Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16/10/2024, 10:39
Static task
static1
Behavioral task
behavioral1
Sample
Oustanding Invoices.exe
Resource
win7-20240903-en
General
-
Target
Oustanding Invoices.exe
-
Size
788KB
-
MD5
65061801d64c7154fdcafe07289fdd64
-
SHA1
88f6c3bc401aeddf395a409ece7ae3f44721a06c
-
SHA256
95e8ab1f03e2ab0b9b2591d310a42813726f13d6d2a4301bfd117c1c0c6fe9e1
-
SHA512
58aedadb06f2e0f664022832d43bf34136573db6106d0b620cd6554c1f31948eb89b81074bd932754f0befddab1a6144fac4256e90190228aff5520e81cf841f
-
SSDEEP
12288:DHANG3RciXWNhnABLQ8LbMUeKIoBg1z+W0Cla+ve7bAvANa24jVY:DHxcVjABRYMIYOzp0sjvzE1z
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2356 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oustanding Invoices.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2356 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2356 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2848 wrote to memory of 2356 2848 Oustanding Invoices.exe 31 PID 2848 wrote to memory of 2356 2848 Oustanding Invoices.exe 31 PID 2848 wrote to memory of 2356 2848 Oustanding Invoices.exe 31 PID 2848 wrote to memory of 2356 2848 Oustanding Invoices.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Oustanding Invoices.exe"C:\Users\Admin\AppData\Local\Temp\Oustanding Invoices.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Brdrepar62=Get-Content -raw 'C:\Users\Admin\AppData\Roaming\gurlis\billeter\pli\Afmilitariserings233.Eft';$Upaavirkede=$Brdrepar62.SubString(4815,3);.$Upaavirkede($Brdrepar62) "2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2356
-