Analysis
-
max time kernel
96s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 08:36
Static task
static1
Behavioral task
behavioral1
Sample
PROFORMA INVOICE BKS-0121-24-25-JP240604.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PROFORMA INVOICE BKS-0121-24-25-JP240604.exe
Resource
win10v2004-20240802-en
General
-
Target
PROFORMA INVOICE BKS-0121-24-25-JP240604.exe
-
Size
1.3MB
-
MD5
2d7b8c66b77445f402f18ae1074eed34
-
SHA1
30c2bfd7f1b013360a7a2d5e956d790e79224558
-
SHA256
b46420c24a371b5b05317ec59c65e7c7d6fdbfb772460f8f812810d7871da039
-
SHA512
931e42f10c550d11cef1dddc18829b39333fe41e82a2bbe059fcd45087ed10ad356e249b04f812fd2757f2d9855005445faf67eff1df0c366829ac6e0f2b16f2
-
SSDEEP
24576:HqDEvCTbMWu7rQYlBQcBiT6rprG8akQIUbOKmlWzhKNy4t8Mn:HTvC/MTQYxsWR7akzwmQWyS8M
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3932 set thread context of 1020 3932 PROFORMA INVOICE BKS-0121-24-25-JP240604.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PROFORMA INVOICE BKS-0121-24-25-JP240604.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1020 svchost.exe 1020 svchost.exe 1020 svchost.exe 1020 svchost.exe 1020 svchost.exe 1020 svchost.exe 1020 svchost.exe 1020 svchost.exe 1020 svchost.exe 1020 svchost.exe 1020 svchost.exe 1020 svchost.exe 1020 svchost.exe 1020 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3932 PROFORMA INVOICE BKS-0121-24-25-JP240604.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3932 PROFORMA INVOICE BKS-0121-24-25-JP240604.exe 3932 PROFORMA INVOICE BKS-0121-24-25-JP240604.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 3932 PROFORMA INVOICE BKS-0121-24-25-JP240604.exe 3932 PROFORMA INVOICE BKS-0121-24-25-JP240604.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3932 wrote to memory of 1020 3932 PROFORMA INVOICE BKS-0121-24-25-JP240604.exe 86 PID 3932 wrote to memory of 1020 3932 PROFORMA INVOICE BKS-0121-24-25-JP240604.exe 86 PID 3932 wrote to memory of 1020 3932 PROFORMA INVOICE BKS-0121-24-25-JP240604.exe 86 PID 3932 wrote to memory of 1020 3932 PROFORMA INVOICE BKS-0121-24-25-JP240604.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\PROFORMA INVOICE BKS-0121-24-25-JP240604.exe"C:\Users\Admin\AppData\Local\Temp\PROFORMA INVOICE BKS-0121-24-25-JP240604.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\PROFORMA INVOICE BKS-0121-24-25-JP240604.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
282KB
MD5b9dce5146beebc2eaa400dc418215fc1
SHA1b9831f930a3af324d9e7438c58eb2231dfd6cc21
SHA2567fa49df8d097b72b4c7dec76c56d24b42571a2e658825ec154bfd5cf741032b9
SHA512372aa4b7300d5ea1b884ee7a4ad3025ee284bd4ff030304012319151d18aed6f08bfe42dda762a90c21d44eccb0d177d368020ff574bcb8a62996d79f200289e