{"id":988,"date":"2024-08-27T16:22:32","date_gmt":"2024-08-27T16:22:32","guid":{"rendered":"https:\/\/xdr-mdr.lmntrix.com\/main_web\/?p=988"},"modified":"2025-07-28T09:31:40","modified_gmt":"2025-07-28T09:31:40","slug":"analysis-of-malware-sample-proforma-invoice","status":"publish","type":"post","link":"https:\/\/lmntrix.com\/blog\/analysis-of-malware-sample-proforma-invoice\/","title":{"rendered":"Analysis of Malware Sample &#8211; Proforma Invoice"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"454\" height=\"318\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/08\/Proforma-Sample-featured-image_1.webp\" alt=\"\" class=\"wp-image-1030\"\/><\/figure>\n<\/div>\n\n\n<p>Version:1.0 StartHTML:000000270 EndHTML:000015702 StartFragment:000007053 EndFragment:000015634 StartSelection:000007053 EndSelection:000015630 SourceURL:https:\/\/www.lmntrix.com\/Lab\/Lab_info.php?id=9&amp;url=Analysis%20of%20Malware%20Sample%20-%20Proforma%20Invoice LMNTRIX Labs LMNTRIX Labs<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Summary<\/h3>\n\n\n\n<p>This malware sample masquerading as a Proforma Invoice was identified through a recent spear phishing attack on one of our client networks. The sample in question is a .NET file and comes with the name \u2018Proforma Invoice\u2019. We are sharing it for the benefit of the community.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">File Details<\/h3>\n\n\n\n<p>MD5 3ed79c9a988e427db39aa62e625a2116<\/p>\n\n\n\n<p>SHA-1 85b0198ba27fa5b8e1d3625dbcd45776d64cd741<\/p>\n\n\n\n<p>SHA-256 de30a5cc95453a372b717a632fc6c9ec0b101c2afa9ba5e472e95025fd227ddd<\/p>\n\n\n\n<p>Size 929.5 KB (951808 bytes)<\/p>\n\n\n\n<p>Type Win32 EXE<\/p>\n\n\n\n<p>Magic PE32 executable for MS Windows (GUI) Intel 80386 32-bit Mono\/.Net assembly<\/p>\n\n\n\n<p>Detection ratio 37 \/ 57<\/p>\n\n\n\n<p>First submission 2016-09-23 07:41:57 UTC ( 5 months, 1 week ago )<br>This malware is already present in Virus Total, having been initially submitted in September 2016.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Characteristics and Behavior<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Sends PC main information to external server<\/li>\n\n\n\n<li>Injects code into other processes<\/li>\n\n\n\n<li>Common autorun registry key<\/li>\n\n\n\n<li>Access browser sensitive data: Mozilla SeaMonkey<\/li>\n\n\n\n<li>Access Mozilla Firefox security module<\/li>\n\n\n\n<li>Contains cryptographic functionality<\/li>\n\n\n\n<li>Access Opera passwords<\/li>\n\n\n\n<li>Steals Internet Explorer passwords<\/li>\n\n\n\n<li>Loads PE into other process memory<\/li>\n\n\n\n<li>Runs dropped executable<\/li>\n\n\n\n<li>Access Mozilla Firefox history<\/li>\n\n\n\n<li>Contains HTML page<\/li>\n\n\n\n<li>Access Mozilla Firefox passwords<\/li>\n\n\n\n<li>Access email client software sensitive data: Thunderbird<\/li>\n\n\n\n<li>Access email client software sensitive data: Windows Livemail<\/li>\n\n\n\n<li>Access email client software sensitive data: Outlook<\/li>\n\n\n\n<li>Access email client software sensitive data: IncrediMail<\/li>\n\n\n\n<li>Access email client software sensitive data: Eudora<\/li>\n\n\n\n<li>Access email client software sensitive data: Group Mail<\/li>\n\n\n\n<li>Access Mozilla Firefox certificates<\/li>\n\n\n\n<li>Access FTP software sensitive data: Filezilla<\/li>\n\n\n\n<li>Access instant messaging software sensitive data: Google Talk<\/li>\n\n\n\n<li>Access Mozilla Firefox file that stores the annotations, bookmarks, favorite icons, input history, keywords, and browsing history<\/li>\n\n\n\n<li>Access instant messaging software sensitive data: Paltalk<\/li>\n\n\n\n<li>Access instant messaging software sensitive data: Yahoo Pager<\/li>\n\n\n\n<li>Runs existing executable<\/li>\n\n\n\n<li>Suspicious delay<\/li>\n\n\n\n<li>Check user main folders path<\/li>\n\n\n\n<li>Drops .EXE file<\/li>\n\n\n\n<li>Access Windows sensitive data: Windows Profiles information<\/li>\n\n\n\n<li>EntryPoint points inside a writable section<\/li>\n\n\n\n<li>Gathers system main data (MachineGUID, ComputerName, SystemBiosVersion \u2026)<\/li>\n\n\n\n<li>Loads PE into its own memory<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Process, Registry, Network Activities<\/h3>\n\n\n\n<p>%appdata%\\sapp.exe<\/p>\n\n\n\n<p>This created sample is a duplicate of an original file \u2013 it also created an autostart entry for this file to keep persistence.<\/p>\n\n\n\n<p>HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Run &#8220;Application&#8221;<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>    Type: REG_SZ\n\n    Data: C:\\Documents and Settings\\user\\Application Data\\sapp.exe<\/code><\/pre>\n\n\n\n<p>We noticed that sample creates a new process called Regasm.exe, which is part of the .net framework in Windows. Strings within regasm.exe confirmed that this malware collects passwords by logging keystrokes.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Very Important Strings<\/h3>\n\n\n\n<p>Important.exe<\/p>\n\n\n\n<p>hxxp:\/\/www(.)twentysixjune(.)biz\/jonoTwo-4sept-14oct\/<\/p>\n\n\n\n<p>Window title:<\/p>\n\n\n\n<p>End:]\n\n\n\n<p>Machine Time:<\/p>\n\n\n\n<p>Keystrokes typed:<\/p>\n\n\n\n<p>Keystrokes<\/p>\n\n\n\n[Back]\n\n\n\n<p>Notification<\/p>\n\n\n\n<p>Time:<\/p>\n\n\n\n<p>Text:<\/p>\n\n\n\n<p>$C$l$i$p$b$oa$rd$<\/p>\n\n\n\n<p>SupremeQuality<\/p>\n\n\n\n<p>MediumQuality<\/p>\n\n\n\n<p>LowQuality<\/p>\n\n\n\n<p>image#\/#upload#.#php<\/p>\n\n\n\n<p>.jpg<\/p>\n\n\n\n<p>ylbmessAgnitucexEteG<\/p>\n\n\n\n<p>Key<\/p>\n\n\n\n<p>$pos$t$.$ph$p$?$ty$p$e$=$k$eys$tro$ke$s$&amp;$mac$hi$ne$na$me$=$<\/p>\n\n\n\n<p>&amp;windowtitle=<\/p>\n\n\n\n<p>&amp;keystrokestyped=<\/p>\n\n\n\n<p>=emitenihcam&amp;<\/p>\n\n\n\n<p>sdrowssaP<\/p>\n\n\n\n<p>po#st.#ph#p?#typ#e=p#assw#ords#&amp;mach#inen#ame=<\/p>\n\n\n\n<p>&amp;application=<\/p>\n\n\n\n<p>&amp;link=<\/p>\n\n\n\n<p>&amp;username=<\/p>\n\n\n\n<p>=drowssap&amp;<\/p>\n\n\n\n<p>draobpilC<\/p>\n\n\n\n<p>$po$st$.$ph$p$?$ty$pe$=$cl$ip$boa$rd&amp;$mac$hine$nam$e=$<\/p>\n\n\n\n<p>&amp;clipboardtext=<\/p>\n\n\n\n<p>Screenshot<\/p>\n\n\n\n<p>$pos$t.$p$hp$?$typ$e=$not$ific$a$tion$&amp;$mac$h$in$e$n$a$m$e$=$<\/p>\n\n\n\n<p>Software\\Paltalk<\/p>\n\n\n\n<p>InstallerAppDir<\/p>\n\n\n\n<p>Win32_LogicalDisk.DeviceID=&#8221;<\/p>\n\n\n\n<p>VolumeSerialNumber<\/p>\n\n\n\n<p>Software\\Paltalk\\<\/p>\n\n\n\n<p>nickname<\/p>\n\n\n\n<p>pwd<\/p>\n\n\n\n<p>Passwords<\/p>\n\n\n\n<p>Paltalk<\/p>\n\n\n\n<p>Program: FileZilla<\/p>\n\n\n\n<p>FileZilla\\recentservers.xml<\/p>\n\n\n\n<p>FileZilla\\sitemanager.xml<\/p>\n\n\n\n<p>$&lt;$H$os$t$&gt;$<\/p>\n\n\n\n<p>$&lt;$\/H$o$s$t$&gt;$<\/p>\n\n\n\n<p>$$<\/p>\n\n\n\n<p>$&lt;$\/$P$a$ss$&gt;$<\/p>\n\n\n\n<p>Filezilla<\/p>\n\n\n\n<p>Programfiles(x86)<\/p>\n\n\n\n<p>programfiles<\/p>\n\n\n\n<p>$\\jDow$nloader\\$config\\dat$abase.scr$ipt<\/p>\n\n\n\n<p>programfiles(x86)<\/p>\n\n\n\n<p>$\\jD$ownloader\\con$fig\\databa$se.sc$ript<\/p>\n\n\n\n<p>INS#ERT INT#O CON#FIG VA#LUE#S(&#8216;A#ccoun#tContr#oller#&#8217;,&#8217;<\/p>\n\n\n\n<p>JDownloader<\/p>\n\n\n\n<p>Software\\DownloadManager\\Passwords\\<\/p>\n\n\n\n<p>Program: Internet Download Manager &gt;6<\/p>\n\n\n\n<p>User<\/p>\n\n\n\n<p>EncPassword<\/p>\n\n\n\n<p>IDM<\/p>\n\n\n\n<p>Advapi32<\/p>\n\n\n\n<p>RegOpenKeyEx<\/p>\n\n\n\n<p>RegCloseKey<\/p>\n\n\n\n<p>RegQueryValueEx<\/p>\n\n\n\n<p>Software\\IMVU\\username<\/p>\n\n\n\n<p>Software\\IMVU\\password<\/p>\n\n\n\n<p>Imvu<\/p>\n\n\n\n<p>Chrome<\/p>\n\n\n\n<p>Firefox<\/p>\n\n\n\n<p>Internet Explorer<\/p>\n\n\n\n<p>Opera<\/p>\n\n\n\n<p>Safari<\/p>\n\n\n\n<p>URL<\/p>\n\n\n\n<p>User Name :<\/p>\n\n\n\n<p>Password :<\/p>\n\n\n\n<p>URL :<\/p>\n\n\n\n<p>Web Browser :<\/p>\n\n\n\n<p>Browsers.txt<\/p>\n\n\n\n<p>Password<\/p>\n\n\n\n<p>\/stext<\/p>\n\n\n\n<p>RecoverBrowsers<\/p>\n\n\n\n<p>Outlook<\/p>\n\n\n\n<p>_Thunder_bird<\/p>\n\n\n\n<p>Eudora<\/p>\n\n\n\n<p>Incredimail<\/p>\n\n\n\n<p>Netscape<\/p>\n\n\n\n<p>\\Mails.txt<\/p>\n\n\n\n<p>RecoverMail<\/p>\n\n\n\n<p>Application<\/p>\n\n\n\n<p>Email :<\/p>\n\n\n\n<p>Server :<\/p>\n\n\n\n<p>Application :<\/p>\n\n\n\n<p>kernel32<\/p>\n\n\n\n<p>KeyBase<\/p>\n\n\n\n<p>ntdll<\/p>\n\n\n\n<p>LoadLibraryA<\/p>\n\n\n\n<p>.dll<\/p>\n\n\n\n<p>user32<\/p>\n\n\n\n<p>$Set$Window$sHook$Ex$A$<\/p>\n\n\n\n<p>These strings show that this file is a password stealer. It collects keystrokes and copies clipboard images then uploads them to <strong>hxxp:\/\/www.twentysixjune.biz\/jonoTwo-4sept-14oct\/image\/upload.php<\/strong><br>It also collects information from the following:<\/p>\n\n\n\n<p>Software\\Paltalk\\<\/p>\n\n\n\n<p>nickname<\/p>\n\n\n\n<p>pwd<\/p>\n\n\n\n<p>Program: FileZilla<\/p>\n\n\n\n<p>FileZilla\\recentservers.xml<\/p>\n\n\n\n<p>$\\jDow$nloader\\$config\\dat$abase.scr$ipt<\/p>\n\n\n\n<p>JDownloader<\/p>\n\n\n\n<p>IDM<\/p>\n\n\n\n<p>Software\\IMVU\\username<\/p>\n\n\n\n<p>Software\\IMVU\\password<\/p>\n\n\n\n<p>Imvu<\/p>\n\n\n\n<p>Chrome<\/p>\n\n\n\n<p>Firefox<\/p>\n\n\n\n<p>Internet Explorer<\/p>\n\n\n\n<p>Opera<\/p>\n\n\n\n<p>Safari<\/p>\n\n\n\n<p>URL<\/p>\n\n\n\n<p>User Name :<\/p>\n\n\n\n<p>Password :<\/p>\n\n\n\n<p>URL :<\/p>\n\n\n\n<p>Web Browser :<\/p>\n\n\n\n<p>Browsers.txt<\/p>\n\n\n\n<p>Password<\/p>\n\n\n\n<p>\/stext<\/p>\n\n\n\n<p>RecoverBrowsers<\/p>\n\n\n\n<p>Outlook<\/p>\n\n\n\n<p>_Thunder_bird<\/p>\n\n\n\n<p>Eudora<\/p>\n\n\n\n<p>Incredimail<\/p>\n\n\n\n<p>Netscape<\/p>\n\n\n\n<p>\\Mails.txt<\/p>\n\n\n\n<p>RecoverMail<\/p>\n\n\n\n<p>Application<\/p>\n\n\n\n<p>Email<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Malicious URL<\/h3>\n\n\n\n<p>hxxp:\/\/twentysixjune(.)biz<\/p>\n\n\n\n<p>Ip address is: 80(.)82(.)78(.)57 : 80<\/p>\n\n\n\n<p>This is the malicious url we found within the strings, even Virus Total flagged this url as malicious by six vendors.<\/p>\n\n\n\n<p>https:\/\/virustotal.com\/en\/url\/03f84b1e66f394d4d506d16c44434136496399f7ed3cfeccb69c9725951d5ea2\/analysis\/1488780554<\/p>\n\n\n\n<p>AegisLab WebGuard Malicious site<\/p>\n\n\n\n<p>Sophos Malicious site<\/p>\n\n\n\n<p>Trustwave Malicious site<\/p>\n\n\n\n<p>BitDefender Malware site<\/p>\n\n\n\n<p>Fortinet Malware site<\/p>\n\n\n\n<p>G-Data Malware site<\/p>\n\n\n\n<p><strong>Code Injection<\/strong><\/p>\n\n\n\n<p><strong>Process &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Code size Virtual Address&nbsp;<\/strong><br><br>C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\RegAsm.exe&nbsp;&nbsp; &nbsp;516096 &nbsp; &nbsp; &nbsp;400000<br><br>C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\RegAsm.exe&nbsp;&nbsp; &nbsp;364544 &nbsp; &nbsp; &nbsp;400000<\/p>\n\n\n\n<p><strong>Conclusion<\/strong><br><br>We recommend blocking the malicious URL and searching for the executable (sapp.exe) in the application data location then removing the sapp.exe.<br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This malware sample masquerading as a Proforma Invoice was identified through a recent spear phishing attack on one of our client networks. The sample in question is a .NET file and comes with the name \u2018Proforma Invoice\u2019. We are sharing it for the benefit of the community.<\/p>\n","protected":false},"author":1,"featured_media":1030,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[],"class_list":["post-988","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-labs"],"_links":{"self":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/988","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/comments?post=988"}],"version-history":[{"count":4,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/988\/revisions"}],"predecessor-version":[{"id":4081,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/988\/revisions\/4081"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media\/1030"}],"wp:attachment":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media?parent=988"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/categories?post=988"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/tags?post=988"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}