Analysis
-
max time kernel
94s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:00
Static task
static1
Behavioral task
behavioral1
Sample
Payment Receipt.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Payment Receipt.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/zmdtm.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/zmdtm.dll
Resource
win10v2004-20241007-en
General
-
Target
Payment Receipt.exe
-
Size
363KB
-
MD5
5d409547afd674af8eb515fc842fb646
-
SHA1
0a2fbdea88e1ad6878d2d8bb2e22dcb12d724b02
-
SHA256
dbbff1e34097a4a94e305fc34db136f9f2558f577b65155d3a90d3663a2a9663
-
SHA512
fdb4a03a70140596242eca8d2a79671cf372c43d6bd4fecc5bb713bd1bb7c70259b401349360a22d0da6cd0d9cc3ade0232e2c46faa877f8f6685eef41be384d
-
SSDEEP
6144:VBlL/kE286EZd0lsHJgmPcaauxE17N1y/eucOMBhtvgBMmdiEhVKUi:D6E28640lspbPcaJKFb4+DBhtvAMmcw8
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2148 Payment Receipt.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4100 2148 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Payment Receipt.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2148 wrote to memory of 1048 2148 Payment Receipt.exe 83 PID 2148 wrote to memory of 1048 2148 Payment Receipt.exe 83 PID 2148 wrote to memory of 1048 2148 Payment Receipt.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payment Receipt.exe"C:\Users\Admin\AppData\Local\Temp\Payment Receipt.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\Payment Receipt.exe"C:\Users\Admin\AppData\Local\Temp\Payment Receipt.exe"2⤵PID:1048
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2148 -s 9722⤵
- Program crash
PID:4100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2148 -ip 21481⤵PID:4416
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD5d4b3308970835c85d3d24ad2f8ee3b4f
SHA18a3722200f614f37a0a446c36df6dfcbd26ae138
SHA25614c94199dc9e370703b5579066d6b34a2055ab97fdf2675dd7ac8ec3616c3137
SHA51272b50aed7860dfa674a34e52a75b6a9aaf3529f4a8dcc7a622f5d00970855dd5cd70a0e9699fd9b79acdfb9a06411ecbee26c471e6a91e67851464dd7b4ca240