Analysis
-
max time kernel
601s -
max time network
598s -
platform
windows7_x64 -
resource
win7-en -
submitted
07-09-2021 17:15
Static task
static1
Behavioral task
behavioral1
Sample
FSOC/libeay32.dll
Resource
win7v20210408
Behavioral task
behavioral2
Sample
FSOC/libeay32.dll
Resource
win10-en
Behavioral task
behavioral3
Sample
FSOC/ssleay32.dll
Resource
win7v20210408
Behavioral task
behavioral4
Sample
FSOC/ssleay32.dll
Resource
win10-en
Behavioral task
behavioral5
Sample
FSOC/vmtools.exe
Resource
win7-en
Behavioral task
behavioral6
Sample
FSOC/vmtools.exe
Resource
win10v20210408
Behavioral task
behavioral7
Sample
FSOC/vmworktool.exe
Resource
win7-en
Behavioral task
behavioral8
Sample
FSOC/vmworktool.exe
Resource
win10v20210408
General
-
Target
FSOC/vmtools.exe
-
Size
15.8MB
-
MD5
2d1106c13af8afc6fff279a41e4893c4
-
SHA1
d076af3cded5a3b9593bdb8613c5c5145063acb3
-
SHA256
2555e7cf32b7cbf8431f5cad37ae9733d208460a96e8b9d890366544c3bb17c5
-
SHA512
d7ae08ca1bfe63d73f78d724a03bd879dc79a117c851d32530c911ba37ba066e8d27dd3195fecb70c53477657f3b27c66c283a9e1ab5960c9b0a5e084c6a7846
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Control Panel\International\Geo\Nation vmtools.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString vmtools.exe Key opened \REGISTRY\MACHINE\hardware\description\system\centralProcessor\2 vmtools.exe Key opened \REGISTRY\MACHINE\hardware\description\system\centralProcessor\0 vmtools.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString vmtools.exe Key opened \REGISTRY\MACHINE\hardware\description\system\centralProcessor\16 vmtools.exe Key opened \REGISTRY\MACHINE\hardware\description\system\centralProcessor\1 vmtools.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 1696 vmtools.exe 1696 vmtools.exe 1696 vmtools.exe 1696 vmtools.exe 1696 vmtools.exe 1696 vmtools.exe 1696 vmtools.exe 1696 vmtools.exe 1572 vmtools.exe 1572 vmtools.exe 1572 vmtools.exe 1572 vmtools.exe 1572 vmtools.exe 1572 vmtools.exe 1216 vmworktool.exe 1216 vmworktool.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1696 vmtools.exe Token: SeDebugPrivilege 1696 vmtools.exe Token: SeTakeOwnershipPrivilege 1572 vmtools.exe Token: SeTcbPrivilege 1572 vmtools.exe Token: SeTcbPrivilege 1572 vmtools.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1696 vmtools.exe 1696 vmtools.exe 1696 vmtools.exe 1696 vmtools.exe 1572 vmtools.exe 1572 vmtools.exe 1572 vmtools.exe 1572 vmtools.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1572 wrote to memory of 1216 1572 vmtools.exe 31 PID 1572 wrote to memory of 1216 1572 vmtools.exe 31 PID 1572 wrote to memory of 1216 1572 vmtools.exe 31 PID 1572 wrote to memory of 1216 1572 vmtools.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\FSOC\vmtools.exe"C:\Users\Admin\AppData\Local\Temp\FSOC\vmtools.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\FSOC\vmtools.exeC:\Users\Admin\AppData\Local\Temp\FSOC\vmtools.exe -run_agent -second2⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\FSOC\vmworktool.exeC:\Users\Admin\AppData\Local\Temp\FSOC\vmworktool.exe /tray /user3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1216
-
-