Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
15/04/2024, 19:44
Behavioral task
behavioral1
Sample
Credit_Card_Generator.rar
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
Credit_Card_Generator.rar
Resource
win10v2004-20240412-en
General
-
Target
Credit_Card_Generator.rar
-
Size
6.7MB
-
MD5
26515231a367ffe425a46b143435f556
-
SHA1
c79cc5bcc134dfd0591444d797d6b4bef5fbd9d5
-
SHA256
d741ff9965978c828a9517b0b1d3ad6a8997762af665a53857e03e6abb89b5b8
-
SHA512
264a4cfa4d2253b5f7d33c6d49be90276babd50a359ed35b1be3aa095ab7a5779c16143a998a7df979bb110eb4db2457a9c0f055d0a5d0425058ffaf8d454674
-
SSDEEP
196608:175pJmw0HJHIHznEQWQY13LrTA5+XX8iQtnQ+StfTQE:5o7pyEQHK05VfStH
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1668 Credit Card Generator Setup.exe 1748 Credit Card Generator Setup.exe -
Loads dropped DLL 4 IoCs
pid Process 1132 Process not Found 1132 Process not Found 1748 Credit Card Generator Setup.exe 1132 Process not Found -
resource yara_rule behavioral1/files/0x000600000001745d-56.dat upx behavioral1/memory/1748-58-0x000007FEF5770000-0x000007FEF5D5A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2576 NOTEPAD.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2552 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 2552 7zFM.exe Token: 35 2552 7zFM.exe Token: SeSecurityPrivilege 2552 7zFM.exe Token: SeSecurityPrivilege 2552 7zFM.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 2552 7zFM.exe 2552 7zFM.exe 2552 7zFM.exe 2552 7zFM.exe 3012 SndVol.exe 3012 SndVol.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 3012 SndVol.exe 3012 SndVol.exe 3012 SndVol.exe 3012 SndVol.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2552 2252 cmd.exe 29 PID 2252 wrote to memory of 2552 2252 cmd.exe 29 PID 2252 wrote to memory of 2552 2252 cmd.exe 29 PID 2552 wrote to memory of 2576 2552 7zFM.exe 30 PID 2552 wrote to memory of 2576 2552 7zFM.exe 30 PID 2552 wrote to memory of 2576 2552 7zFM.exe 30 PID 1668 wrote to memory of 1748 1668 Credit Card Generator Setup.exe 37 PID 1668 wrote to memory of 1748 1668 Credit Card Generator Setup.exe 37 PID 1668 wrote to memory of 1748 1668 Credit Card Generator Setup.exe 37
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Credit_Card_Generator.rar1⤵
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Credit_Card_Generator.rar"2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\7zO8F989746\Password_Credit.txt3⤵
- Opens file in notepad (likely ransom note)
PID:2576
-
-
-
C:\Windows\system32\SndVol.exeSndVol.exe -f 45548699 223651⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3012
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵PID:1560
-
C:\Users\Admin\Desktop\Credit Card Generator Setup.exe"C:\Users\Admin\Desktop\Credit Card Generator Setup.exe"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\Desktop\Credit Card Generator Setup.exe"C:\Users\Admin\Desktop\Credit Card Generator Setup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39B
MD5b7848233394532164483d16ba92d6980
SHA1b50b88a6de5fd6d641e9f22afbfeff76fd57aa95
SHA256d7ccdc0c5741d1cdc62542e0ac111ecfff781a1b0ab49f5e9547ddb3f3696df4
SHA512f7fdfbfb2bc1c2259a8a83ac2105757956f64dac9c0907f1abf767c581d22c0c8bf0c620c1956727418bee5931e6b43a8954e35c9453d89b70cc120589423914
-
Filesize
1.6MB
MD51e76961ca11f929e4213fca8272d0194
SHA1e52763b7ba970c3b14554065f8c2404112f53596
SHA2568a0c27f9e5b2efd54e41d7e7067d7cb1c6d23bae5229f6d750f89568566227b0
SHA512ec6ed913e0142a98cd7f6adced5671334ec6545e583284ae10627162b199e55867d7cf28efeaadce9862c978b01c234a850288e529d2d3e2ac7dbbb99c6cde9b
-
Filesize
6.8MB
MD54c9131a29420ef639e6b00384fc56a14
SHA1c89774e6ade2fb43d063cd0ef7d7295ecbb4fd91
SHA2561580cb73273e63ee07e4e6ca8541354786ce6c624a8f1106cb828f04ca6b22d8
SHA51299856fde62480721118321c8ddac89b30dcf3fcce78f9e4724aedf4e118ae3f00594785a86fac553900f8735ebf219e2d1e6b2ab4c5695ec27014c518bc8a6e0