Analysis
-
max time kernel
69s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
19-07-2022 15:48
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.Olock.1.19122.exe
Resource
win7-20220715-en
General
-
Target
SecuriteInfo.com.Trojan.Olock.1.19122.exe
-
Size
450KB
-
MD5
0c7194673ca5c213b88c8696d285d205
-
SHA1
d4575c2ea9fc7bc24ca086f403d132b70167cc49
-
SHA256
b1313b8c8d249728b5fe9756332a98c1415468df5f7001f2c1e4c26826edb83e
-
SHA512
a0732717dab0521c73fd6668053311cc96d82176f71b82cbcf91bd484c9cf7803fdde0a42960af338f8aa6b5be505dff71a94c18283c7838b2c0e7cd36821f1c
Malware Config
Extracted
formbook
4.1
t19g
playstationspiele.com
cakesbyannal.com
racepin.space
anti-offender.com
magnetque.com
farragorealtybrokerage.com
khuludmohammed.com
v33696.com
84ggg.com
d440.com
soccersmarthome.com
ofthis.world
fivestaryardcards.com
lusyard.com
gghft.com
viajesfortur.com
rationalirrationality.com
hanaramenrestaurant.com
exactlycleanse.com
martensenargentina.com
michellesellsvt.com
pupsloveandlondon.com
kfhym.world
makeuphoje.com
ebookrise.com
flesherbrothers.com
doonaudio.com
doanet.xyz
wrghintlian.com
davidchristl.com
domaintch.com
quotereflection.com
eroptikblog.xyz
iranianinvestmentclub.com
cp200motorola.com
vsenq.com
theamazonmovement.com
aspiteksoln.com
perkebunannews.com
myreverie.life
hrddf.com
gblaincreative.com
lipsstreet.com
xxf76.top
dureluxx.com
heldelicioso.com
taskconsulting.com
dongcunzhengfu.com
itohpe.com
abundantskill.com
fernhutco.com
hairgrowthxpert.com
intelligentreportscloud.com
maybesupply.com
7156.world
cr-marcelo.com
shequipamentos.com
villeenvie.net
robbyscreations.com
mpaohead.com
nailsa.biz
accoladesandmore.com
preppers.pro
pinpinduo2.xyz
allsofttech.com
Signatures
-
Formbook payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1548-67-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1548-68-0x000000000041F1B0-mapping.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
SecuriteInfo.com.Trojan.Olock.1.19122.exedescription pid process target process PID 1896 set thread context of 1548 1896 SecuriteInfo.com.Trojan.Olock.1.19122.exe SecuriteInfo.com.Trojan.Olock.1.19122.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
SecuriteInfo.com.Trojan.Olock.1.19122.exepowershell.exepid process 1548 SecuriteInfo.com.Trojan.Olock.1.19122.exe 1328 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 1328 powershell.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
SecuriteInfo.com.Trojan.Olock.1.19122.exedescription pid process target process PID 1896 wrote to memory of 1328 1896 SecuriteInfo.com.Trojan.Olock.1.19122.exe powershell.exe PID 1896 wrote to memory of 1328 1896 SecuriteInfo.com.Trojan.Olock.1.19122.exe powershell.exe PID 1896 wrote to memory of 1328 1896 SecuriteInfo.com.Trojan.Olock.1.19122.exe powershell.exe PID 1896 wrote to memory of 1328 1896 SecuriteInfo.com.Trojan.Olock.1.19122.exe powershell.exe PID 1896 wrote to memory of 932 1896 SecuriteInfo.com.Trojan.Olock.1.19122.exe schtasks.exe PID 1896 wrote to memory of 932 1896 SecuriteInfo.com.Trojan.Olock.1.19122.exe schtasks.exe PID 1896 wrote to memory of 932 1896 SecuriteInfo.com.Trojan.Olock.1.19122.exe schtasks.exe PID 1896 wrote to memory of 932 1896 SecuriteInfo.com.Trojan.Olock.1.19122.exe schtasks.exe PID 1896 wrote to memory of 1548 1896 SecuriteInfo.com.Trojan.Olock.1.19122.exe SecuriteInfo.com.Trojan.Olock.1.19122.exe PID 1896 wrote to memory of 1548 1896 SecuriteInfo.com.Trojan.Olock.1.19122.exe SecuriteInfo.com.Trojan.Olock.1.19122.exe PID 1896 wrote to memory of 1548 1896 SecuriteInfo.com.Trojan.Olock.1.19122.exe SecuriteInfo.com.Trojan.Olock.1.19122.exe PID 1896 wrote to memory of 1548 1896 SecuriteInfo.com.Trojan.Olock.1.19122.exe SecuriteInfo.com.Trojan.Olock.1.19122.exe PID 1896 wrote to memory of 1548 1896 SecuriteInfo.com.Trojan.Olock.1.19122.exe SecuriteInfo.com.Trojan.Olock.1.19122.exe PID 1896 wrote to memory of 1548 1896 SecuriteInfo.com.Trojan.Olock.1.19122.exe SecuriteInfo.com.Trojan.Olock.1.19122.exe PID 1896 wrote to memory of 1548 1896 SecuriteInfo.com.Trojan.Olock.1.19122.exe SecuriteInfo.com.Trojan.Olock.1.19122.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Olock.1.19122.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Olock.1.19122.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\TGArRC.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TGArRC" /XML "C:\Users\Admin\AppData\Local\Temp\tmp1095.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Olock.1.19122.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Olock.1.19122.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp1095.tmpFilesize
1KB
MD50f58d3f3cbdbb1e641c1678c07d01772
SHA118eefaf7e6607f1b49d919d2f5aac1052128969d
SHA25695e0cfea649f6ac9d44a06741c39f3ae0dba6d29059ccbc54d9a5a737d47ea4a
SHA512a966356dbfe48664ce4c7ea751958b16387ecbbc7f058508cc2db11c5343c29a60af006f8f94ba44d51d46c6401900c6e4c7525ae8b5cd349ceadda077809410
-
memory/932-60-0x0000000000000000-mapping.dmp
-
memory/1328-71-0x000000006E830000-0x000000006EDDB000-memory.dmpFilesize
5.7MB
-
memory/1328-70-0x000000006E830000-0x000000006EDDB000-memory.dmpFilesize
5.7MB
-
memory/1328-59-0x0000000000000000-mapping.dmp
-
memory/1548-65-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1548-69-0x0000000000830000-0x0000000000B33000-memory.dmpFilesize
3.0MB
-
memory/1548-68-0x000000000041F1B0-mapping.dmp
-
memory/1548-67-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1548-64-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1896-58-0x00000000053E0000-0x000000000544C000-memory.dmpFilesize
432KB
-
memory/1896-63-0x0000000002060000-0x0000000002094000-memory.dmpFilesize
208KB
-
memory/1896-54-0x0000000000260000-0x00000000002D6000-memory.dmpFilesize
472KB
-
memory/1896-57-0x0000000000500000-0x000000000050A000-memory.dmpFilesize
40KB
-
memory/1896-56-0x0000000000250000-0x0000000000264000-memory.dmpFilesize
80KB
-
memory/1896-55-0x0000000076081000-0x0000000076083000-memory.dmpFilesize
8KB