Analysis
-
max time kernel
94s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2024 23:05
Static task
static1
Behavioral task
behavioral1
Sample
PROFORMA INVOICE.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PROFORMA INVOICE.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/dvxpshe.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/dvxpshe.dll
Resource
win10v2004-20241007-en
General
-
Target
PROFORMA INVOICE.exe
-
Size
638KB
-
MD5
a3b8d59430deef4d59ec0d47a60af449
-
SHA1
4cb4bef74a68cb9a55c8eed369a7beea317e3840
-
SHA256
1339a93d8ca9b03d1b55ce0d283da6d320bf04fc515a8259597c635901c821d0
-
SHA512
402f97692a312b8a70ea22e585f13c1c81336a1a7845202f2368622c1a1422b25f779778227f3ab4ddcd250cd496821486918a8e73f6d527c4262d827fc11474
-
SSDEEP
6144:uGi+jGL0og4dDiXYOg8XQ5iiRHTjO0gBzxRmpwCxkZ6W6q/Ba:A1JiXXngQEHTxgBzxmwckZ67q/Y
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2004 PROFORMA INVOICE.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4176 2004 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PROFORMA INVOICE.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2004 wrote to memory of 1928 2004 PROFORMA INVOICE.exe 83 PID 2004 wrote to memory of 1928 2004 PROFORMA INVOICE.exe 83 PID 2004 wrote to memory of 1928 2004 PROFORMA INVOICE.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\PROFORMA INVOICE.exe"C:\Users\Admin\AppData\Local\Temp\PROFORMA INVOICE.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\PROFORMA INVOICE.exe"C:\Users\Admin\AppData\Local\Temp\PROFORMA INVOICE.exe"2⤵PID:1928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2004 -s 9202⤵
- Program crash
PID:4176
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 208 -p 2004 -ip 20041⤵PID:4780
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD545f315f24046abc7cbe07a0f08a500b4
SHA15fcbdb3743ac2497181bd800622b98033e0232bd
SHA256231d2605fc4ba8b8abed10831692542931ad6e7f647225376723cf385695f1bf
SHA512a2df0a846c508318eb0eee02921c7f345aaaed5fcc25bee179eb092586c145b8348fb232a22a349fe2bcfa9166778c5812062ce89782d7f8fb2de56497f10a31