Analysis
-
max time kernel
93s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2024 01:14
Static task
static1
Behavioral task
behavioral1
Sample
Payment Advice - Advice Ref[A1RxGSqgxSF3] Priority payment Customer Ref[2000015497].exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Payment Advice - Advice Ref[A1RxGSqgxSF3] Priority payment Customer Ref[2000015497].exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
yzoczjnuz.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
yzoczjnuz.exe
Resource
win10v2004-20241007-en
General
-
Target
Payment Advice - Advice Ref[A1RxGSqgxSF3] Priority payment Customer Ref[2000015497].exe
-
Size
258KB
-
MD5
1ec9c287f61dee3f7cee2dc216e8596f
-
SHA1
2ce2bc72b3245447687fddc717dbc087573e9422
-
SHA256
0112b086f601e1d8a6d10ce4e798dd5eaf379127cb99d5a4b4f44ec708457ffd
-
SHA512
74568e623eec50754c1a0cf3e2db27e120777f8c80a80df94fac6f106b5b43d7a8a0f9b5375f86bdbc8122d49eac2127bb9167f2e6a7d658f2e9302fe8ab69e5
-
SSDEEP
6144:mbE/HUba5PBYCt37k0AUck3UcrhNQxy7bjTRuFsC42TjKoagrM0:mb/aLPtLk9rkEcrkxey82TjKzyp
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 988 yzoczjnuz.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3416 988 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Payment Advice - Advice Ref[A1RxGSqgxSF3] Priority payment Customer Ref[2000015497].exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yzoczjnuz.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2332 wrote to memory of 988 2332 Payment Advice - Advice Ref[A1RxGSqgxSF3] Priority payment Customer Ref[2000015497].exe 82 PID 2332 wrote to memory of 988 2332 Payment Advice - Advice Ref[A1RxGSqgxSF3] Priority payment Customer Ref[2000015497].exe 82 PID 2332 wrote to memory of 988 2332 Payment Advice - Advice Ref[A1RxGSqgxSF3] Priority payment Customer Ref[2000015497].exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payment Advice - Advice Ref[A1RxGSqgxSF3] Priority payment Customer Ref[2000015497].exe"C:\Users\Admin\AppData\Local\Temp\Payment Advice - Advice Ref[A1RxGSqgxSF3] Priority payment Customer Ref[2000015497].exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\yzoczjnuz.exe"C:\Users\Admin\AppData\Local\Temp\yzoczjnuz.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:988 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 988 -s 5603⤵
- Program crash
PID:3416
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 988 -ip 9881⤵PID:3116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
185KB
MD51e4e5fe5153c59256f6178ac541e53d0
SHA11ca49ca82dc80310e017f1d7be8c1e36eba01d24
SHA2561f68a8c3efb02d3cefb6e49d8dba71acb16bbeaaa1686913120ad42d2991626a
SHA51298e8d172d897a16cc7ca47c1e9d9b91f36b16a48733ab6c4d79169d7ec72416ccb341c9474fbe56dec4c39f3f5ad31b7bd4611aaa00cc8786640c4bc56bf8ec1
-
Filesize
4KB
MD5bf9a3bdedbd39546a400d1cd1850b4aa
SHA1c915bb9ad5ce4defd8c5cfee4433d1dde789120c
SHA2566830feee189372fd3145f58ce1a7c38203b5ac35b326446980c607bfe129c355
SHA512117d5bb80f1a12abff70d8979abb19a6ec7a5dfa9c87e307b4defcfefde36d99c031efba4455824ce2243ef5726d784f2aae99915966282b5a341dc063345d4b
-
Filesize
59KB
MD560ebe600e2d67c0877426dfd53be96d7
SHA183c0f3f77bec5df19f20ab0706ca736bd5e6e0d6
SHA256fad978413cf6a36fbd03d3c96a5a08d0cf227e17710abddc06e73ae1913de648
SHA512f0e2839211d84f2247a654f51ff07fe4c89f3d9ed71558e34479d8afe08aa9f606a65d1e53eaa0bea8287537de8f7e50427402f33a0339739b4dff7405a127eb