Analysis
-
max time kernel
150s -
max time network
181s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
29-10-2021 05:09
Static task
static1
Behavioral task
behavioral1
Sample
TNT Receipt_AWB no#87993766478,pdf.exe
Resource
win7-en-20210920
General
-
Target
TNT Receipt_AWB no#87993766478,pdf.exe
-
Size
715KB
-
MD5
27a9e4f59f0735c1cd5b6fec688fe6f4
-
SHA1
86de7e9b35afb3726a925b1a1b7bd00c81c2f6a9
-
SHA256
64e7a4dbad57f1c217a17ad6214d29230ac8ba813d001fdaa35f17fd83f62cf3
-
SHA512
1bfc5666172ce59267c58d70347060f5b696dc7414bd1b7efc20f8a544da7c671e9943c3e364ddebdbd734e0de14743f5c5244691d7306973486596376bf75e1
Malware Config
Signatures
-
suricata: ET MALWARE Remocs 3.x Unencrypted Checkin
suricata: ET MALWARE Remocs 3.x Unencrypted Checkin
-
suricata: ET MALWARE Remocs 3.x Unencrypted Server Response
suricata: ET MALWARE Remocs 3.x Unencrypted Server Response
-
Executes dropped EXE 1 IoCs
Processes:
fkvd.exepid process 1196 fkvd.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 2 IoCs
Processes:
TNT Receipt_AWB no#87993766478,pdf.exefkvd.exedescription pid process target process PID 540 set thread context of 552 540 TNT Receipt_AWB no#87993766478,pdf.exe vbc.exe PID 1196 set thread context of 864 1196 fkvd.exe vbc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 1168 schtasks.exe 1564 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
TNT Receipt_AWB no#87993766478,pdf.exefkvd.exedescription pid process Token: SeDebugPrivilege 540 TNT Receipt_AWB no#87993766478,pdf.exe Token: SeDebugPrivilege 1196 fkvd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
vbc.exepid process 552 vbc.exe -
Suspicious use of WriteProcessMemory 54 IoCs
Processes:
TNT Receipt_AWB no#87993766478,pdf.execmd.exetaskeng.exefkvd.execmd.exedescription pid process target process PID 540 wrote to memory of 552 540 TNT Receipt_AWB no#87993766478,pdf.exe vbc.exe PID 540 wrote to memory of 552 540 TNT Receipt_AWB no#87993766478,pdf.exe vbc.exe PID 540 wrote to memory of 552 540 TNT Receipt_AWB no#87993766478,pdf.exe vbc.exe PID 540 wrote to memory of 552 540 TNT Receipt_AWB no#87993766478,pdf.exe vbc.exe PID 540 wrote to memory of 552 540 TNT Receipt_AWB no#87993766478,pdf.exe vbc.exe PID 540 wrote to memory of 552 540 TNT Receipt_AWB no#87993766478,pdf.exe vbc.exe PID 540 wrote to memory of 552 540 TNT Receipt_AWB no#87993766478,pdf.exe vbc.exe PID 540 wrote to memory of 552 540 TNT Receipt_AWB no#87993766478,pdf.exe vbc.exe PID 540 wrote to memory of 552 540 TNT Receipt_AWB no#87993766478,pdf.exe vbc.exe PID 540 wrote to memory of 552 540 TNT Receipt_AWB no#87993766478,pdf.exe vbc.exe PID 540 wrote to memory of 552 540 TNT Receipt_AWB no#87993766478,pdf.exe vbc.exe PID 540 wrote to memory of 552 540 TNT Receipt_AWB no#87993766478,pdf.exe vbc.exe PID 540 wrote to memory of 552 540 TNT Receipt_AWB no#87993766478,pdf.exe vbc.exe PID 540 wrote to memory of 928 540 TNT Receipt_AWB no#87993766478,pdf.exe cmd.exe PID 540 wrote to memory of 928 540 TNT Receipt_AWB no#87993766478,pdf.exe cmd.exe PID 540 wrote to memory of 928 540 TNT Receipt_AWB no#87993766478,pdf.exe cmd.exe PID 540 wrote to memory of 928 540 TNT Receipt_AWB no#87993766478,pdf.exe cmd.exe PID 540 wrote to memory of 1628 540 TNT Receipt_AWB no#87993766478,pdf.exe cmd.exe PID 540 wrote to memory of 1628 540 TNT Receipt_AWB no#87993766478,pdf.exe cmd.exe PID 540 wrote to memory of 1628 540 TNT Receipt_AWB no#87993766478,pdf.exe cmd.exe PID 540 wrote to memory of 1628 540 TNT Receipt_AWB no#87993766478,pdf.exe cmd.exe PID 928 wrote to memory of 1168 928 cmd.exe schtasks.exe PID 928 wrote to memory of 1168 928 cmd.exe schtasks.exe PID 928 wrote to memory of 1168 928 cmd.exe schtasks.exe PID 928 wrote to memory of 1168 928 cmd.exe schtasks.exe PID 1972 wrote to memory of 1196 1972 taskeng.exe fkvd.exe PID 1972 wrote to memory of 1196 1972 taskeng.exe fkvd.exe PID 1972 wrote to memory of 1196 1972 taskeng.exe fkvd.exe PID 1972 wrote to memory of 1196 1972 taskeng.exe fkvd.exe PID 1196 wrote to memory of 864 1196 fkvd.exe vbc.exe PID 1196 wrote to memory of 864 1196 fkvd.exe vbc.exe PID 1196 wrote to memory of 864 1196 fkvd.exe vbc.exe PID 1196 wrote to memory of 864 1196 fkvd.exe vbc.exe PID 1196 wrote to memory of 864 1196 fkvd.exe vbc.exe PID 1196 wrote to memory of 864 1196 fkvd.exe vbc.exe PID 1196 wrote to memory of 864 1196 fkvd.exe vbc.exe PID 1196 wrote to memory of 864 1196 fkvd.exe vbc.exe PID 1196 wrote to memory of 864 1196 fkvd.exe vbc.exe PID 1196 wrote to memory of 864 1196 fkvd.exe vbc.exe PID 1196 wrote to memory of 864 1196 fkvd.exe vbc.exe PID 1196 wrote to memory of 864 1196 fkvd.exe vbc.exe PID 1196 wrote to memory of 864 1196 fkvd.exe vbc.exe PID 1196 wrote to memory of 956 1196 fkvd.exe cmd.exe PID 1196 wrote to memory of 956 1196 fkvd.exe cmd.exe PID 1196 wrote to memory of 956 1196 fkvd.exe cmd.exe PID 1196 wrote to memory of 956 1196 fkvd.exe cmd.exe PID 1196 wrote to memory of 1732 1196 fkvd.exe cmd.exe PID 1196 wrote to memory of 1732 1196 fkvd.exe cmd.exe PID 1196 wrote to memory of 1732 1196 fkvd.exe cmd.exe PID 1196 wrote to memory of 1732 1196 fkvd.exe cmd.exe PID 956 wrote to memory of 1564 956 cmd.exe schtasks.exe PID 956 wrote to memory of 1564 956 cmd.exe schtasks.exe PID 956 wrote to memory of 1564 956 cmd.exe schtasks.exe PID 956 wrote to memory of 1564 956 cmd.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\TNT Receipt_AWB no#87993766478,pdf.exe"C:\Users\Admin\AppData\Local\Temp\TNT Receipt_AWB no#87993766478,pdf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /sc minute /mo 1 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\fkvd\fkvd.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\fkvd\fkvd.exe'" /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\TNT Receipt_AWB no#87993766478,pdf.exe" "C:\Users\Admin\AppData\Roaming\fkvd\fkvd.exe"2⤵
-
C:\Windows\system32\taskeng.exetaskeng.exe {ADDD33D1-C12A-438F-A2FB-A49949E76BDD} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\fkvd\fkvd.exeC:\Users\Admin\AppData\Roaming\fkvd\fkvd.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /sc minute /mo 1 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\fkvd\fkvd.exe'" /f3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\fkvd\fkvd.exe'" /f4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Roaming\fkvd\fkvd.exe" "C:\Users\Admin\AppData\Roaming\fkvd\fkvd.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\fkvd\fkvd.exeMD5
27a9e4f59f0735c1cd5b6fec688fe6f4
SHA186de7e9b35afb3726a925b1a1b7bd00c81c2f6a9
SHA25664e7a4dbad57f1c217a17ad6214d29230ac8ba813d001fdaa35f17fd83f62cf3
SHA5121bfc5666172ce59267c58d70347060f5b696dc7414bd1b7efc20f8a544da7c671e9943c3e364ddebdbd734e0de14743f5c5244691d7306973486596376bf75e1
-
C:\Users\Admin\AppData\Roaming\fkvd\fkvd.exeMD5
27a9e4f59f0735c1cd5b6fec688fe6f4
SHA186de7e9b35afb3726a925b1a1b7bd00c81c2f6a9
SHA25664e7a4dbad57f1c217a17ad6214d29230ac8ba813d001fdaa35f17fd83f62cf3
SHA5121bfc5666172ce59267c58d70347060f5b696dc7414bd1b7efc20f8a544da7c671e9943c3e364ddebdbd734e0de14743f5c5244691d7306973486596376bf75e1
-
memory/540-54-0x0000000000B80000-0x0000000000B81000-memory.dmpFilesize
4KB
-
memory/540-56-0x0000000004FD0000-0x0000000004FD1000-memory.dmpFilesize
4KB
-
memory/552-67-0x00000000767F1000-0x00000000767F3000-memory.dmpFilesize
8KB
-
memory/552-66-0x000000000042FC39-mapping.dmp
-
memory/552-61-0x0000000000400000-0x0000000000479000-memory.dmpFilesize
484KB
-
memory/552-62-0x0000000000400000-0x0000000000479000-memory.dmpFilesize
484KB
-
memory/552-63-0x0000000000400000-0x0000000000479000-memory.dmpFilesize
484KB
-
memory/552-64-0x0000000000400000-0x0000000000479000-memory.dmpFilesize
484KB
-
memory/552-65-0x0000000000400000-0x0000000000479000-memory.dmpFilesize
484KB
-
memory/552-57-0x0000000000400000-0x0000000000479000-memory.dmpFilesize
484KB
-
memory/552-59-0x0000000000400000-0x0000000000479000-memory.dmpFilesize
484KB
-
memory/552-58-0x0000000000400000-0x0000000000479000-memory.dmpFilesize
484KB
-
memory/552-71-0x0000000000400000-0x0000000000479000-memory.dmpFilesize
484KB
-
memory/552-60-0x0000000000400000-0x0000000000479000-memory.dmpFilesize
484KB
-
memory/864-87-0x000000000042FC39-mapping.dmp
-
memory/928-68-0x0000000000000000-mapping.dmp
-
memory/956-89-0x0000000000000000-mapping.dmp
-
memory/1168-70-0x0000000000000000-mapping.dmp
-
memory/1196-75-0x0000000001350000-0x0000000001351000-memory.dmpFilesize
4KB
-
memory/1196-77-0x0000000004C60000-0x0000000004C61000-memory.dmpFilesize
4KB
-
memory/1196-73-0x0000000000000000-mapping.dmp
-
memory/1564-91-0x0000000000000000-mapping.dmp
-
memory/1628-69-0x0000000000000000-mapping.dmp
-
memory/1732-90-0x0000000000000000-mapping.dmp