Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23/09/2022, 09:32
Static task
static1
Behavioral task
behavioral1
Sample
PO-11059021022021.exe
Resource
win7-20220812-en
General
-
Target
PO-11059021022021.exe
-
Size
663KB
-
MD5
f79dd4569875b93a8d76514917da8ed6
-
SHA1
3cf17a7501bf43730c845efbb43bcf1135690fc4
-
SHA256
b0a89f3465bf92183fd7cb61177ea2f13eb9ff3381ac06f4b14c642742982405
-
SHA512
736f662b306040745bc992207cbf63a4ee0c0f0af65bf95d120ed2644ead9ceb9a965ad9329da01794ca4b8fd55b1f50f544ded39461ddaf22ee46c9bded013b
-
SSDEEP
12288:Y3iRW/RKn40HiVwnXRxsfCQ/UIAObPDckWW9s5+oXUcC:+SHiKXuL//bPDckxs5TUc
Malware Config
Extracted
formbook
bwe0
GA8abA96SLI=
RjM/QAsrNyRPlNEjahNMdKXlPtbXpQ==
rOQ4ySihIKVFhRnhZxfZ
iSnyAlGXQBSBwz1C
SYfcQ54ijGWAuQq1UQTE
XRcVgsQIO8FVnvCOiHLvE3k=
K2XLULRJuod6I3dO
S4oH5i5i3+expw==
4hZdto3RgCY9esve1k7T5x9YPw==
fkpgXDuEv2NzvxCcq2AxMnE=
13czFGvtsco1gf8=
ub4KhXCsZ/qnnvYTijN3dA==
WD5IRIcJB51Hfs8grBnldA==
YqxA1LPudXGKyP1FlQ==
MZHXMBdZ8Mf2X3ZjSVY=
7mLLNhchknqdLVbz+6ci4VeD
66OK6kmRv8N6I3dO
+97y8jK5vTnIn8crIwyHnRxv03Kp
PC1PqPJ6573fH0aUnGAxMnE=
3BFlt4nJcA3Inb3TGO02bq++XzWRMVg=
JFWj7LK++b1oRUtG
TbxQMHrFdPd6I3dO
ltV+Zbop3H8ufAGhzN3O
mlcxPKADy6TjUdNgnWAxMnE=
GZlnUCk98Q0sfdIykw==
ejIKCEuKTCdRrCmEik4Llxxv03Kp
oBioj+xiThlFleT8Sb2OU6jyDjWRMVg=
FTiMDEy9JumdFnxiig==
3F/6yw1VGOkbfvl+wLtBZ+YotQlBMKb8sw==
gP2ZcmKh5co1gf8=
QB0tm/t82o5NJ0/hZxfZ
7p+eEFywCuQDNXv6UOqfYw==
VT09fVZax5pZOWDL1JH64Ima
6y+iWKUy3+expw==
QsByZl2v6YY/IF87hDWDmRtv03Kp
FMSC3UQG3+expw==
4iZslO0xz0vUntnn/fX2k6bkRPCE3nhQsQ==
QALQo+6BigCVFnxiig==
tGEvL4wVB82JcsmhzN3O
C3MpKHrHh0hV4B2p4dR3dQ==
+jBbwhmM9K3ABEXhZxfZ
Bgtm5ypqp4F6I3dO
gjAL+kjz7sphJ0zhZxfZ
XdWUftmHvYF6I3dO
/72t+jNqjjDTEV4tbVg=
DogcC2/11HdGqv2BEuHA
XgwEGD8FXWErZmlI
i0Ud7r7Ot39AkQrk3Y1frfEsNw==
ldkwfVSeU9dkhpeknQ==
Do9QPSpsaYJ6I3dO
lJCssH2SnGLkU+Y=
993QLp0nk1yDgZd1rBnldA==
k8cWkuts5VMbaZ9quHj64Ima
bF53yjBwIg9H
BYcZjHa7hWAyFzAQMyg616PYPtbXpQ==
XFSfGGr2bDP/ebB8x3Izrh5v03Kp
A8PhVrAswln64jlMWGnQ9pXThRZ8HLyi
yL3yWzZCyVcmpCbw7q+FFPkIFzWRMVg=
P8yKVC56enmwYp+HpaPR
OvT4bdZHwkTRntehzN3O
re6GEPc19FobfNUkrBnldA==
3JOU+kudyloQ/zcBR2FgrfEsNw==
B/cOgMQIHPYjkynCGiG5xbYaGwQ=
XqQpFlRw8m4bXJt0uZZ12SVNPw==
my1245.com
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Control Panel\International\Geo\Nation PO-11059021022021.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 864 set thread context of 836 864 PO-11059021022021.exe 31 PID 836 set thread context of 1296 836 PO-11059021022021.exe 14 PID 836 set thread context of 1296 836 PO-11059021022021.exe 14 PID 1704 set thread context of 1296 1704 wlanext.exe 14 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2032 schtasks.exe -
description ioc Process Key created \Registry\User\S-1-5-21-2292972927-2705560509-2768824231-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 wlanext.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 864 PO-11059021022021.exe 864 PO-11059021022021.exe 836 PO-11059021022021.exe 1116 powershell.exe 836 PO-11059021022021.exe 836 PO-11059021022021.exe 836 PO-11059021022021.exe 836 PO-11059021022021.exe 1704 wlanext.exe 1704 wlanext.exe 1704 wlanext.exe 1704 wlanext.exe 1704 wlanext.exe 1704 wlanext.exe 1704 wlanext.exe 1704 wlanext.exe 1704 wlanext.exe 1704 wlanext.exe 1704 wlanext.exe 1704 wlanext.exe -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 836 PO-11059021022021.exe 836 PO-11059021022021.exe 836 PO-11059021022021.exe 836 PO-11059021022021.exe 1704 wlanext.exe 1704 wlanext.exe 1704 wlanext.exe 1704 wlanext.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 864 PO-11059021022021.exe Token: SeDebugPrivilege 1116 powershell.exe Token: SeDebugPrivilege 836 PO-11059021022021.exe Token: SeDebugPrivilege 1704 wlanext.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1296 Explorer.EXE 1296 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1296 Explorer.EXE 1296 Explorer.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 864 wrote to memory of 1116 864 PO-11059021022021.exe 27 PID 864 wrote to memory of 1116 864 PO-11059021022021.exe 27 PID 864 wrote to memory of 1116 864 PO-11059021022021.exe 27 PID 864 wrote to memory of 1116 864 PO-11059021022021.exe 27 PID 864 wrote to memory of 2032 864 PO-11059021022021.exe 29 PID 864 wrote to memory of 2032 864 PO-11059021022021.exe 29 PID 864 wrote to memory of 2032 864 PO-11059021022021.exe 29 PID 864 wrote to memory of 2032 864 PO-11059021022021.exe 29 PID 864 wrote to memory of 836 864 PO-11059021022021.exe 31 PID 864 wrote to memory of 836 864 PO-11059021022021.exe 31 PID 864 wrote to memory of 836 864 PO-11059021022021.exe 31 PID 864 wrote to memory of 836 864 PO-11059021022021.exe 31 PID 864 wrote to memory of 836 864 PO-11059021022021.exe 31 PID 864 wrote to memory of 836 864 PO-11059021022021.exe 31 PID 864 wrote to memory of 836 864 PO-11059021022021.exe 31 PID 1296 wrote to memory of 1704 1296 Explorer.EXE 32 PID 1296 wrote to memory of 1704 1296 Explorer.EXE 32 PID 1296 wrote to memory of 1704 1296 Explorer.EXE 32 PID 1296 wrote to memory of 1704 1296 Explorer.EXE 32 PID 1704 wrote to memory of 1256 1704 wlanext.exe 34 PID 1704 wrote to memory of 1256 1704 wlanext.exe 34 PID 1704 wrote to memory of 1256 1704 wlanext.exe 34 PID 1704 wrote to memory of 1256 1704 wlanext.exe 34 PID 1704 wrote to memory of 1256 1704 wlanext.exe 34
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Users\Admin\AppData\Local\Temp\PO-11059021022021.exe"C:\Users\Admin\AppData\Local\Temp\PO-11059021022021.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\CfBhRxzZjDw.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1116
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\CfBhRxzZjDw" /XML "C:\Users\Admin\AppData\Local\Temp\tmpCBC8.tmp"3⤵
- Creates scheduled task(s)
PID:2032
-
-
C:\Users\Admin\AppData\Local\Temp\PO-11059021022021.exe"C:\Users\Admin\AppData\Local\Temp\PO-11059021022021.exe"3⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:836
-
-
-
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1256
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54080244b54b05e69bd08c06ccd0be12b
SHA1e22d1725e03a6586333c4ae50919518f46b0a2b8
SHA256d99319fa5872b84ac5787970bbfe83b360f448e2f4574e12e29e0a53a6c8cffe
SHA512147ea5e6ff810b7f27dd7029c70f274782356b4692332311a5ffc2b0f84e72bfa822bdeb2f25b5a853409b25144b4fd4284ca73744b218906251ec4699af5502