Analysis
-
max time kernel
600s -
max time network
601s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
07-09-2021 17:15
Static task
static1
Behavioral task
behavioral1
Sample
FSOC/libeay32.dll
Resource
win7v20210408
Behavioral task
behavioral2
Sample
FSOC/libeay32.dll
Resource
win10-en
Behavioral task
behavioral3
Sample
FSOC/ssleay32.dll
Resource
win7v20210408
Behavioral task
behavioral4
Sample
FSOC/ssleay32.dll
Resource
win10-en
Behavioral task
behavioral5
Sample
FSOC/vmtools.exe
Resource
win7-en
Behavioral task
behavioral6
Sample
FSOC/vmtools.exe
Resource
win10v20210408
Behavioral task
behavioral7
Sample
FSOC/vmworktool.exe
Resource
win7-en
Behavioral task
behavioral8
Sample
FSOC/vmworktool.exe
Resource
win10v20210408
General
-
Target
FSOC/vmtools.exe
-
Size
15.8MB
-
MD5
2d1106c13af8afc6fff279a41e4893c4
-
SHA1
d076af3cded5a3b9593bdb8613c5c5145063acb3
-
SHA256
2555e7cf32b7cbf8431f5cad37ae9733d208460a96e8b9d890366544c3bb17c5
-
SHA512
d7ae08ca1bfe63d73f78d724a03bd879dc79a117c851d32530c911ba37ba066e8d27dd3195fecb70c53477657f3b27c66c283a9e1ab5960c9b0a5e084c6a7846
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 3940 created 904 3940 svchost.exe 67 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Control Panel\International\Geo\Nation vmtools.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString vmtools.exe Key opened \REGISTRY\MACHINE\hardware\description\system\centralProcessor\16 vmtools.exe Key opened \REGISTRY\MACHINE\hardware\description\system\centralProcessor\1 vmtools.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString vmtools.exe Key opened \REGISTRY\MACHINE\hardware\description\system\centralProcessor\2 vmtools.exe Key opened \REGISTRY\MACHINE\hardware\description\system\centralProcessor\0 vmtools.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 vmtools.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@C:\Windows\SysWOW64\FirewallControlPanel.dll,-12122 = "Windows Firewall" vmtools.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing vmtools.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 904 vmtools.exe 904 vmtools.exe 904 vmtools.exe 904 vmtools.exe 904 vmtools.exe 904 vmtools.exe 904 vmtools.exe 904 vmtools.exe 904 vmtools.exe 904 vmtools.exe 904 vmtools.exe 904 vmtools.exe 3624 vmtools.exe 3624 vmtools.exe 3624 vmtools.exe 3624 vmtools.exe 3624 vmtools.exe 3624 vmtools.exe 3624 vmtools.exe 3624 vmtools.exe 1944 vmworktool.exe 1944 vmworktool.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 904 vmtools.exe Token: SeDebugPrivilege 904 vmtools.exe Token: SeTcbPrivilege 3940 svchost.exe Token: SeTcbPrivilege 3940 svchost.exe Token: SeTakeOwnershipPrivilege 3624 vmtools.exe Token: SeTcbPrivilege 3624 vmtools.exe Token: SeTcbPrivilege 3624 vmtools.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 904 vmtools.exe 904 vmtools.exe 904 vmtools.exe 904 vmtools.exe 3624 vmtools.exe 3624 vmtools.exe 3624 vmtools.exe 3624 vmtools.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3940 wrote to memory of 3624 3940 svchost.exe 76 PID 3940 wrote to memory of 3624 3940 svchost.exe 76 PID 3940 wrote to memory of 3624 3940 svchost.exe 76 PID 3624 wrote to memory of 1944 3624 vmtools.exe 77 PID 3624 wrote to memory of 1944 3624 vmtools.exe 77 PID 3624 wrote to memory of 1944 3624 vmtools.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\FSOC\vmtools.exe"C:\Users\Admin\AppData\Local\Temp\FSOC\vmtools.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:904 -
C:\Users\Admin\AppData\Local\Temp\FSOC\vmtools.exeC:\Users\Admin\AppData\Local\Temp\FSOC\vmtools.exe -run_agent -second2⤵
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Users\Admin\AppData\Local\Temp\FSOC\vmworktool.exeC:\Users\Admin\AppData\Local\Temp\FSOC\vmworktool.exe /tray /user3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1944
-
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s seclogon1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3940