Analysis
-
max time kernel
90s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2022 09:14
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.PWSX-gen.15814.13814.exe
Resource
win7-20220901-en
General
-
Target
SecuriteInfo.com.Win32.PWSX-gen.15814.13814.exe
-
Size
1.2MB
-
MD5
6aa5f75d805cdd7f85f0d2557baad857
-
SHA1
6624b51ae972cbe99903c897c9664c72369782f3
-
SHA256
fe084e5fcd96061325aafd4528aedf59f3385a5c1bbf9daf3337ba1cabf4488f
-
SHA512
0862f8dcfd782f0ecf30b57c12c00b19b20a5f31665a9bfeaf1263048030e91fdb9fd01af8ef76c35f3121785724ff1151692636d3eb7fbacc22665d2aa116c8
-
SSDEEP
12288:FftjvJ4/XAISq1kmsoPIPDzRJp5urond09qRdQEQR150nZsLVvhoQtckql6AK4HQ:FSK5JoPIF5DndcSdVa15JRyQt
Malware Config
Extracted
formbook
fofg
FHyydxpFBs0S8b4ZlP7ZEtd/
EVaCEKb/cVV9xQ==
U9I5lke0IuU7vj5EXus=
rXD3AKPV3qUblOUsV41KMfU=
PwBSy5z56XNzIvnS3ygsKv0=
CQe1BLbSnGXX
HuhKjxhLhxqBy2FFz8WoFA==
QJymezEoLOFZ1T5EXus=
V8r5PAdwuGK2AUARohas
b1XV06ANH9s5uj5EXus=
3EiEhwo7Euw2tl8=
c2PjK8Izkydy5N8x
CXCkYf0m/qPrv8QajKyT6Oo=
pHjy+Mk0CqvWBXdCz8WoFA==
QjSwr3/j5rAyvz5EXus=
+edxANg/sU+k8YFQz8WoFA==
tWiQq3rqyl6cTAG9pA==
GeAyMQxBUOlDwD5EXus=
nQ5eoT2mEKkhDN2DwBek
JP5dIbHlrXXR8umDwBek
BMT8B9n1OyBvqL+WUSgsKv0=
RSeJYDyteizAdQbSCyHeYCCMZL1A
NOgCENlCLthl5TV9YsWpTzHAdjCmUw==
s2npDaPJBhAdm10=
TXr1YfxiKOkqcgfcHV092XmTHA==
aTXN1nHe/gVFvD5EXus=
TS+nK+9V4pW+9cko
GuBk6sExhxNLr7wYhPbZEtd/
oHWjdWHDv228J/jg0q6xYvzLcxRiMhI=
z6pB06UWdBZHuj5EXus=
nZ7gYT4zv3fY
gXHxw16/sjbOAABSuAnZEtd/
m2asNcPsiDe3I27NxByg2XmTHA==
leg4fQ1h3ZG+9cko
AmB4B64SvFJ6t1G2z8WoFA==
7agWYtMw0Wu2yptkrA==
yzl7iRI/QhdFiRV+eQXh2qsEinZosxo=
gcntJ8YrjSVy5N8x
hmi6U/JgAY/CyptkrA==
/2edLM81848QdjaiqyLu051h
57A/tEumUOZ3Nc6c3Q/aQx8Hiq38AvyPxw==
qI77ulvxShNayD5EXus=
IPA6VOUd6xAdm10=
6LAL4bkhuGHG5+WDwBek
06pAU/Af78kc13PYvx2l2XmTHA==
LhRuu47pEuACWUo=
98ue7uq/cVV9xQ==
Vxxkh13O3ZwXwlcqp5L/6OM=
XhYUTkQR6hAdm10=
RQE/ijRllTFI8umlUSgsKv0=
+2bIH8U2olR6PVYuAlnzaCaMZL1A
BMQ9MRDgCcoYGZlxF2gFHXp1
fmrbKPeT/LD1azf/CIEZLeKVCw==
ajSLMtRD25W+9cko
8LTyD9cHcVV9xQ==
mFi1hCWOhw5Huj5EXus=
FXSUHb8h45vFyptkrA==
lWmcMf1mwF2BLzwh/FncUzfPgHZosxo=
guwbCaTRfBKGAXWKUHUf+e90detZ
QhxpJrXlmzdKeRDrnCjfixcSwulI
Thag+Y/veDtRAOqDwBek
Z0Wp7pLMCBAdm10=
bT9HyWnOXhWYztVF4moy2XmTHA==
kXbZHKvU/Iq+9cko
richardcrebeck.com
Signatures
-
Xloader payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1568-145-0x0000000000400000-0x000000000042C000-memory.dmp xloader -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
SecuriteInfo.com.Win32.PWSX-gen.15814.13814.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation SecuriteInfo.com.Win32.PWSX-gen.15814.13814.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
SecuriteInfo.com.Win32.PWSX-gen.15814.13814.exedescription pid process target process PID 1760 set thread context of 1568 1760 SecuriteInfo.com.Win32.PWSX-gen.15814.13814.exe SecuriteInfo.com.Win32.PWSX-gen.15814.13814.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
SecuriteInfo.com.Win32.PWSX-gen.15814.13814.exepowershell.exeSecuriteInfo.com.Win32.PWSX-gen.15814.13814.exepid process 1760 SecuriteInfo.com.Win32.PWSX-gen.15814.13814.exe 1760 SecuriteInfo.com.Win32.PWSX-gen.15814.13814.exe 1760 SecuriteInfo.com.Win32.PWSX-gen.15814.13814.exe 1760 SecuriteInfo.com.Win32.PWSX-gen.15814.13814.exe 1760 SecuriteInfo.com.Win32.PWSX-gen.15814.13814.exe 1760 SecuriteInfo.com.Win32.PWSX-gen.15814.13814.exe 1760 SecuriteInfo.com.Win32.PWSX-gen.15814.13814.exe 1760 SecuriteInfo.com.Win32.PWSX-gen.15814.13814.exe 1760 SecuriteInfo.com.Win32.PWSX-gen.15814.13814.exe 396 powershell.exe 1568 SecuriteInfo.com.Win32.PWSX-gen.15814.13814.exe 1568 SecuriteInfo.com.Win32.PWSX-gen.15814.13814.exe 396 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
SecuriteInfo.com.Win32.PWSX-gen.15814.13814.exepowershell.exedescription pid process Token: SeDebugPrivilege 1760 SecuriteInfo.com.Win32.PWSX-gen.15814.13814.exe Token: SeDebugPrivilege 396 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
SecuriteInfo.com.Win32.PWSX-gen.15814.13814.exepid process 1760 SecuriteInfo.com.Win32.PWSX-gen.15814.13814.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
SecuriteInfo.com.Win32.PWSX-gen.15814.13814.exepid process 1760 SecuriteInfo.com.Win32.PWSX-gen.15814.13814.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
SecuriteInfo.com.Win32.PWSX-gen.15814.13814.exedescription pid process target process PID 1760 wrote to memory of 396 1760 SecuriteInfo.com.Win32.PWSX-gen.15814.13814.exe powershell.exe PID 1760 wrote to memory of 396 1760 SecuriteInfo.com.Win32.PWSX-gen.15814.13814.exe powershell.exe PID 1760 wrote to memory of 396 1760 SecuriteInfo.com.Win32.PWSX-gen.15814.13814.exe powershell.exe PID 1760 wrote to memory of 4032 1760 SecuriteInfo.com.Win32.PWSX-gen.15814.13814.exe schtasks.exe PID 1760 wrote to memory of 4032 1760 SecuriteInfo.com.Win32.PWSX-gen.15814.13814.exe schtasks.exe PID 1760 wrote to memory of 4032 1760 SecuriteInfo.com.Win32.PWSX-gen.15814.13814.exe schtasks.exe PID 1760 wrote to memory of 1632 1760 SecuriteInfo.com.Win32.PWSX-gen.15814.13814.exe SecuriteInfo.com.Win32.PWSX-gen.15814.13814.exe PID 1760 wrote to memory of 1632 1760 SecuriteInfo.com.Win32.PWSX-gen.15814.13814.exe SecuriteInfo.com.Win32.PWSX-gen.15814.13814.exe PID 1760 wrote to memory of 1632 1760 SecuriteInfo.com.Win32.PWSX-gen.15814.13814.exe SecuriteInfo.com.Win32.PWSX-gen.15814.13814.exe PID 1760 wrote to memory of 1568 1760 SecuriteInfo.com.Win32.PWSX-gen.15814.13814.exe SecuriteInfo.com.Win32.PWSX-gen.15814.13814.exe PID 1760 wrote to memory of 1568 1760 SecuriteInfo.com.Win32.PWSX-gen.15814.13814.exe SecuriteInfo.com.Win32.PWSX-gen.15814.13814.exe PID 1760 wrote to memory of 1568 1760 SecuriteInfo.com.Win32.PWSX-gen.15814.13814.exe SecuriteInfo.com.Win32.PWSX-gen.15814.13814.exe PID 1760 wrote to memory of 1568 1760 SecuriteInfo.com.Win32.PWSX-gen.15814.13814.exe SecuriteInfo.com.Win32.PWSX-gen.15814.13814.exe PID 1760 wrote to memory of 1568 1760 SecuriteInfo.com.Win32.PWSX-gen.15814.13814.exe SecuriteInfo.com.Win32.PWSX-gen.15814.13814.exe PID 1760 wrote to memory of 1568 1760 SecuriteInfo.com.Win32.PWSX-gen.15814.13814.exe SecuriteInfo.com.Win32.PWSX-gen.15814.13814.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.15814.13814.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.15814.13814.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\QaGACHm.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QaGACHm" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8E07.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.15814.13814.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.15814.13814.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.15814.13814.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.15814.13814.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp8E07.tmpFilesize
1KB
MD5b41852c11294cb46155b728d144d4a96
SHA169bfc56897548de4d8ccbf10e7ac4d2d6030fd09
SHA256b8e81b3d1f0f5dccb655bc9337b1f9d7ed8e2a5849c035055101df01c4e41833
SHA512f0683ac022b4cd5d6dc3f474ff914de4abda267e2477b8b418a78d7d0025a87553a74a22529858d57becc6ba56eb3ce08d63b3cfdf518ac32b206f63d25cc792
-
memory/396-153-0x0000000007BE0000-0x000000000825A000-memory.dmpFilesize
6.5MB
-
memory/396-159-0x00000000078C0000-0x00000000078C8000-memory.dmpFilesize
32KB
-
memory/396-146-0x00000000054C0000-0x00000000054E2000-memory.dmpFilesize
136KB
-
memory/396-158-0x00000000078E0000-0x00000000078FA000-memory.dmpFilesize
104KB
-
memory/396-157-0x00000000077D0000-0x00000000077DE000-memory.dmpFilesize
56KB
-
memory/396-138-0x0000000000000000-mapping.dmp
-
memory/396-156-0x0000000007820000-0x00000000078B6000-memory.dmpFilesize
600KB
-
memory/396-140-0x0000000002950000-0x0000000002986000-memory.dmpFilesize
216KB
-
memory/396-155-0x0000000007610000-0x000000000761A000-memory.dmpFilesize
40KB
-
memory/396-142-0x0000000005510000-0x0000000005B38000-memory.dmpFilesize
6.2MB
-
memory/396-147-0x0000000005BB0000-0x0000000005C16000-memory.dmpFilesize
408KB
-
memory/396-152-0x0000000006840000-0x000000000685E000-memory.dmpFilesize
120KB
-
memory/396-151-0x0000000071880000-0x00000000718CC000-memory.dmpFilesize
304KB
-
memory/396-150-0x0000000007260000-0x0000000007292000-memory.dmpFilesize
200KB
-
memory/396-154-0x00000000075A0000-0x00000000075BA000-memory.dmpFilesize
104KB
-
memory/396-149-0x00000000062A0000-0x00000000062BE000-memory.dmpFilesize
120KB
-
memory/1568-148-0x00000000011E0000-0x000000000152A000-memory.dmpFilesize
3.3MB
-
memory/1568-144-0x0000000000000000-mapping.dmp
-
memory/1568-145-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/1632-143-0x0000000000000000-mapping.dmp
-
memory/1760-134-0x00000000051C0000-0x0000000005252000-memory.dmpFilesize
584KB
-
memory/1760-135-0x00000000051A0000-0x00000000051AA000-memory.dmpFilesize
40KB
-
memory/1760-132-0x00000000006C0000-0x0000000000802000-memory.dmpFilesize
1.3MB
-
memory/1760-133-0x00000000056D0000-0x0000000005C74000-memory.dmpFilesize
5.6MB
-
memory/1760-137-0x0000000009120000-0x0000000009186000-memory.dmpFilesize
408KB
-
memory/1760-136-0x0000000008E80000-0x0000000008F1C000-memory.dmpFilesize
624KB
-
memory/4032-139-0x0000000000000000-mapping.dmp