Analysis
-
max time kernel
127s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2024 01:29
Static task
static1
Behavioral task
behavioral1
Sample
payment copy.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
payment copy.exe
Resource
win10v2004-20240802-en
General
-
Target
payment copy.exe
-
Size
1.3MB
-
MD5
f16f79d6651c6448e0b85cf506c252e8
-
SHA1
55efea0d0f02e99d3fc5f0268354b2d3ce2cdf15
-
SHA256
a9d923f7331c42376f9d0893b6cc1ce6a9ba2c8f3627571f541efd3729ba5b7c
-
SHA512
1346a31e312de2846be8bfab5edba397618e38e22c2fb8599d9a9ee8c8063655763331388c886aae0cbb7b79dd4a4fa5a7515fe460af8bdbd6db925bdf31fb3d
-
SSDEEP
24576:ffmMv6Ckr7Mny5QL+8QVmfr2j/Kz/n44Z7oOOteEVilks9JPhsgsK4ZCOl:f3v+7/5QL+8QVmfo+XojeEG9IgsKOH
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2692 set thread context of 3296 2692 payment copy.exe 89 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language payment copy.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 3296 svchost.exe 3296 svchost.exe 3296 svchost.exe 3296 svchost.exe 3296 svchost.exe 3296 svchost.exe 3296 svchost.exe 3296 svchost.exe 3296 svchost.exe 3296 svchost.exe 3296 svchost.exe 3296 svchost.exe 3296 svchost.exe 3296 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2692 payment copy.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2692 wrote to memory of 3296 2692 payment copy.exe 89 PID 2692 wrote to memory of 3296 2692 payment copy.exe 89 PID 2692 wrote to memory of 3296 2692 payment copy.exe 89 PID 2692 wrote to memory of 3296 2692 payment copy.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\payment copy.exe"C:\Users\Admin\AppData\Local\Temp\payment copy.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\payment copy.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4248,i,15436195446242760253,4000484513008731869,262144 --variations-seed-version --mojo-platform-channel-handle=1308 /prefetch:81⤵PID:2776