Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-11-2024 08:25
Static task
static1
Behavioral task
behavioral1
Sample
Payment_Advice.exe
Resource
win7-20240903-en
General
-
Target
Payment_Advice.exe
-
Size
889KB
-
MD5
3a4b0695b3752747171249f731a42a0f
-
SHA1
472db8f1ad0121714b1c0692d050f055ee7117dc
-
SHA256
bd746ec7cac902a0b12f829efa801316f11b5ab6df024ff0f75c178134daad99
-
SHA512
a21fbc3d9c7c9c87ccab446ee7ec978826cadbe3faaa9fc6bb2fa07e4d5d9ecf7ea00de897ded2ff2452b951197f94d37d62e5d4d82e101eb1db7efaac4b26da
-
SSDEEP
12288:F5LfSgsVSj4s4IHK7zqcqpvYri3jZcYGnnwFN5pP0D+9uAw0OyVq/k:vQSksmPq7iK5pP0v0OAq/
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Payment_Advice.exeschtasks.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Payment_Advice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
Payment_Advice.exepid Process 2692 Payment_Advice.exe 2692 Payment_Advice.exe 2692 Payment_Advice.exe 2692 Payment_Advice.exe 2692 Payment_Advice.exe 2692 Payment_Advice.exe 2692 Payment_Advice.exe 2692 Payment_Advice.exe 2692 Payment_Advice.exe 2692 Payment_Advice.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Payment_Advice.exedescription pid Process Token: SeDebugPrivilege 2692 Payment_Advice.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
Payment_Advice.exedescription pid Process procid_target PID 2692 wrote to memory of 2560 2692 Payment_Advice.exe 30 PID 2692 wrote to memory of 2560 2692 Payment_Advice.exe 30 PID 2692 wrote to memory of 2560 2692 Payment_Advice.exe 30 PID 2692 wrote to memory of 2560 2692 Payment_Advice.exe 30 PID 2692 wrote to memory of 2684 2692 Payment_Advice.exe 32 PID 2692 wrote to memory of 2684 2692 Payment_Advice.exe 32 PID 2692 wrote to memory of 2684 2692 Payment_Advice.exe 32 PID 2692 wrote to memory of 2684 2692 Payment_Advice.exe 32 PID 2692 wrote to memory of 3044 2692 Payment_Advice.exe 33 PID 2692 wrote to memory of 3044 2692 Payment_Advice.exe 33 PID 2692 wrote to memory of 3044 2692 Payment_Advice.exe 33 PID 2692 wrote to memory of 3044 2692 Payment_Advice.exe 33 PID 2692 wrote to memory of 3048 2692 Payment_Advice.exe 34 PID 2692 wrote to memory of 3048 2692 Payment_Advice.exe 34 PID 2692 wrote to memory of 3048 2692 Payment_Advice.exe 34 PID 2692 wrote to memory of 3048 2692 Payment_Advice.exe 34 PID 2692 wrote to memory of 2608 2692 Payment_Advice.exe 35 PID 2692 wrote to memory of 2608 2692 Payment_Advice.exe 35 PID 2692 wrote to memory of 2608 2692 Payment_Advice.exe 35 PID 2692 wrote to memory of 2608 2692 Payment_Advice.exe 35 PID 2692 wrote to memory of 2404 2692 Payment_Advice.exe 36 PID 2692 wrote to memory of 2404 2692 Payment_Advice.exe 36 PID 2692 wrote to memory of 2404 2692 Payment_Advice.exe 36 PID 2692 wrote to memory of 2404 2692 Payment_Advice.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payment_Advice.exe"C:\Users\Admin\AppData\Local\Temp\Payment_Advice.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gBiomise" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9711.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2560
-
-
C:\Users\Admin\AppData\Local\Temp\Payment_Advice.exe"C:\Users\Admin\AppData\Local\Temp\Payment_Advice.exe"2⤵PID:2684
-
-
C:\Users\Admin\AppData\Local\Temp\Payment_Advice.exe"C:\Users\Admin\AppData\Local\Temp\Payment_Advice.exe"2⤵PID:3044
-
-
C:\Users\Admin\AppData\Local\Temp\Payment_Advice.exe"C:\Users\Admin\AppData\Local\Temp\Payment_Advice.exe"2⤵PID:3048
-
-
C:\Users\Admin\AppData\Local\Temp\Payment_Advice.exe"C:\Users\Admin\AppData\Local\Temp\Payment_Advice.exe"2⤵PID:2608
-
-
C:\Users\Admin\AppData\Local\Temp\Payment_Advice.exe"C:\Users\Admin\AppData\Local\Temp\Payment_Advice.exe"2⤵PID:2404
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD576997cebcf19a826ecf708b96f41d124
SHA1ab270bb846fd615a3b7ec67fe48adb24f5bfc2ea
SHA256559b03a547620623fd94c991ab4e178003424ba38ad61dcfff7a81339be9866c
SHA512cc6a0ab689ed2a8bb76664d93b550a07726c833f6ee662e471f2ff3f72e17461214c612fcdf4198ed226776e77051100460f7cecee1ba5fc93b70f0604801dc5