fcbca094819759ecc753a2c33b7422ae88dc6a4a0a966edb8485a18e59a0283ba2686cae5d78e0190a3