Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06-10-2022 20:27
Static task
static1
Behavioral task
behavioral1
Sample
Ref8810998235 Auto System Generated Order Form 051022.exe
Resource
win7-20220812-en
General
-
Target
Ref8810998235 Auto System Generated Order Form 051022.exe
-
Size
920KB
-
MD5
7bf0c2ef33695a76ec7cf8b489cef20d
-
SHA1
0aaced5986e6dd808ce1128233407d6db7331206
-
SHA256
832ba5363bd145bbcc01871bf79726fe7d4cfe90d9f93d9cca64598887c91d38
-
SHA512
31fa2a2a84ea1474b0f1182d1f6ca8b687c29a5246bb58941c86604065e8ed8bb7e49ef41ab84b5f41078fe82f384eb87ead21ee527c0091dd06b79f1ad64cce
-
SSDEEP
12288:oPCJRz6sid7VycOInfQcbD5+6eAPxB4PWbRdxk4ve:qk6/d7VycpnbI6eWxB68de4ve
Malware Config
Extracted
formbook
r83r
dF1arqf0q8jqGHpo
3s5obdLT/D42OkXYzXA=
MY4GqPg1TNBZiXEkrsyhlycGUN24oOaU
wKsmWEGSmhvRwo4=
jXeqRbgNrXzVBjEkt+Ircn8q8uqLRxB04g==
kWzwCGp3hZyQemHg2Ho=
vlaarHzH3YTtXSLeyQ==
LSNL62SxS36qDZBx
QzB7kGyuEkIf
AFmNF5DlgUzZjArFIxovHKlaz9E74po=
C/cWvSksOW1y2Gdi
5FdJf9GEwRvRwo4=
szFiiGFq8ubjqCPe/ChZC0g=
AWObGX3KVG9bBtWG4Mu5
80uIK32XLmNVA4xryvpajNA0
10WHLY+Nqu3Pkw/cKRD3Y6pVG8jd
kW/9OTF2FgXkki8UJM8K1vSogA0XnQ==
mAtF/lLM2RvRwo4=
VNFX6OUCoH1rU0XYzXA=
qAdGBejjez+ZCfPo0A==
yTR2+GKnGsAJQ1FKSid6ocYt
JyBe6lqrOf1t5Cn4xS5Y3cB2Mw==
syE7MRBZYJSHoqItMsis
/WeHjltQ+jUs3nR28RZR3cB2Mw==
Fe7zgspEodA/gg==
shdWfUhT/Ar8rlM4BiMlNQ==
ta0kJZidw0f345c=
uCWQHPUF/j0zHwK123Y=
XcENsP/+NnZUQkXYzXA=
2UrZd9kTJbAoKtaYjO9xnkw=
PbE5xsPhZ009BYhHn5KngqUJsGINig==
TLQwww9Sge1JcGA4EK73J5PEayo=
QrflC+Lz7CAR/bacnkdpcCUQVN64oOaU
kY7GaLLD8HXXCgvZlojjIg==
8lagWtvn5l7UXSLeyQ==
Qqon50dcodA/gg==
7NQKC+03QHRWQEXYzXA=
qQNU8kJQodA/gg==
AVmNPaGttjem1+a+uzJa3cB2Mw==
f+lR7c7ihnk9o8pF3cq7
UcJSAGm24mULzreoju9xnkw=
TDtu5jN5B8pAiqJk+iZajNA0
rqkrVd/SfFQyCJlF3cq7
wzKmM4vWbi6SAks4x/pajNA0
pAWQEPb0imHXXSLeyQ==
2MDsmgcWGIvx8p1xz8HmlJPEayo=
w7Pfeek1cQRgUPu9u2aVkHFZP7/57pI=
hfdtMLMEIIziEhvilojjIg==
H3OtS88kV8o5jbaAWQZe3cB2Mw==
6N0VtR91JvRsuKQtMsis
s7Hfb8TR31DTLY5F3cq7
mIOpRcUbkz7qGHpo
FgllXfJJw4DzYbi+iOd1N4FmqiI=
qhtb2+X+imZGDpNy1P4tlcUnKNq4oOaU
7NUQxzg7a7qz8Ukk3g==
C/EjxD2VO3JfB9WG4Mu5
uiNMY1JQ2p4JZdDKMSlajNA0
kAVCQSRxcZldCKeKjO9xnkw=
RyOeuzx/YiCXnohsPqyp3cB2Mw==
Q7gooXZ6LvJvM0Q3G5az
gOQYSDEqXsYcTHQtMsis
gfYpIfpLQMIfEPTT1nVlZt59GpLE
FX/6mJ+5Szoq65qV1PZajNA0
GgFyk4HS2Uf35ZM=
yankeebuilder.com
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation Ref8810998235 Auto System Generated Order Form 051022.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1616 set thread context of 404 1616 Ref8810998235 Auto System Generated Order Form 051022.exe 89 PID 404 set thread context of 2984 404 Ref8810998235 Auto System Generated Order Form 051022.exe 38 PID 1636 set thread context of 2984 1636 cmmon32.exe 38 -
description ioc Process Key created \Registry\User\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 cmmon32.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 404 Ref8810998235 Auto System Generated Order Form 051022.exe 404 Ref8810998235 Auto System Generated Order Form 051022.exe 404 Ref8810998235 Auto System Generated Order Form 051022.exe 404 Ref8810998235 Auto System Generated Order Form 051022.exe 404 Ref8810998235 Auto System Generated Order Form 051022.exe 404 Ref8810998235 Auto System Generated Order Form 051022.exe 404 Ref8810998235 Auto System Generated Order Form 051022.exe 404 Ref8810998235 Auto System Generated Order Form 051022.exe 1636 cmmon32.exe 1636 cmmon32.exe 1636 cmmon32.exe 1636 cmmon32.exe 1636 cmmon32.exe 1636 cmmon32.exe 1636 cmmon32.exe 1636 cmmon32.exe 1636 cmmon32.exe 1636 cmmon32.exe 1636 cmmon32.exe 1636 cmmon32.exe 1636 cmmon32.exe 1636 cmmon32.exe 1636 cmmon32.exe 1636 cmmon32.exe 1636 cmmon32.exe 1636 cmmon32.exe 1636 cmmon32.exe 1636 cmmon32.exe 1636 cmmon32.exe 1636 cmmon32.exe 1636 cmmon32.exe 1636 cmmon32.exe 1636 cmmon32.exe 1636 cmmon32.exe 1636 cmmon32.exe 1636 cmmon32.exe 1636 cmmon32.exe 1636 cmmon32.exe 1636 cmmon32.exe 1636 cmmon32.exe 1636 cmmon32.exe 1636 cmmon32.exe 1636 cmmon32.exe 1636 cmmon32.exe 1636 cmmon32.exe 1636 cmmon32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2984 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 404 Ref8810998235 Auto System Generated Order Form 051022.exe 404 Ref8810998235 Auto System Generated Order Form 051022.exe 404 Ref8810998235 Auto System Generated Order Form 051022.exe 1636 cmmon32.exe 1636 cmmon32.exe 1636 cmmon32.exe 1636 cmmon32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 404 Ref8810998235 Auto System Generated Order Form 051022.exe Token: SeDebugPrivilege 1636 cmmon32.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1616 wrote to memory of 404 1616 Ref8810998235 Auto System Generated Order Form 051022.exe 89 PID 1616 wrote to memory of 404 1616 Ref8810998235 Auto System Generated Order Form 051022.exe 89 PID 1616 wrote to memory of 404 1616 Ref8810998235 Auto System Generated Order Form 051022.exe 89 PID 1616 wrote to memory of 404 1616 Ref8810998235 Auto System Generated Order Form 051022.exe 89 PID 1616 wrote to memory of 404 1616 Ref8810998235 Auto System Generated Order Form 051022.exe 89 PID 1616 wrote to memory of 404 1616 Ref8810998235 Auto System Generated Order Form 051022.exe 89 PID 2984 wrote to memory of 1636 2984 Explorer.EXE 90 PID 2984 wrote to memory of 1636 2984 Explorer.EXE 90 PID 2984 wrote to memory of 1636 2984 Explorer.EXE 90 PID 1636 wrote to memory of 1916 1636 cmmon32.exe 91 PID 1636 wrote to memory of 1916 1636 cmmon32.exe 91 PID 1636 wrote to memory of 1916 1636 cmmon32.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\Ref8810998235 Auto System Generated Order Form 051022.exe"C:\Users\Admin\AppData\Local\Temp\Ref8810998235 Auto System Generated Order Form 051022.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\Ref8810998235 Auto System Generated Order Form 051022.exe"C:\Users\Admin\AppData\Local\Temp\Ref8810998235 Auto System Generated Order Form 051022.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:404
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1916
-
-