Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/09/2022, 10:30
Static task
static1
Behavioral task
behavioral1
Sample
7241c4a2af9e08ca229912f6c95c72fe.exe
Resource
win7-20220812-en
General
-
Target
7241c4a2af9e08ca229912f6c95c72fe.exe
-
Size
475KB
-
MD5
7241c4a2af9e08ca229912f6c95c72fe
-
SHA1
2cdc9f81881cb3bfb7a825bb7c8608922a5ee311
-
SHA256
efb10cca23c4ed132ed9e516dee40bb2906696b91983947507cd05cb9561f6b3
-
SHA512
b200d33df0abf7b1dd0462a6c1a6f26f70146cc50c0976c5734b3777290e5b36462cb59f903952f6d22ce22fecf85b64da2328b8f4d5d290cce49fe1834acf53
-
SSDEEP
6144:lTouKrWBEu3/Z2lpGDHU3ykJ1tC/vOpBjhttFujz1rp/nkQ060AtH15Wc0:lToPWBv/cpGrU3y8tGvo18X/XZn5X0
Malware Config
Extracted
formbook
u8ow
j5a7vTwyeK/qHg==
M2qzs6QwZ5sVSqCc
7KoU1t9NdRnqZ8ML+cB8x38C
pgeKvdoqNNao7Cr94QiDuw==
/QZJhRORtafU/zeqK4o+
2JvqeTAGpQBYdqgXoA4=
5zJ7fa0A0PgCFA==
cnq44WjiBQ5VfKgXoA4=
oAp6hcdNVbr2NaHk4QiDuw==
Z/w2v4V/zV8aVoFnW0zzSt6hYjbD
WJ74K7ehJCNed6gXoA4=
hCRY0pmWSLhPzeTztw==
ZNhbVFvL8KKYyj2udtFXr3U8T6LZeQ==
ur75Bj2XjwVNhAGA
BlhiocrRF/kDFg==
aQY19Du631WFpEg=
yGCGEReSv1T1JVmWfHwp
cvso1tUbJeLrMlhjg4Z8x38C
XmTsffB+q25IYuOWfHwp
ry8fNm8E0PgCFA==
jpTC1EEMl8QsavylFo5Pn0XkR9HHtaw=
VVqBje/QWFipzFCNkl4sY4pzgFfL
vlWFIwZNUbxGXaij2E/PZ4RAT6LZeQ==
ZoKpx1VFx7v+RaPo4QiDuw==
H+M67QcOr9mm7l8=
eQgtxbcUPuSn4jlrfFbyT+GhYjbD
v8JQ+9lJeRvsL2fOuK9ZqVc=
EaLpmYiCMWUbjiCIup0h
Yq7zIaB3CwTHCYOS
e8QMNY/c8gWHsPn6/sJ8x38C
4qTUS/7ZXakxTpeXoZJ8x38C
5LALqHx4yFsEAw==
4n/CPfjjjwzKElNp44lbXV8=
nCNkIig/o0r+
7N63YHLe+8PHCYOS
S8Yv9Wvh64kDYoWF
VeYjqV804l7zMXQpwxM=
cr3GEFvhA6lYke8fqlIbK0sIQDZ+bdYn
KyqoLc3IbbQ7fqgXoA4=
+4gcGx0XujvyPpz5lRQx95FBT6LZeQ==
8vs6RY0S+P/uCQ==
0bgirl055FC1y0esWtbc64II
tUdqFCGRwGYzVoTz+CWJvQ==
I54qU23I75EDYoWF
M2mktwhxo6v1LlUlSEP0VeKhYjbD
UhF3C7WRF24ybI26eGkj
PUa3QvTcZq9KhwVGp0Y5MoEE
mJEVnfxTfoC95gPyhg0lLIk6Cg==
yoLNVw3plASw0yCgLqgs
Jt8Kqrm+NW7N9EDrlQQ=
gspPeq8JNjpDUoNn8X07QFU=
L8b5eiv1sWY5YOaWfHwp
4O6FBIV3K4QMJnO6lJk3
c74fNVa23o5VaNP84QiDuw==
m3vyQyWVBcGRpCSN
cwgrursqO+GwxkSq1sVlrXU8T6LZeQ==
NAJyMT1E6m0sc830BggoPwr4VpQ=
67D3oH1S6G5gkvIyRCi6RWQ8T6LZeQ==
yMo01aycP6gxX8kUTUPvZ4lUS5rUcw==
EipNd9xKbSPwMGdpdaEgS0g=
cCySPxoLstmm7l8=
l+pYdpbs3OfvFg==
kOpdbJ+0/+sqqavhoA==
swqGvwuDv8HvBDeqK4o+
avdoga.net
Extracted
xloader
3.5
u8ow
j5a7vTwyeK/qHg==
M2qzs6QwZ5sVSqCc
7KoU1t9NdRnqZ8ML+cB8x38C
pgeKvdoqNNao7Cr94QiDuw==
/QZJhRORtafU/zeqK4o+
2JvqeTAGpQBYdqgXoA4=
5zJ7fa0A0PgCFA==
cnq44WjiBQ5VfKgXoA4=
oAp6hcdNVbr2NaHk4QiDuw==
Z/w2v4V/zV8aVoFnW0zzSt6hYjbD
WJ74K7ehJCNed6gXoA4=
hCRY0pmWSLhPzeTztw==
ZNhbVFvL8KKYyj2udtFXr3U8T6LZeQ==
ur75Bj2XjwVNhAGA
BlhiocrRF/kDFg==
aQY19Du631WFpEg=
yGCGEReSv1T1JVmWfHwp
cvso1tUbJeLrMlhjg4Z8x38C
XmTsffB+q25IYuOWfHwp
ry8fNm8E0PgCFA==
jpTC1EEMl8QsavylFo5Pn0XkR9HHtaw=
VVqBje/QWFipzFCNkl4sY4pzgFfL
vlWFIwZNUbxGXaij2E/PZ4RAT6LZeQ==
ZoKpx1VFx7v+RaPo4QiDuw==
H+M67QcOr9mm7l8=
eQgtxbcUPuSn4jlrfFbyT+GhYjbD
v8JQ+9lJeRvsL2fOuK9ZqVc=
EaLpmYiCMWUbjiCIup0h
Yq7zIaB3CwTHCYOS
e8QMNY/c8gWHsPn6/sJ8x38C
4qTUS/7ZXakxTpeXoZJ8x38C
5LALqHx4yFsEAw==
4n/CPfjjjwzKElNp44lbXV8=
nCNkIig/o0r+
7N63YHLe+8PHCYOS
S8Yv9Wvh64kDYoWF
VeYjqV804l7zMXQpwxM=
cr3GEFvhA6lYke8fqlIbK0sIQDZ+bdYn
KyqoLc3IbbQ7fqgXoA4=
+4gcGx0XujvyPpz5lRQx95FBT6LZeQ==
8vs6RY0S+P/uCQ==
0bgirl055FC1y0esWtbc64II
tUdqFCGRwGYzVoTz+CWJvQ==
I54qU23I75EDYoWF
M2mktwhxo6v1LlUlSEP0VeKhYjbD
UhF3C7WRF24ybI26eGkj
PUa3QvTcZq9KhwVGp0Y5MoEE
mJEVnfxTfoC95gPyhg0lLIk6Cg==
yoLNVw3plASw0yCgLqgs
Jt8Kqrm+NW7N9EDrlQQ=
gspPeq8JNjpDUoNn8X07QFU=
L8b5eiv1sWY5YOaWfHwp
4O6FBIV3K4QMJnO6lJk3
c74fNVa23o5VaNP84QiDuw==
m3vyQyWVBcGRpCSN
cwgrursqO+GwxkSq1sVlrXU8T6LZeQ==
NAJyMT1E6m0sc830BggoPwr4VpQ=
67D3oH1S6G5gkvIyRCi6RWQ8T6LZeQ==
yMo01aycP6gxX8kUTUPvZ4lUS5rUcw==
EipNd9xKbSPwMGdpdaEgS0g=
cCySPxoLstmm7l8=
l+pYdpbs3OfvFg==
kOpdbJ+0/+sqqavhoA==
swqGvwuDv8HvBDeqK4o+
avdoga.net
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1784 fuwusylazeffuo.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Control Panel\International\Geo\Nation fuwusylazeffuo.exe -
Loads dropped DLL 11 IoCs
pid Process 780 7241c4a2af9e08ca229912f6c95c72fe.exe 780 7241c4a2af9e08ca229912f6c95c72fe.exe 780 7241c4a2af9e08ca229912f6c95c72fe.exe 780 7241c4a2af9e08ca229912f6c95c72fe.exe 1784 fuwusylazeffuo.exe 2008 fuwusylazeffuo.exe 1772 WerFault.exe 1772 WerFault.exe 1772 WerFault.exe 1772 WerFault.exe 1772 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\dyhkboeiqg = "C:\\Users\\Admin\\AppData\\Roaming\\vhesmtdikvlglu\\avyvaajyo.exe" fuwusylazeffuo.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1784 set thread context of 2008 1784 fuwusylazeffuo.exe 29 PID 2008 set thread context of 1236 2008 fuwusylazeffuo.exe 15 PID 868 set thread context of 1236 868 help.exe 15 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1772 1784 WerFault.exe 28 -
description ioc Process Key created \Registry\User\S-1-5-21-2292972927-2705560509-2768824231-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 help.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 2008 fuwusylazeffuo.exe 2008 fuwusylazeffuo.exe 2008 fuwusylazeffuo.exe 2008 fuwusylazeffuo.exe 868 help.exe 868 help.exe 868 help.exe 868 help.exe 868 help.exe 868 help.exe 868 help.exe 868 help.exe 868 help.exe 868 help.exe 868 help.exe 868 help.exe 868 help.exe 868 help.exe 868 help.exe 868 help.exe 868 help.exe 868 help.exe 868 help.exe 868 help.exe 868 help.exe 868 help.exe 868 help.exe 868 help.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 2008 fuwusylazeffuo.exe 2008 fuwusylazeffuo.exe 2008 fuwusylazeffuo.exe 868 help.exe 868 help.exe 868 help.exe 868 help.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2008 fuwusylazeffuo.exe Token: SeDebugPrivilege 868 help.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1236 Explorer.EXE 1236 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1236 Explorer.EXE 1236 Explorer.EXE -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 780 wrote to memory of 1784 780 7241c4a2af9e08ca229912f6c95c72fe.exe 28 PID 780 wrote to memory of 1784 780 7241c4a2af9e08ca229912f6c95c72fe.exe 28 PID 780 wrote to memory of 1784 780 7241c4a2af9e08ca229912f6c95c72fe.exe 28 PID 780 wrote to memory of 1784 780 7241c4a2af9e08ca229912f6c95c72fe.exe 28 PID 1784 wrote to memory of 2008 1784 fuwusylazeffuo.exe 29 PID 1784 wrote to memory of 2008 1784 fuwusylazeffuo.exe 29 PID 1784 wrote to memory of 2008 1784 fuwusylazeffuo.exe 29 PID 1784 wrote to memory of 2008 1784 fuwusylazeffuo.exe 29 PID 1784 wrote to memory of 2008 1784 fuwusylazeffuo.exe 29 PID 1784 wrote to memory of 1772 1784 fuwusylazeffuo.exe 30 PID 1784 wrote to memory of 1772 1784 fuwusylazeffuo.exe 30 PID 1784 wrote to memory of 1772 1784 fuwusylazeffuo.exe 30 PID 1784 wrote to memory of 1772 1784 fuwusylazeffuo.exe 30 PID 1236 wrote to memory of 868 1236 Explorer.EXE 31 PID 1236 wrote to memory of 868 1236 Explorer.EXE 31 PID 1236 wrote to memory of 868 1236 Explorer.EXE 31 PID 1236 wrote to memory of 868 1236 Explorer.EXE 31 PID 868 wrote to memory of 1808 868 help.exe 34 PID 868 wrote to memory of 1808 868 help.exe 34 PID 868 wrote to memory of 1808 868 help.exe 34 PID 868 wrote to memory of 1808 868 help.exe 34 PID 868 wrote to memory of 1808 868 help.exe 34
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\7241c4a2af9e08ca229912f6c95c72fe.exe"C:\Users\Admin\AppData\Local\Temp\7241c4a2af9e08ca229912f6c95c72fe.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Users\Admin\AppData\Local\Temp\fuwusylazeffuo.exe"C:\Users\Admin\AppData\Local\Temp\fuwusylazeffuo.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Users\Admin\AppData\Local\Temp\fuwusylazeffuo.exe"C:\Users\Admin\AppData\Local\Temp\fuwusylazeffuo.exe"4⤵
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1784 -s 2524⤵
- Loads dropped DLL
- Program crash
PID:1772
-
-
-
-
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1808
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD5ce262c598fed05331ed24e0d44fab549
SHA1855a97836d6c47e7a4f6e9d702ac75adec755ea9
SHA256ff821e285da8c69105815df6e9f2bd04ad88ebcc6b881f59e9592e5bd62e25c1
SHA5128cd7b56cce82c801263546421db71815e84d2cd7894124761c2ce1ec49be28fa47e6751896a3aef1b0e21f2c4fef5c88d230f0b7fb7b0b67abc49bc1a3a5440c
-
Filesize
56KB
MD5ce262c598fed05331ed24e0d44fab549
SHA1855a97836d6c47e7a4f6e9d702ac75adec755ea9
SHA256ff821e285da8c69105815df6e9f2bd04ad88ebcc6b881f59e9592e5bd62e25c1
SHA5128cd7b56cce82c801263546421db71815e84d2cd7894124761c2ce1ec49be28fa47e6751896a3aef1b0e21f2c4fef5c88d230f0b7fb7b0b67abc49bc1a3a5440c
-
Filesize
56KB
MD5ce262c598fed05331ed24e0d44fab549
SHA1855a97836d6c47e7a4f6e9d702ac75adec755ea9
SHA256ff821e285da8c69105815df6e9f2bd04ad88ebcc6b881f59e9592e5bd62e25c1
SHA5128cd7b56cce82c801263546421db71815e84d2cd7894124761c2ce1ec49be28fa47e6751896a3aef1b0e21f2c4fef5c88d230f0b7fb7b0b67abc49bc1a3a5440c
-
Filesize
172KB
MD5cb9dbd9ff987c69b17f57f621c313e52
SHA1db0b62eb1c07a346ac161c4e6b086255f0c4b213
SHA25658b23d9622d97157ddb9cf7c1f4b89f694a4647f22ff238cc6b4ccc32c4ad024
SHA512582d261962572be24972239f692bc65cd69b410dafbae550858a6d87986e978fafaf95a183449cdf82c9a64ce90a32db0a0267580259e00dc751c676c3776884
-
Filesize
6KB
MD562a9b361c89112dcb9e46476b5f12331
SHA18ea7603b6d6db984351684b08ff52ce28a50d3e3
SHA25666b19f4ba0ef9307c5da82840f3d85856cc852c96912ae4cb29944d30ea57538
SHA512a7fa474a4963111984e423138bae5652b0f8726eddcf2af1cbdae8ff6ea346904ca93879ae6a291b9928af6b29ca00a2a1523465890725f81c64d134c0970e5e
-
Filesize
56KB
MD5ce262c598fed05331ed24e0d44fab549
SHA1855a97836d6c47e7a4f6e9d702ac75adec755ea9
SHA256ff821e285da8c69105815df6e9f2bd04ad88ebcc6b881f59e9592e5bd62e25c1
SHA5128cd7b56cce82c801263546421db71815e84d2cd7894124761c2ce1ec49be28fa47e6751896a3aef1b0e21f2c4fef5c88d230f0b7fb7b0b67abc49bc1a3a5440c
-
Filesize
56KB
MD5ce262c598fed05331ed24e0d44fab549
SHA1855a97836d6c47e7a4f6e9d702ac75adec755ea9
SHA256ff821e285da8c69105815df6e9f2bd04ad88ebcc6b881f59e9592e5bd62e25c1
SHA5128cd7b56cce82c801263546421db71815e84d2cd7894124761c2ce1ec49be28fa47e6751896a3aef1b0e21f2c4fef5c88d230f0b7fb7b0b67abc49bc1a3a5440c
-
Filesize
56KB
MD5ce262c598fed05331ed24e0d44fab549
SHA1855a97836d6c47e7a4f6e9d702ac75adec755ea9
SHA256ff821e285da8c69105815df6e9f2bd04ad88ebcc6b881f59e9592e5bd62e25c1
SHA5128cd7b56cce82c801263546421db71815e84d2cd7894124761c2ce1ec49be28fa47e6751896a3aef1b0e21f2c4fef5c88d230f0b7fb7b0b67abc49bc1a3a5440c
-
Filesize
56KB
MD5ce262c598fed05331ed24e0d44fab549
SHA1855a97836d6c47e7a4f6e9d702ac75adec755ea9
SHA256ff821e285da8c69105815df6e9f2bd04ad88ebcc6b881f59e9592e5bd62e25c1
SHA5128cd7b56cce82c801263546421db71815e84d2cd7894124761c2ce1ec49be28fa47e6751896a3aef1b0e21f2c4fef5c88d230f0b7fb7b0b67abc49bc1a3a5440c
-
Filesize
56KB
MD5ce262c598fed05331ed24e0d44fab549
SHA1855a97836d6c47e7a4f6e9d702ac75adec755ea9
SHA256ff821e285da8c69105815df6e9f2bd04ad88ebcc6b881f59e9592e5bd62e25c1
SHA5128cd7b56cce82c801263546421db71815e84d2cd7894124761c2ce1ec49be28fa47e6751896a3aef1b0e21f2c4fef5c88d230f0b7fb7b0b67abc49bc1a3a5440c
-
Filesize
56KB
MD5ce262c598fed05331ed24e0d44fab549
SHA1855a97836d6c47e7a4f6e9d702ac75adec755ea9
SHA256ff821e285da8c69105815df6e9f2bd04ad88ebcc6b881f59e9592e5bd62e25c1
SHA5128cd7b56cce82c801263546421db71815e84d2cd7894124761c2ce1ec49be28fa47e6751896a3aef1b0e21f2c4fef5c88d230f0b7fb7b0b67abc49bc1a3a5440c
-
Filesize
56KB
MD5ce262c598fed05331ed24e0d44fab549
SHA1855a97836d6c47e7a4f6e9d702ac75adec755ea9
SHA256ff821e285da8c69105815df6e9f2bd04ad88ebcc6b881f59e9592e5bd62e25c1
SHA5128cd7b56cce82c801263546421db71815e84d2cd7894124761c2ce1ec49be28fa47e6751896a3aef1b0e21f2c4fef5c88d230f0b7fb7b0b67abc49bc1a3a5440c
-
Filesize
56KB
MD5ce262c598fed05331ed24e0d44fab549
SHA1855a97836d6c47e7a4f6e9d702ac75adec755ea9
SHA256ff821e285da8c69105815df6e9f2bd04ad88ebcc6b881f59e9592e5bd62e25c1
SHA5128cd7b56cce82c801263546421db71815e84d2cd7894124761c2ce1ec49be28fa47e6751896a3aef1b0e21f2c4fef5c88d230f0b7fb7b0b67abc49bc1a3a5440c
-
Filesize
56KB
MD5ce262c598fed05331ed24e0d44fab549
SHA1855a97836d6c47e7a4f6e9d702ac75adec755ea9
SHA256ff821e285da8c69105815df6e9f2bd04ad88ebcc6b881f59e9592e5bd62e25c1
SHA5128cd7b56cce82c801263546421db71815e84d2cd7894124761c2ce1ec49be28fa47e6751896a3aef1b0e21f2c4fef5c88d230f0b7fb7b0b67abc49bc1a3a5440c
-
Filesize
56KB
MD5ce262c598fed05331ed24e0d44fab549
SHA1855a97836d6c47e7a4f6e9d702ac75adec755ea9
SHA256ff821e285da8c69105815df6e9f2bd04ad88ebcc6b881f59e9592e5bd62e25c1
SHA5128cd7b56cce82c801263546421db71815e84d2cd7894124761c2ce1ec49be28fa47e6751896a3aef1b0e21f2c4fef5c88d230f0b7fb7b0b67abc49bc1a3a5440c