Analysis
-
max time kernel
15s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
05-11-2024 13:42
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Payment slip TT.exe
Resource
win7-20241010-en
windows7-x64
4 signatures
150 seconds
General
-
Target
Payment slip TT.exe
-
Size
730KB
-
MD5
5643e7a6dd9dcdb73826348ffc0e4a5c
-
SHA1
d817b6131b61597c2fe9dcfc2aec0ce2341adeb4
-
SHA256
794f51202f35431d4b1523aebd8f72ec72cdac3b53a297ae256010567d5aae84
-
SHA512
d7bec53c63465a7ae5779e96af07f54290f15afee58d9b5fa284ae564976f2f27a4a202b9306fe8bc5255502bb97818e37178712eb58b58cde95cb4b3bad48d0
-
SSDEEP
12288:fFgX2D0LK8uX3OAVDtWx8LaxyE5TWh2Lq/c+RK09X:9gmDAm55fAd5q2uU+RV
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Payment slip TT.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Payment slip TT.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
Payment slip TT.exepid Process 2220 Payment slip TT.exe 2220 Payment slip TT.exe 2220 Payment slip TT.exe 2220 Payment slip TT.exe 2220 Payment slip TT.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Payment slip TT.exedescription pid Process Token: SeDebugPrivilege 2220 Payment slip TT.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
Payment slip TT.exedescription pid Process procid_target PID 2220 wrote to memory of 2816 2220 Payment slip TT.exe 29 PID 2220 wrote to memory of 2816 2220 Payment slip TT.exe 29 PID 2220 wrote to memory of 2816 2220 Payment slip TT.exe 29 PID 2220 wrote to memory of 2816 2220 Payment slip TT.exe 29 PID 2220 wrote to memory of 1684 2220 Payment slip TT.exe 30 PID 2220 wrote to memory of 1684 2220 Payment slip TT.exe 30 PID 2220 wrote to memory of 1684 2220 Payment slip TT.exe 30 PID 2220 wrote to memory of 1684 2220 Payment slip TT.exe 30 PID 2220 wrote to memory of 2724 2220 Payment slip TT.exe 31 PID 2220 wrote to memory of 2724 2220 Payment slip TT.exe 31 PID 2220 wrote to memory of 2724 2220 Payment slip TT.exe 31 PID 2220 wrote to memory of 2724 2220 Payment slip TT.exe 31 PID 2220 wrote to memory of 2468 2220 Payment slip TT.exe 32 PID 2220 wrote to memory of 2468 2220 Payment slip TT.exe 32 PID 2220 wrote to memory of 2468 2220 Payment slip TT.exe 32 PID 2220 wrote to memory of 2468 2220 Payment slip TT.exe 32 PID 2220 wrote to memory of 2508 2220 Payment slip TT.exe 33 PID 2220 wrote to memory of 2508 2220 Payment slip TT.exe 33 PID 2220 wrote to memory of 2508 2220 Payment slip TT.exe 33 PID 2220 wrote to memory of 2508 2220 Payment slip TT.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payment slip TT.exe"C:\Users\Admin\AppData\Local\Temp\Payment slip TT.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\Payment slip TT.exe"C:\Users\Admin\AppData\Local\Temp\Payment slip TT.exe"2⤵PID:2816
-
-
C:\Users\Admin\AppData\Local\Temp\Payment slip TT.exe"C:\Users\Admin\AppData\Local\Temp\Payment slip TT.exe"2⤵PID:1684
-
-
C:\Users\Admin\AppData\Local\Temp\Payment slip TT.exe"C:\Users\Admin\AppData\Local\Temp\Payment slip TT.exe"2⤵PID:2724
-
-
C:\Users\Admin\AppData\Local\Temp\Payment slip TT.exe"C:\Users\Admin\AppData\Local\Temp\Payment slip TT.exe"2⤵PID:2468
-
-
C:\Users\Admin\AppData\Local\Temp\Payment slip TT.exe"C:\Users\Admin\AppData\Local\Temp\Payment slip TT.exe"2⤵PID:2508
-