Overview
overview
7Static
static
3Scanned Pu...py.exe
windows7-x64
7Scanned Pu...py.exe
windows10-1703-x64
7Scanned Pu...py.exe
windows10-2004-x64
7Scanned Pu...py.exe
windows11-21h2-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-1703-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows11-21h2-x64
3Analysis
-
max time kernel
167s -
max time network
180s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
05-08-2024 13:07
Static task
static1
Behavioral task
behavioral1
Sample
Scanned Purchase Copy.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Scanned Purchase Copy.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
Scanned Purchase Copy.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
Scanned Purchase Copy.exe
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10-20240404-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win11-20240802-en
General
-
Target
Scanned Purchase Copy.exe
-
Size
840KB
-
MD5
f0ac6e417bcb277b0f77a68d569221e2
-
SHA1
fe3c587bbc5288889d9af771d27f32588027f51b
-
SHA256
f8ad0d0ae8b7c856e33237282a0f3ea323ae03b9bb6e058a58a7b22f004a4e3f
-
SHA512
2dc6d75298f241453020cddd913e962b216918cba87958faf40a33a61e6abbd1833b1ccc93440f0b0c5facbcfad7a02dad1a60050c18e6d800d557d5cc39ecaa
-
SSDEEP
12288:yX7cSNszmBR4fZrJpRLR22IZwJe3jFPS4YKcw+8VirmaAEO/YZwVct3iS7JC:yX7Gm7wE3jhlYKVafO/Tw7JC
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 3068 Scanned Purchase Copy.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 1 drive.google.com 2 drive.google.com -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1480 Scanned Purchase Copy.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3068 Scanned Purchase Copy.exe 1480 Scanned Purchase Copy.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3068 set thread context of 1480 3068 Scanned Purchase Copy.exe 78 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Scanned Purchase Copy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Scanned Purchase Copy.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1480 Scanned Purchase Copy.exe 1480 Scanned Purchase Copy.exe 1480 Scanned Purchase Copy.exe 1480 Scanned Purchase Copy.exe 1480 Scanned Purchase Copy.exe 1480 Scanned Purchase Copy.exe 1480 Scanned Purchase Copy.exe 1480 Scanned Purchase Copy.exe 1480 Scanned Purchase Copy.exe 1480 Scanned Purchase Copy.exe 1480 Scanned Purchase Copy.exe 1480 Scanned Purchase Copy.exe 1480 Scanned Purchase Copy.exe 1480 Scanned Purchase Copy.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3068 Scanned Purchase Copy.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3068 wrote to memory of 1480 3068 Scanned Purchase Copy.exe 78 PID 3068 wrote to memory of 1480 3068 Scanned Purchase Copy.exe 78 PID 3068 wrote to memory of 1480 3068 Scanned Purchase Copy.exe 78 PID 3068 wrote to memory of 1480 3068 Scanned Purchase Copy.exe 78 PID 3068 wrote to memory of 1480 3068 Scanned Purchase Copy.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\Scanned Purchase Copy.exe"C:\Users\Admin\AppData\Local\Temp\Scanned Purchase Copy.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\Scanned Purchase Copy.exe"C:\Users\Admin\AppData\Local\Temp\Scanned Purchase Copy.exe"2⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1480
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:1068
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD54add245d4ba34b04f213409bfe504c07
SHA1ef756d6581d70e87d58cc4982e3f4d18e0ea5b09
SHA2569111099efe9d5c9b391dc132b2faf0a3851a760d4106d5368e30ac744eb42706
SHA5121bd260cabe5ea3cefbbc675162f30092ab157893510f45a1b571489e03ebb2903c55f64f89812754d3fe03c8f10012b8078d1261a7e73ac1f87c82f714bce03d