Analysis
-
max time kernel
152s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/06/2024, 16:50
Static task
static1
Behavioral task
behavioral1
Sample
PAYMENT/PAYMENT.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
PAYMENT/PAYMENT.exe
Resource
win10v2004-20240226-en
General
-
Target
PAYMENT/PAYMENT.exe
-
Size
718KB
-
MD5
e5fb1ad0fe2d7dac48b746ae3b30efa5
-
SHA1
9333774c9852c0a44ef0424d7e3a5cca3191f407
-
SHA256
99eca75ecef2bc528d8aed538d1eb4517176948bd6688fc18cd915e0312c9da2
-
SHA512
091cf8131dc054a61774b17dcb9c032666817f7e3760d194716dfc406ea78df66a85f90bd0b4136cebaadd7f01c5fba0bf2ca09b87e3c4be189bd70426e8b049
-
SSDEEP
12288:U34O+O4KNr+u/7mwQL2Hh4LJl8PcMaAqLT/hLP9Fb03gYYdVFaDRGO7NyxBCV:U3lCu/6wQn9CPcMaPLz1sY7Fa9dNyxgV
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3536 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation PAYMENT.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3456 set thread context of 4488 3456 PAYMENT.exe 102 PID 4488 set thread context of 3372 4488 PAYMENT.exe 57 PID 4488 set thread context of 4580 4488 PAYMENT.exe 105 PID 4580 set thread context of 3372 4580 fontview.exe 57 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3456 PAYMENT.exe 3456 PAYMENT.exe 3456 PAYMENT.exe 3456 PAYMENT.exe 3536 powershell.exe 3536 powershell.exe 3536 powershell.exe 4488 PAYMENT.exe 4488 PAYMENT.exe 4488 PAYMENT.exe 4488 PAYMENT.exe 4488 PAYMENT.exe 4488 PAYMENT.exe 4488 PAYMENT.exe 4488 PAYMENT.exe 4488 PAYMENT.exe 4488 PAYMENT.exe 4488 PAYMENT.exe 4488 PAYMENT.exe 4488 PAYMENT.exe 4488 PAYMENT.exe 4488 PAYMENT.exe 4488 PAYMENT.exe 4488 PAYMENT.exe 4488 PAYMENT.exe 4488 PAYMENT.exe 4488 PAYMENT.exe 4488 PAYMENT.exe 4488 PAYMENT.exe 4488 PAYMENT.exe 4580 fontview.exe 4580 fontview.exe 4580 fontview.exe 4580 fontview.exe 4580 fontview.exe 4580 fontview.exe 4580 fontview.exe 4580 fontview.exe 4580 fontview.exe 4580 fontview.exe 4580 fontview.exe 4580 fontview.exe 4580 fontview.exe 4580 fontview.exe 4580 fontview.exe 4580 fontview.exe 4580 fontview.exe 4580 fontview.exe 4580 fontview.exe 4580 fontview.exe 4580 fontview.exe 4580 fontview.exe 4580 fontview.exe 4580 fontview.exe 4580 fontview.exe 4580 fontview.exe 4580 fontview.exe 4580 fontview.exe 4580 fontview.exe 4580 fontview.exe 4580 fontview.exe 4580 fontview.exe 4580 fontview.exe 4580 fontview.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4488 PAYMENT.exe 3372 Explorer.EXE 3372 Explorer.EXE 4580 fontview.exe 4580 fontview.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3456 PAYMENT.exe Token: SeDebugPrivilege 3536 powershell.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3456 wrote to memory of 3536 3456 PAYMENT.exe 98 PID 3456 wrote to memory of 3536 3456 PAYMENT.exe 98 PID 3456 wrote to memory of 3536 3456 PAYMENT.exe 98 PID 3456 wrote to memory of 3292 3456 PAYMENT.exe 100 PID 3456 wrote to memory of 3292 3456 PAYMENT.exe 100 PID 3456 wrote to memory of 3292 3456 PAYMENT.exe 100 PID 3456 wrote to memory of 5032 3456 PAYMENT.exe 101 PID 3456 wrote to memory of 5032 3456 PAYMENT.exe 101 PID 3456 wrote to memory of 5032 3456 PAYMENT.exe 101 PID 3456 wrote to memory of 4488 3456 PAYMENT.exe 102 PID 3456 wrote to memory of 4488 3456 PAYMENT.exe 102 PID 3456 wrote to memory of 4488 3456 PAYMENT.exe 102 PID 3456 wrote to memory of 4488 3456 PAYMENT.exe 102 PID 3456 wrote to memory of 4488 3456 PAYMENT.exe 102 PID 3456 wrote to memory of 4488 3456 PAYMENT.exe 102 PID 3372 wrote to memory of 4580 3372 Explorer.EXE 105 PID 3372 wrote to memory of 4580 3372 Explorer.EXE 105 PID 3372 wrote to memory of 4580 3372 Explorer.EXE 105
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Users\Admin\AppData\Local\Temp\PAYMENT\PAYMENT.exe"C:\Users\Admin\AppData\Local\Temp\PAYMENT\PAYMENT.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\PAYMENT\PAYMENT.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3536
-
-
C:\Users\Admin\AppData\Local\Temp\PAYMENT\PAYMENT.exe"C:\Users\Admin\AppData\Local\Temp\PAYMENT\PAYMENT.exe"3⤵PID:3292
-
-
C:\Users\Admin\AppData\Local\Temp\PAYMENT\PAYMENT.exe"C:\Users\Admin\AppData\Local\Temp\PAYMENT\PAYMENT.exe"3⤵PID:5032
-
-
C:\Users\Admin\AppData\Local\Temp\PAYMENT\PAYMENT.exe"C:\Users\Admin\AppData\Local\Temp\PAYMENT\PAYMENT.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4488
-
-
-
C:\Windows\SysWOW64\fontview.exe"C:\Windows\SysWOW64\fontview.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1408 --field-trial-handle=2744,i,16362475727591565961,3676688664819797550,262144 --variations-seed-version /prefetch:81⤵PID:4392
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82