Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2024 03:35
Static task
static1
Behavioral task
behavioral1
Sample
invoice.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
invoice.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
bjzfttovhy.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
bjzfttovhy.exe
Resource
win10v2004-20241007-en
General
-
Target
invoice.exe
-
Size
255KB
-
MD5
370325f2e5f6a85aaf28087cb739e313
-
SHA1
617235f277614da1325dff53930e51bc45ac11df
-
SHA256
8692e6fd0eda4246c038c8671a633ee05b8a76b46bd024511c66020ba69e3f4f
-
SHA512
88cc1bc807eaefa33b803bc14ecf85078b1242596e504fa39be60fdcd65b94006beeb77fb7d0595e019f6a2253310d51fee9b8c27a45f12a7b880a0dba05c128
-
SSDEEP
6144:mbE/HUbWkN7a34BeKtzRVzSnGHWu7xS51LI8Ywh:mb/j7a34oK5rzMuxVSh
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1876 bjzfttovhy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1312 1876 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language invoice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bjzfttovhy.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4520 wrote to memory of 1876 4520 invoice.exe 84 PID 4520 wrote to memory of 1876 4520 invoice.exe 84 PID 4520 wrote to memory of 1876 4520 invoice.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\invoice.exe"C:\Users\Admin\AppData\Local\Temp\invoice.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\bjzfttovhy.exe"C:\Users\Admin\AppData\Local\Temp\bjzfttovhy.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1876 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1876 -s 5163⤵
- Program crash
PID:1312
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1876 -ip 18761⤵PID:3560
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD58aaf366f0347501bad46a2593664c9fa
SHA18f80b099bc2eeee883fe6f3afb0b295cc9c10ec6
SHA256266853551f6890103f71206b085307f1174b185f55b6b87aa3a3d3f189a1463f
SHA512d0f4744479cff0f8f25fa312d502629041599aa97801a4ba1085e1cd4b12329d47f91fcfaa638c04274377534114934c2b94e07188355464498b08ed7f94a6a0
-
Filesize
185KB
MD54566513860f5341cb75f5dd209ac8acb
SHA12cc0b3f8f61b9530ddefd92099d20b5f7468460f
SHA25686e86681303528f0ce0cff0b0deb6cd68f6971e90daf7586d64c0f3f53314738
SHA51295d86ff71b5b697838433af281fe8c1d4d7b0eb646c0ff7f12d2a165a79815c71804cb9f0e7117b6f65e72e5d7a2a2f9fb1289811b8c2cf60a54eb937bcdd469
-
Filesize
4KB
MD5dda716ce55afb302eea7fbf921873b4e
SHA1645885de5a11fc741373ab6066704ddde3e28cbe
SHA256f87979ad0a96c6c412cc382caeb1f9aee06599acd648384fe377c99adc5f7c31
SHA512a0cb90cd60827558f41d5b43c3ec8fba7bef54b1e4bdb2c8372c29ca5d8a6a36f6acc1bec38311a8afb502990ab5fc2e0f257ab54cf5623c60e449e1f6a44a73