Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 14:47
Static task
static1
Behavioral task
behavioral1
Sample
factura.Doc .exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
factura.Doc .exe
Resource
win10v2004-20240802-en
General
-
Target
factura.Doc .exe
-
Size
316KB
-
MD5
6a742fda92d69762d107c078adf70ad3
-
SHA1
739f282d0fd97e29ae5211f076de165345885cf9
-
SHA256
b78c094b662f6aed75b48d0c4fcc6d5f302e59af9b9dabefb274c4828d65b9e0
-
SHA512
3b66b223c308a56b557959e8f539f4aa4ac893e5cb85dd0d71b94ba543a42d6b95b2179ef937630d4c53fdcaf1c84786255fc297017bcab80c953d6fdea2febc
-
SSDEEP
6144:IjDbTozsd9qV6hsp0bD6oVMPmIty5hTTJlw6Qw37jhbVRf19G3q:x4qssG6pP3Y5tPSwhvN98q
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2888 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2144 ysca.exe -
Loads dropped DLL 2 IoCs
pid Process 1688 factura.Doc .exe 1688 factura.Doc .exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\{ED60B7C8-3C80-AD4F-2955-D827011AFB3A} = "C:\\Users\\Admin\\AppData\\Roaming\\Okza\\ysca.exe" ysca.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1688 set thread context of 2888 1688 factura.Doc .exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language factura.Doc .exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Privacy factura.Doc .exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" factura.Doc .exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2144 ysca.exe 2144 ysca.exe 2144 ysca.exe 2144 ysca.exe 2144 ysca.exe 2144 ysca.exe 2144 ysca.exe 2144 ysca.exe 2144 ysca.exe 2144 ysca.exe 2144 ysca.exe 2144 ysca.exe 2144 ysca.exe 2144 ysca.exe 2144 ysca.exe 2144 ysca.exe 2144 ysca.exe 2144 ysca.exe 2144 ysca.exe 2144 ysca.exe 2144 ysca.exe 2144 ysca.exe 2144 ysca.exe 2144 ysca.exe 2144 ysca.exe 2144 ysca.exe 2144 ysca.exe 2144 ysca.exe 2144 ysca.exe 2144 ysca.exe 2144 ysca.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1688 factura.Doc .exe 2144 ysca.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2144 1688 factura.Doc .exe 30 PID 1688 wrote to memory of 2144 1688 factura.Doc .exe 30 PID 1688 wrote to memory of 2144 1688 factura.Doc .exe 30 PID 1688 wrote to memory of 2144 1688 factura.Doc .exe 30 PID 2144 wrote to memory of 1172 2144 ysca.exe 19 PID 2144 wrote to memory of 1172 2144 ysca.exe 19 PID 2144 wrote to memory of 1172 2144 ysca.exe 19 PID 2144 wrote to memory of 1172 2144 ysca.exe 19 PID 2144 wrote to memory of 1172 2144 ysca.exe 19 PID 2144 wrote to memory of 1284 2144 ysca.exe 20 PID 2144 wrote to memory of 1284 2144 ysca.exe 20 PID 2144 wrote to memory of 1284 2144 ysca.exe 20 PID 2144 wrote to memory of 1284 2144 ysca.exe 20 PID 2144 wrote to memory of 1284 2144 ysca.exe 20 PID 2144 wrote to memory of 1372 2144 ysca.exe 21 PID 2144 wrote to memory of 1372 2144 ysca.exe 21 PID 2144 wrote to memory of 1372 2144 ysca.exe 21 PID 2144 wrote to memory of 1372 2144 ysca.exe 21 PID 2144 wrote to memory of 1372 2144 ysca.exe 21 PID 2144 wrote to memory of 1352 2144 ysca.exe 23 PID 2144 wrote to memory of 1352 2144 ysca.exe 23 PID 2144 wrote to memory of 1352 2144 ysca.exe 23 PID 2144 wrote to memory of 1352 2144 ysca.exe 23 PID 2144 wrote to memory of 1352 2144 ysca.exe 23 PID 2144 wrote to memory of 1688 2144 ysca.exe 29 PID 2144 wrote to memory of 1688 2144 ysca.exe 29 PID 2144 wrote to memory of 1688 2144 ysca.exe 29 PID 2144 wrote to memory of 1688 2144 ysca.exe 29 PID 2144 wrote to memory of 1688 2144 ysca.exe 29 PID 1688 wrote to memory of 2888 1688 factura.Doc .exe 31 PID 1688 wrote to memory of 2888 1688 factura.Doc .exe 31 PID 1688 wrote to memory of 2888 1688 factura.Doc .exe 31 PID 1688 wrote to memory of 2888 1688 factura.Doc .exe 31 PID 1688 wrote to memory of 2888 1688 factura.Doc .exe 31 PID 1688 wrote to memory of 2888 1688 factura.Doc .exe 31 PID 1688 wrote to memory of 2888 1688 factura.Doc .exe 31 PID 1688 wrote to memory of 2888 1688 factura.Doc .exe 31 PID 1688 wrote to memory of 2888 1688 factura.Doc .exe 31
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1172
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1284
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\factura.Doc .exe"C:\Users\Admin\AppData\Local\Temp\factura.Doc .exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Roaming\Okza\ysca.exe"C:\Users\Admin\AppData\Roaming\Okza\ysca.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2144
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpfcb24552.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2888
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1352
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
347B
MD51c1954e58249adcee8418a1ad464e88b
SHA1e065ec8c92ca358da002d6f7bac5d1ac5097617d
SHA2561a21b8588d0d6525e3e4c0d786821e3065aa40f57003a0fc2a3f4b3c59586b2a
SHA5120a2871e5fa93a57aafc001aaa52a28972f929696afe96388b3b4245fe509383b40624e6bf8426f3a76955c7bc3024f0a0c41d56099a8fe7e2710df121315ba5a
-
Filesize
316KB
MD5525eb9cd4d5768d9392ca645c727f6fd
SHA1a190dca9f6d6b76a3a6cc13b99e8256ec57b9657
SHA2568e6a42e332c9b3aa131acc21bfd6435d48575049e282692205346a63e6122897
SHA5123ff0afafa5092f60a966bee212e4c2b3e078ef5ec9a377bc283e1a56a5a5286cb29851bb1646e2640400f3e676b6ba0f31594d8f54db4ecc624646b0efb3d335