{"id":1254,"date":"2024-09-22T10:07:59","date_gmt":"2024-09-22T10:07:59","guid":{"rendered":"https:\/\/xdr-mdr.lmntrix.com\/main_web\/?p=1254"},"modified":"2025-07-29T07:42:12","modified_gmt":"2025-07-29T07:42:12","slug":"analysis-of-malware-sample-proforma-invoice-2","status":"publish","type":"post","link":"https:\/\/lmntrix.com\/blog\/analysis-of-malware-sample-proforma-invoice-2\/","title":{"rendered":"Analysis of Malware Sample \u2013 Proforma Invoice"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"873\" height=\"351\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/08\/this-aint-no-disco-fireball-malware-img3.png\" alt=\"\" class=\"wp-image-1076\"\/><\/figure>\n<\/div>\n\n\n<p>Version:1.0 StartHTML:000000270 EndHTML:000015702 StartFragment:000007053 EndFragment:000015634 StartSelection:000007053 EndSelection:000015630 SourceURL:https:\/\/www.lmntrix.com\/Lab\/Lab_info.php?id=9&amp;url=Analysis%20of%20Malware%20Sample%20-%20Proforma%20Invoice LMNTRIX Labs LMNTRIX Labs<\/p>\n\n\n\n<p><strong>Summary<\/strong><br><br>This malware sample was found in a recent spear phishing attack on one of our client networks. The sample in question is a .net file and comes with the name \u2018Proforma Invoice\u2019. We are sharing it for the benefit of the community.&nbsp;<\/p>\n\n\n\n<p><strong>File details&nbsp;<\/strong><br><br>MD5&nbsp;&nbsp; &nbsp;3ed79c9a988e427db39aa62e625a2116<br><br>SHA-1&nbsp;&nbsp; &nbsp;85b0198ba27fa5b8e1d3625dbcd45776d64cd741<br><br>SHA-256&nbsp;&nbsp; &nbsp;de30a5cc95453a372b717a632fc6c9ec0b101c2afa9ba5e472e95025fd227ddd<br><br>Size&nbsp;&nbsp; &nbsp;929.5 KB (951808 bytes)&nbsp;<br><br>Type&nbsp;&nbsp; &nbsp;Win32 EXE<br><br>Magic&nbsp;&nbsp; &nbsp;PE32 executable for MS Windows (GUI) Intel 80386 32-bit Mono\/.Net assembly<br><br>Detection ratio&nbsp;&nbsp; &nbsp;37 \/ 57&nbsp;<br><br>First submission&nbsp;&nbsp; &nbsp;2016-09-23 07:41:57 UTC ( 5 months, 1 week ago )<\/p>\n\n\n\n<p>This malware is already present in Virus Total, having been initially submitted in September 2016.<\/p>\n\n\n\n<p><strong>Characteristics and Behavior<br><br>\u2022&nbsp;&nbsp; &nbsp;<\/strong>Sends PC main information to external server<br><br>\u2022&nbsp;&nbsp; &nbsp;Injects code into other processes<br><br>\u2022&nbsp;&nbsp; &nbsp;Common autorun registry key<br><br>\u2022&nbsp;&nbsp; &nbsp;Access browser sensitive data: Mozilla SeaMonkey<br><br>\u2022&nbsp;&nbsp; &nbsp;Access Mozilla Firefox security module<br><br>\u2022&nbsp;&nbsp; &nbsp;Contains cryptographic functionality<br><br>\u2022&nbsp;&nbsp; &nbsp;Access Opera passwords<br><br>\u2022&nbsp;&nbsp; &nbsp;Steals Internet Explorer passwords<br><br>\u2022&nbsp;&nbsp; &nbsp;Loads PE into other process memory<br><br>\u2022&nbsp;&nbsp; &nbsp;Runs dropped executable<br><br>\u2022&nbsp;&nbsp; &nbsp;Access Mozilla Firefox history<br><br>\u2022&nbsp;&nbsp; &nbsp;Contains HTML page<br><br>\u2022&nbsp;&nbsp; &nbsp;Access Mozilla Firefox passwords<br><br>\u2022&nbsp;&nbsp; &nbsp;Access email client software sensitive data: Thunderbird<br><br>\u2022&nbsp;&nbsp; &nbsp;Access email client software sensitive data: Windows Livemail<br><br>\u2022&nbsp;&nbsp; &nbsp;Access email client software sensitive data: Outlook<br><br>\u2022&nbsp;&nbsp; &nbsp;Access email client software sensitive data: IncrediMail<br><br>\u2022&nbsp;&nbsp; &nbsp;Access email client software sensitive data: Eudora<br><br>\u2022&nbsp;&nbsp; &nbsp;Access email client software sensitive data: Group Mail<br><br>\u2022&nbsp;&nbsp; &nbsp;Access Mozilla Firefox certificates<br><br>\u2022&nbsp;&nbsp; &nbsp;Access FTP software sensitive data: Filezilla<br><br>\u2022&nbsp;&nbsp; &nbsp;Access instant messaging software sensitive data: Google Talk<br><br>\u2022&nbsp;&nbsp; &nbsp;Access Mozilla Firefox file that stores the annotations, bookmarks, favorite icons, input history, keywords, and browsing history<br><br>\u2022&nbsp;&nbsp; &nbsp;Access instant messaging software sensitive data: Paltalk<br><br>\u2022&nbsp;&nbsp; &nbsp;Access instant messaging software sensitive data: Yahoo Pager<br><br>\u2022&nbsp;&nbsp; &nbsp;Runs existing executable<br><br>\u2022&nbsp;&nbsp; &nbsp;Suspicious delay<br><br>\u2022&nbsp;&nbsp; &nbsp;Check user main folders path<br><br>\u2022&nbsp;&nbsp; &nbsp;Drops .EXE file<br><br>\u2022&nbsp;&nbsp; &nbsp;Access Windows sensitive data: Windows Profiles information<br><br>\u2022&nbsp;&nbsp; &nbsp;EntryPoint points inside a writable section<br><br>\u2022&nbsp;&nbsp; &nbsp;Gathers system main data (MachineGuid, ComputerName, SystemBiosVersion &#8230;)<br><br>\u2022&nbsp;&nbsp; &nbsp;Loads PE into its own memory<\/p>\n\n\n\n<p><strong>Process, Registry, Network Activities<\/strong><br><br>%appdata%\\sapp.exe<br><br>This created sample is a duplicate of an original file \u2013 it also created an autostart entry for this file to keep persistence.&nbsp;<br><br>HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Run &#8220;Application&#8221;<br><br>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;Type: REG_SZ<br><br>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;Data: C:\\Documents and Settings\\user\\Application Data\\sapp.exe<br><br>We noticed that sample creates a new process called Regasm.exe, which is part of the .net framework in Windows. Strings within regasm.exe confirmed that this malware collects passwords by logging keystrokes.&nbsp;<\/p>\n\n\n\n<p><strong>Very Important Strings<\/strong><br><br>Important.exe<br><br>hxxp:\/\/www(.)twentysixjune(.)biz\/jonoTwo-4sept-14oct\/<br><br>Window title:&nbsp;<br><br>End:]&nbsp;<br><br>Machine Time:&nbsp;<br><br>Keystrokes typed:&nbsp;<br><br>Keystrokes<br><br>[Back]<br><br>Notification<br><br>Time:&nbsp;<br><br>Text:&nbsp;<br><br>$C$l$i$p$b$oa$rd$<br><br>SupremeQuality<br><br>MediumQuality<br><br>LowQuality<br><br>#image#\/#upload#.#php#<br><br>.jpg<br><br>ylbmessAgnitucexEteG<br><br>Key<br><br>$pos$t$.$ph$p$?$ty$p$e$=$k$eys$tro$ke$s$&amp;$mac$hi$ne$na$me$=$<br><br>&amp;windowtitle=<br><br>&amp;keystrokestyped=<br><br>=emitenihcam&amp;<br><br>sdrowssaP<br><br>#po#st.#ph#p?#typ#e=p#assw#ords#&amp;mach#inen#ame=#<br><br>&amp;application=<br><br>&amp;link=<br><br>&amp;username=<br><br>=drowssap&amp;<br><br>draobpilC<br><br>$po$st$.$ph$p$?$ty$pe$=$cl$ip$boa$rd&amp;$mac$hine$nam$e=$<br><br>&amp;clipboardtext=<br><br>Screenshot<br><br>$pos$t.$p$hp$?$typ$e=$not$ific$a$tion$&amp;$mac$h$in$e$n$a$m$e$=$<br><br>Software\\Paltalk<br><br>InstallerAppDir<br><br>Win32_LogicalDisk.DeviceID=&#8221;<br><br>VolumeSerialNumber<br><br>Software\\Paltalk\\<br><br>nickname<br><br>pwd<br><br>Passwords<br><br>Paltalk<br><br>Program: FileZilla&nbsp;<br><br>FileZilla\\recentservers.xml<br><br>FileZilla\\sitemanager.xml<br><br><br><br><br><br><br><br>$&lt;$H$os$t$&gt;$<br><br>$&lt;$\/H$o$s$t$&gt;$<br><br><br><br>$$<br><br>$&lt;$\/$P$a$ss$&gt;$<br><br>Filezilla<br><br><br><br>Programfiles(x86)<br><br>programfiles<br><br>$\\jDow$nloader\\$config\\dat$abase.scr$ipt<br><br>programfiles(x86)<br><br>$\\jD$ownloader\\con$fig\\databa$se.sc$ript<br><br>#INS#ERT INT#O CON#FIG VA#LUE#S(&#8216;A#ccoun#tContr#oller#&#8217;,&#8217;<br><br>JDownloader<br><br>Software\\DownloadManager\\Passwords\\<br><br>Program: Internet Download Manager &gt;6&nbsp;<br><br>User<br><br>EncPassword<br><br>IDM<br><br>Advapi32<br><br>RegOpenKeyEx<br><br>RegCloseKey<br><br>RegQueryValueEx<br><br>Software\\IMVU\\username<br><br>Software\\IMVU\\password<br><br>Imvu<br><br>Chrome<br><br>Firefox<br><br>Internet Explorer<br><br>Opera<br><br>Safari<br><br>URL<br><br>User Name &nbsp; &nbsp; &nbsp; &nbsp; :&nbsp;<br><br>Password &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;:&nbsp;<br><br>URL &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; :&nbsp;<br><br>Web Browser &nbsp; &nbsp; &nbsp; :&nbsp;<br><br>Browsers.txt<br><br>Password<br><br>\/stext&nbsp;<br><br>RecoverBrowsers<br><br>Outlook<br><br>_Thunder_bird<br><br>Eudora<br><br>Incredimail<br><br>Netscape<br><br>\\Mails.txt<br><br>RecoverMail<br><br>Application<br><br>Email &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; :&nbsp;<br><br>Server &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;:&nbsp;<br><br>Application &nbsp; &nbsp; &nbsp; :&nbsp;<br><br>kernel32<br><br>KeyBase<br><br>ntdll<br><br>LoadLibraryA<br><br>.dll<br><br>user32<br><br>$Set$Window$sHook$Ex$A$<\/p>\n\n\n\n<p>These strings show that this file is a password stealer. It collects keystrokes and copies clipboard images then uploads them to hxxp:\/\/www.twentysixjune.biz\/jonoTwo-4sept-14oct\/image\/upload.php<\/p>\n\n\n\n<p>It also collects information from the following:<br><br>Software\\Paltalk\\<br><br>nickname<br><br>pwd<br><br>Program: FileZilla&nbsp;<br><br>FileZilla\\recentservers.xml<br><br>$\\jDow$nloader\\$config\\dat$abase.scr$ipt<br><br>JDownloader<br><br>IDM<br><br>Software\\IMVU\\username<br><br>Software\\IMVU\\password<br><br>Imvu<br><br>Chrome<br><br>Firefox<br><br>Internet Explorer<br><br>Opera<br><br>Safari<br><br>URL<br><br>User Name &nbsp; &nbsp; &nbsp; &nbsp; :&nbsp;<br><br>Password &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;:&nbsp;<br><br>URL &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; :&nbsp;<br><br>Web Browser &nbsp; &nbsp; &nbsp; :&nbsp;<br><br>Browsers.txt<br><br>Password<br><br>\/stext&nbsp;<br><br>RecoverBrowsers<br><br>Outlook<br><br>_Thunder_bird<br><br>Eudora<br><br>Incredimail<br><br>Netscape<br><br>\\Mails.txt<br><br>RecoverMail<br><br>Application<br><br>Email &nbsp; &nbsp; &nbsp;<\/p>\n\n\n\n<p><strong>Malicious Url<\/strong><br><br>hxxp:\/\/twentysixjune(.)biz<br><br>Ip address is: &nbsp;80(.)82(.)78(.)57 : 80<br><br>This is the malicious url we found within the strings, even Virus Total flagged this url as malicious by six vendors.<br><br>https:\/\/virustotal.com\/en\/url\/03f84b1e66f394d4d506d16c44434136496399f7ed3cfeccb69c9725951d5ea2\/analysis\/1488780554\/&nbsp;<br><br>AegisLab WebGuard&nbsp;&nbsp; &nbsp;Malicious site<br><br>Sophos&nbsp;&nbsp; &nbsp;Malicious site<br><br>Trustwave&nbsp;&nbsp; &nbsp;Malicious site<br><br>BitDefender&nbsp;&nbsp; &nbsp;Malware site<br><br>Fortinet&nbsp;&nbsp; &nbsp;Malware site<br><br>G-Data&nbsp;&nbsp; &nbsp;Malware site<\/p>\n\n\n\n<p><strong>Code Injection<\/strong><\/p>\n\n\n\n<p><strong>Process &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Code size Virtual Address&nbsp;<\/strong><br><br>C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\RegAsm.exe&nbsp;&nbsp; &nbsp;516096 &nbsp; &nbsp; &nbsp;400000<br><br>C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\RegAsm.exe&nbsp;&nbsp; &nbsp;364544 &nbsp; &nbsp; &nbsp;400000<\/p>\n\n\n\n<p><strong>Conclusion<\/strong><br><br>We recommend blocking the malicious url and searching for the executable (sapp.exe) in the application data location then removing the sapp.exe.<br><br>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Version:1.0 StartHTML:000000270 EndHTML:000015702 StartFragment:000007053 EndFragment:000015634 StartSelection:000007053 EndSelection:000015630 SourceURL:https:\/\/www.lmntrix.com\/Lab\/Lab_info.php?id=9&amp;url=Analysis%20of%20Malware%20Sample%20-%20Proforma%20Invoice LMNTRIX Labs LMNTRIX Labs Summary This malware sample was found in a recent spear phishing attack on one of our client networks. The sample in question is a .net file and comes with the name &lsquo;Proforma Invoice&rsquo;. We are sharing it for the benefit of the community.&nbsp; [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1076,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-1254","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"_links":{"self":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/1254","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/comments?post=1254"}],"version-history":[{"count":4,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/1254\/revisions"}],"predecessor-version":[{"id":4117,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/1254\/revisions\/4117"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media\/1076"}],"wp:attachment":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media?parent=1254"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/categories?post=1254"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/tags?post=1254"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}