Analysis
-
max time kernel
155s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2022 12:48
Static task
static1
General
-
Target
2022FHS0927.exe
-
Size
288KB
-
MD5
3d474b52e155bf6899882733f23c07c7
-
SHA1
faa8e7dafbd29de8562658e2b97fbafb481e2c6e
-
SHA256
6725025d1d3161a6fc010098879ef9cda0dd40a08f59283affd2deb2d5ef7b4b
-
SHA512
ebe25a70c00d71eaeea5193e015d4f60340ff46b4e59da799e2b4448411fa714ed7caf1fc9deeea3ffdd0a76a78fa7d1ecd472f8d4538cf4c5764b341d18064b
-
SSDEEP
6144:cNvlCluYxaCm8Gq3W2m4iFndd0j0LMp/3kSB:NaujmNFndKj0Lck
Malware Config
Extracted
formbook
i65a
r00zzvD9uoqMkFT8XDSqPg==
iSMQDJ3Tyuj8KXflBw==
Gq+tYoFrGU/5B4gGNnzHNg==
wEwcynSwpynZKUFhqyIK
bw3PbrjowhAVJA==
TggEt9LuwhAVJA==
r0UqC6sxgcWN7vc=
0m+fwBgf0oyehByUtx51BsBkuj8=
dhtdWWyIhRatp2dpv8tPcJoQ
jTAw4/4TCwcXjpECXDSqPg==
aglx4nPPkGp/raeivGVOfzdbFIu4
+qXr4cAGtQJm7Mf6
sU2Dc4ySSKZJc2/L32pFRrq+NgA0Yi8=
E6ohOo2zadVgzLIfaWALaik=
wXwu0yo/KbNm7Mf6
EcoyojCJYKg1laCuBK+exkNbFIu4
bhZgFvj6yP+R4F+0/5S/oFMpAA==
rzlylCB1NIMabG2dzGQd
+5ngCKjwwhAVJA==
AMUtZrYh+0LPL/QyfSo=
hzqw1O4JApAae41vjXUOeC8=
C7guqfg0PD5dvVf4DQ==
BsM1AaksgMWN7vc=
5pcGLkVbBUPPL/QyfSo=
TvMO/UKDdcWN7vc=
fCNJYrrKfTprvVf4DQ==
5rfNvNbPhEFrvVf4DQ==
9717JcIR+w4iNgKcr91It5f448HcIA==
Wfo2UPQmr3SeAgqCx+ihjjsY
Svg8XfRAHZ5DvXj4EA==
TuXg5TNpdh6yCOmt0pkeNaKCuzc=
fjn46QYnKM4w0+g=
WRV/AkxH/M7NzFzkCw91Zpz048HcIA==
Bo6ILlHigRGpGJRgtPd6WQFsGA==
ZCdTYvhSBMTjO0mpy+ihjjsY
Vg104XmxSn8DTRA2YCA=
fBmNxO/pwkHXAKalv3UOeC8=
2YL6LEtrcsyquo2wz3ahjjsY
iC2cyuTQsS3KHymco5LiuXXRdYc9KA==
JvGrI2XdqxWjoPQyfSo=
NMuVRIiBW1Nhjn9zgw3PwEJbFIu4
7KsjVqn0meiO7MVyjXUOeC8=
XvgsVPgmHCtBPPXC7IhcycBkuj8=
HsE0cZF7K+0KXVC4yexV8KqiJAA0Yi8=
ZA9olK7JxkTg6q7/TenoBXFnljPD7XGx
PvN6Nk9THuEFRZYCFA==
cx/LcM3luPqVmxJ+jhMI
smWwq8nUo09jvVf4DQ==
aBnnX3Z7RIQqQsRdhz0=
8o1CKXiwmgZm7Mf6
s2NR7g0vRFBRp3VhqyIK
DLYGcptChcWN7vc=
0GEVmuU0F1jkMfQyfSo=
s1Kiy26yq6+H9spyinUOeC8=
CZxV2PHhkdRu/ewuGg==
y8Xu3/EguTvj
ulTCKLYf9ULaNPQyfSo=
1Yl0JHHbnlR3eAp4uepO8u5YFRkKjVNu8Q==
V+zu64nHc059gzjoEtXhkxEB
dQkau9PuwhAVJA==
NMYypu3zqoGsllajzOShjjsY
Wxkhx+n/zcWN7vc=
74dZAaju4XcRfFR3kzM=
u3R6gBVPPDpcvVf4DQ==
partnermdg.com
Signatures
-
Suspicious use of SetThreadContext 3 IoCs
Processes:
2022FHS0927.execvtres.exeipconfig.exedescription pid process target process PID 4384 set thread context of 4872 4384 2022FHS0927.exe cvtres.exe PID 4872 set thread context of 2740 4872 cvtres.exe Explorer.EXE PID 4844 set thread context of 2740 4844 ipconfig.exe Explorer.EXE -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid process 4844 ipconfig.exe -
Processes:
ipconfig.exedescription ioc process Key created \Registry\User\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 50 IoCs
Processes:
2022FHS0927.execvtres.exeipconfig.exepid process 4384 2022FHS0927.exe 4384 2022FHS0927.exe 4384 2022FHS0927.exe 4384 2022FHS0927.exe 4872 cvtres.exe 4872 cvtres.exe 4872 cvtres.exe 4872 cvtres.exe 4872 cvtres.exe 4872 cvtres.exe 4872 cvtres.exe 4872 cvtres.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 2740 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
Processes:
cvtres.exeipconfig.exepid process 4872 cvtres.exe 4872 cvtres.exe 4872 cvtres.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe 4844 ipconfig.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
2022FHS0927.execvtres.exeipconfig.exedescription pid process Token: SeDebugPrivilege 4384 2022FHS0927.exe Token: SeDebugPrivilege 4872 cvtres.exe Token: SeDebugPrivilege 4844 ipconfig.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
2022FHS0927.exeExplorer.EXEipconfig.exedescription pid process target process PID 4384 wrote to memory of 1580 4384 2022FHS0927.exe cvtres.exe PID 4384 wrote to memory of 1580 4384 2022FHS0927.exe cvtres.exe PID 4384 wrote to memory of 1580 4384 2022FHS0927.exe cvtres.exe PID 4384 wrote to memory of 4212 4384 2022FHS0927.exe cvtres.exe PID 4384 wrote to memory of 4212 4384 2022FHS0927.exe cvtres.exe PID 4384 wrote to memory of 4212 4384 2022FHS0927.exe cvtres.exe PID 4384 wrote to memory of 4872 4384 2022FHS0927.exe cvtres.exe PID 4384 wrote to memory of 4872 4384 2022FHS0927.exe cvtres.exe PID 4384 wrote to memory of 4872 4384 2022FHS0927.exe cvtres.exe PID 4384 wrote to memory of 4872 4384 2022FHS0927.exe cvtres.exe PID 4384 wrote to memory of 4872 4384 2022FHS0927.exe cvtres.exe PID 4384 wrote to memory of 4872 4384 2022FHS0927.exe cvtres.exe PID 2740 wrote to memory of 4844 2740 Explorer.EXE ipconfig.exe PID 2740 wrote to memory of 4844 2740 Explorer.EXE ipconfig.exe PID 2740 wrote to memory of 4844 2740 Explorer.EXE ipconfig.exe PID 4844 wrote to memory of 3824 4844 ipconfig.exe Firefox.exe PID 4844 wrote to memory of 3824 4844 ipconfig.exe Firefox.exe PID 4844 wrote to memory of 3824 4844 ipconfig.exe Firefox.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\2022FHS0927.exe"C:\Users\Admin\AppData\Local\Temp\2022FHS0927.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\SysWOW64\ipconfig.exe"2⤵
- Suspicious use of SetThreadContext
- Gathers network information
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1580-133-0x0000000000000000-mapping.dmp
-
memory/2740-151-0x0000000008670000-0x0000000008783000-memory.dmpFilesize
1.1MB
-
memory/2740-149-0x0000000008670000-0x0000000008783000-memory.dmpFilesize
1.1MB
-
memory/2740-143-0x0000000003660000-0x00000000037B3000-memory.dmpFilesize
1.3MB
-
memory/4212-134-0x0000000000000000-mapping.dmp
-
memory/4384-132-0x0000000000870000-0x00000000008B8000-memory.dmpFilesize
288KB
-
memory/4844-145-0x0000000000C00000-0x0000000000C0B000-memory.dmpFilesize
44KB
-
memory/4844-150-0x00000000005A0000-0x00000000005CD000-memory.dmpFilesize
180KB
-
memory/4844-148-0x0000000000D10000-0x0000000000D9F000-memory.dmpFilesize
572KB
-
memory/4844-147-0x0000000001070000-0x00000000013BA000-memory.dmpFilesize
3.3MB
-
memory/4844-146-0x00000000005A0000-0x00000000005CD000-memory.dmpFilesize
180KB
-
memory/4844-144-0x0000000000000000-mapping.dmp
-
memory/4872-136-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/4872-142-0x0000000000DF0000-0x0000000000E00000-memory.dmpFilesize
64KB
-
memory/4872-141-0x0000000001370000-0x00000000016BA000-memory.dmpFilesize
3.3MB
-
memory/4872-140-0x0000000000401000-0x000000000042F000-memory.dmpFilesize
184KB
-
memory/4872-139-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/4872-138-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/4872-135-0x0000000000000000-mapping.dmp