Analysis

  • max time kernel
    152s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/06/2024, 16:50

General

  • Target

    PAYMENT/PAYMENT.exe

  • Size

    718KB

  • MD5

    e5fb1ad0fe2d7dac48b746ae3b30efa5

  • SHA1

    9333774c9852c0a44ef0424d7e3a5cca3191f407

  • SHA256

    99eca75ecef2bc528d8aed538d1eb4517176948bd6688fc18cd915e0312c9da2

  • SHA512

    091cf8131dc054a61774b17dcb9c032666817f7e3760d194716dfc406ea78df66a85f90bd0b4136cebaadd7f01c5fba0bf2ca09b87e3c4be189bd70426e8b049

  • SSDEEP

    12288:U34O+O4KNr+u/7mwQL2Hh4LJl8PcMaAqLT/hLP9Fb03gYYdVFaDRGO7NyxBCV:U3lCu/6wQn9CPcMaPLz1sY7Fa9dNyxgV

Score
8/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:3372
    • C:\Users\Admin\AppData\Local\Temp\PAYMENT\PAYMENT.exe
      "C:\Users\Admin\AppData\Local\Temp\PAYMENT\PAYMENT.exe"
      2⤵
      • Checks computer location settings
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3456
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\PAYMENT\PAYMENT.exe"
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3536
      • C:\Users\Admin\AppData\Local\Temp\PAYMENT\PAYMENT.exe
        "C:\Users\Admin\AppData\Local\Temp\PAYMENT\PAYMENT.exe"
        3⤵
          PID:3292
        • C:\Users\Admin\AppData\Local\Temp\PAYMENT\PAYMENT.exe
          "C:\Users\Admin\AppData\Local\Temp\PAYMENT\PAYMENT.exe"
          3⤵
            PID:5032
          • C:\Users\Admin\AppData\Local\Temp\PAYMENT\PAYMENT.exe
            "C:\Users\Admin\AppData\Local\Temp\PAYMENT\PAYMENT.exe"
            3⤵
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            PID:4488
        • C:\Windows\SysWOW64\fontview.exe
          "C:\Windows\SysWOW64\fontview.exe"
          2⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          PID:4580
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1408 --field-trial-handle=2744,i,16362475727591565961,3676688664819797550,262144 --variations-seed-version /prefetch:8
        1⤵
          PID:4392

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_q52mpqxh.knh.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • memory/3372-67-0x000000000D200000-0x000000000DB13000-memory.dmp

          Filesize

          9.1MB

        • memory/3372-73-0x000000000D200000-0x000000000DB13000-memory.dmp

          Filesize

          9.1MB

        • memory/3372-75-0x00000000031F0000-0x00000000032AC000-memory.dmp

          Filesize

          752KB

        • memory/3456-7-0x00000000082D0000-0x00000000082DE000-memory.dmp

          Filesize

          56KB

        • memory/3456-4-0x00000000747D0000-0x0000000074F80000-memory.dmp

          Filesize

          7.7MB

        • memory/3456-5-0x0000000005880000-0x000000000588A000-memory.dmp

          Filesize

          40KB

        • memory/3456-6-0x0000000005B40000-0x0000000005B56000-memory.dmp

          Filesize

          88KB

        • memory/3456-3-0x00000000056C0000-0x0000000005752000-memory.dmp

          Filesize

          584KB

        • memory/3456-8-0x00000000082E0000-0x00000000082F0000-memory.dmp

          Filesize

          64KB

        • memory/3456-9-0x0000000008390000-0x000000000841A000-memory.dmp

          Filesize

          552KB

        • memory/3456-10-0x000000000AB60000-0x000000000ABFC000-memory.dmp

          Filesize

          624KB

        • memory/3456-12-0x00000000747DE000-0x00000000747DF000-memory.dmp

          Filesize

          4KB

        • memory/3456-17-0x00000000747D0000-0x0000000074F80000-memory.dmp

          Filesize

          7.7MB

        • memory/3456-2-0x0000000005B70000-0x0000000006114000-memory.dmp

          Filesize

          5.6MB

        • memory/3456-1-0x0000000000C20000-0x0000000000CDA000-memory.dmp

          Filesize

          744KB

        • memory/3456-0-0x00000000747DE000-0x00000000747DF000-memory.dmp

          Filesize

          4KB

        • memory/3536-38-0x0000000071090000-0x00000000710DC000-memory.dmp

          Filesize

          304KB

        • memory/3536-56-0x0000000007460000-0x000000000746E000-memory.dmp

          Filesize

          56KB

        • memory/3536-20-0x0000000004FD0000-0x0000000004FF2000-memory.dmp

          Filesize

          136KB

        • memory/3536-21-0x00000000056D0000-0x0000000005736000-memory.dmp

          Filesize

          408KB

        • memory/3536-22-0x0000000005740000-0x00000000057A6000-memory.dmp

          Filesize

          408KB

        • memory/3536-32-0x00000000058F0000-0x0000000005C44000-memory.dmp

          Filesize

          3.3MB

        • memory/3536-33-0x0000000005E90000-0x0000000005EAE000-memory.dmp

          Filesize

          120KB

        • memory/3536-34-0x0000000005F80000-0x0000000005FCC000-memory.dmp

          Filesize

          304KB

        • memory/3536-35-0x00000000747D0000-0x0000000074F80000-memory.dmp

          Filesize

          7.7MB

        • memory/3536-36-0x00000000064F0000-0x0000000006522000-memory.dmp

          Filesize

          200KB

        • memory/3536-48-0x00000000064D0000-0x00000000064EE000-memory.dmp

          Filesize

          120KB

        • memory/3536-18-0x00000000747D0000-0x0000000074F80000-memory.dmp

          Filesize

          7.7MB

        • memory/3536-49-0x0000000006F20000-0x0000000006FC3000-memory.dmp

          Filesize

          652KB

        • memory/3536-37-0x00000000747D0000-0x0000000074F80000-memory.dmp

          Filesize

          7.7MB

        • memory/3536-51-0x0000000007230000-0x000000000724A000-memory.dmp

          Filesize

          104KB

        • memory/3536-50-0x0000000007870000-0x0000000007EEA000-memory.dmp

          Filesize

          6.5MB

        • memory/3536-52-0x00000000072A0000-0x00000000072AA000-memory.dmp

          Filesize

          40KB

        • memory/3536-53-0x00000000074B0000-0x0000000007546000-memory.dmp

          Filesize

          600KB

        • memory/3536-54-0x0000000007430000-0x0000000007441000-memory.dmp

          Filesize

          68KB

        • memory/3536-19-0x0000000005030000-0x0000000005658000-memory.dmp

          Filesize

          6.2MB

        • memory/3536-57-0x0000000007470000-0x0000000007484000-memory.dmp

          Filesize

          80KB

        • memory/3536-58-0x0000000007570000-0x000000000758A000-memory.dmp

          Filesize

          104KB

        • memory/3536-59-0x0000000007550000-0x0000000007558000-memory.dmp

          Filesize

          32KB

        • memory/3536-62-0x00000000747D0000-0x0000000074F80000-memory.dmp

          Filesize

          7.7MB

        • memory/3536-13-0x00000000747DE000-0x00000000747DF000-memory.dmp

          Filesize

          4KB

        • memory/3536-15-0x00000000048E0000-0x0000000004916000-memory.dmp

          Filesize

          216KB

        • memory/3536-16-0x00000000747D0000-0x0000000074F80000-memory.dmp

          Filesize

          7.7MB

        • memory/4488-64-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/4488-66-0x0000000000E60000-0x0000000000E80000-memory.dmp

          Filesize

          128KB

        • memory/4488-65-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/4488-63-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/4488-71-0x0000000000E60000-0x0000000000E80000-memory.dmp

          Filesize

          128KB

        • memory/4488-70-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/4488-55-0x0000000000F50000-0x000000000129A000-memory.dmp

          Filesize

          3.3MB

        • memory/4488-11-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/4580-68-0x0000000000550000-0x000000000058F000-memory.dmp

          Filesize

          252KB

        • memory/4580-69-0x0000000000550000-0x000000000058F000-memory.dmp

          Filesize

          252KB

        • memory/4580-72-0x0000000000550000-0x000000000058F000-memory.dmp

          Filesize

          252KB

        • memory/4580-74-0x0000000000550000-0x000000000058F000-memory.dmp

          Filesize

          252KB