Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-12-2024 20:23
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
bpaymentcopy.exe
Resource
win7-20240903-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
bpaymentcopy.exe
Resource
win10v2004-20241007-en
windows10-2004-x64
19 signatures
150 seconds
General
-
Target
bpaymentcopy.exe
-
Size
765KB
-
MD5
5205be9a501dae770c6e557b5fdaeebc
-
SHA1
a8a34796e05ac4ff1a0b92bdbbaedc01e8cedfa5
-
SHA256
aca540b3ad20e1fd49ec550107eff0c164990de1067a9542daf615465f82c331
-
SHA512
e7177c8f6562363751dedf374195ed0c59ba478530ba58e2428a62ba40fbae73c9dc9f55cdf8890779a9a848c53d6fedd7bdb9658e995df7331d8eea6a05170d
-
SSDEEP
12288:LXNrylgwbJqMBSlxaZmvB008Jz1vakTLAJnElBaSP6XQ2lfix4phRDiaZEAmD:MgwkMYxcmUzgkTL2FSPd2ExQhJ
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bpaymentcopy.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3020 bpaymentcopy.exe 3020 bpaymentcopy.exe 3020 bpaymentcopy.exe 3020 bpaymentcopy.exe 3020 bpaymentcopy.exe 3020 bpaymentcopy.exe 3020 bpaymentcopy.exe 3020 bpaymentcopy.exe 3020 bpaymentcopy.exe 3020 bpaymentcopy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3020 bpaymentcopy.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 3020 wrote to memory of 2788 3020 bpaymentcopy.exe 30 PID 3020 wrote to memory of 2788 3020 bpaymentcopy.exe 30 PID 3020 wrote to memory of 2788 3020 bpaymentcopy.exe 30 PID 3020 wrote to memory of 2788 3020 bpaymentcopy.exe 30 PID 3020 wrote to memory of 2808 3020 bpaymentcopy.exe 31 PID 3020 wrote to memory of 2808 3020 bpaymentcopy.exe 31 PID 3020 wrote to memory of 2808 3020 bpaymentcopy.exe 31 PID 3020 wrote to memory of 2808 3020 bpaymentcopy.exe 31 PID 3020 wrote to memory of 2812 3020 bpaymentcopy.exe 32 PID 3020 wrote to memory of 2812 3020 bpaymentcopy.exe 32 PID 3020 wrote to memory of 2812 3020 bpaymentcopy.exe 32 PID 3020 wrote to memory of 2812 3020 bpaymentcopy.exe 32 PID 3020 wrote to memory of 2772 3020 bpaymentcopy.exe 33 PID 3020 wrote to memory of 2772 3020 bpaymentcopy.exe 33 PID 3020 wrote to memory of 2772 3020 bpaymentcopy.exe 33 PID 3020 wrote to memory of 2772 3020 bpaymentcopy.exe 33 PID 3020 wrote to memory of 2716 3020 bpaymentcopy.exe 34 PID 3020 wrote to memory of 2716 3020 bpaymentcopy.exe 34 PID 3020 wrote to memory of 2716 3020 bpaymentcopy.exe 34 PID 3020 wrote to memory of 2716 3020 bpaymentcopy.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\bpaymentcopy.exe"C:\Users\Admin\AppData\Local\Temp\bpaymentcopy.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\bpaymentcopy.exe"C:\Users\Admin\AppData\Local\Temp\bpaymentcopy.exe"2⤵PID:2788
-
-
C:\Users\Admin\AppData\Local\Temp\bpaymentcopy.exe"C:\Users\Admin\AppData\Local\Temp\bpaymentcopy.exe"2⤵PID:2808
-
-
C:\Users\Admin\AppData\Local\Temp\bpaymentcopy.exe"C:\Users\Admin\AppData\Local\Temp\bpaymentcopy.exe"2⤵PID:2812
-
-
C:\Users\Admin\AppData\Local\Temp\bpaymentcopy.exe"C:\Users\Admin\AppData\Local\Temp\bpaymentcopy.exe"2⤵PID:2772
-
-
C:\Users\Admin\AppData\Local\Temp\bpaymentcopy.exe"C:\Users\Admin\AppData\Local\Temp\bpaymentcopy.exe"2⤵PID:2716
-