Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
10-10-2022 10:37
Static task
static1
Behavioral task
behavioral1
Sample
RFQ PBMS 401055-STR-22.pdf.exe
Resource
win7-20220812-en
General
-
Target
RFQ PBMS 401055-STR-22.pdf.exe
-
Size
1.0MB
-
MD5
bbbffc29c40c5e0e4aba9fd4e2a677f9
-
SHA1
a9ab9ba1a90d144a6ba982003d2116a5b7dd42da
-
SHA256
93e11bd9c359b03f6d2a3add3d1a109275eaadc5b9875b395f9d87e302db93dd
-
SHA512
4381510e00a00b55e41e85cbfc4f67520570d43e1e76918679fba06812dcceebd8002e5f84b963a010c2f5f1c59f123f15b6ff6615ba174299166197845e228e
-
SSDEEP
12288:FSmZqMm9II2iNPv9sXAwe7CrtPVGVh9dpcjSJnu5lzAKp:ZTI1LWAt7YVkdTJn2lDp
Malware Config
Extracted
nworm
v0.3.8
svetanakravenova247.ddns.net:3498
37f24ea7
Extracted
formbook
mmtr
A2DZqKcj5ytLVZtHJA==
fMXPWQG+JWa0S6lZOg==
8kymMDxB6ShVJHxu2gshFtXY9Rw=
1TcOF6WxcdzplqFGcUCNkBY=
k3TLhZ+bOG7ahplcPA==
K4kL5Aq5abHNS6lZOg==
mXDSo9XmxlqYN6psOA==
m+RNCVT4shAb
G1kzROn+2jCug7F5psQ=
qNYsJkWzqwkZ
0BcDQuH0xt4oBh4=
pfRW4ZhmRsEiyvP2Mg==
Sqgj4eztyCg0Ezwo39iHXQ==
bIi2etJbcdUB
k2g3gBesND9hUoKOzGaVFKX6IuUaknqH1Q==
8dFDXQPnb4s+sWfhwoqOdgmABBK+YGg=
Pn9PmDzelx84EjfdzY0WkiRPz6i4
SrUfvOfNO3DMdLvB
GFXHQ9NuPdHsxOiU2umGMSiTvQE=
Kv9sdrhSbDfMdLvB
0BP6SMdfZe0=
Fl9YrjrsY3yPcZsGJL5KQg==
OBVr6FSzqwkZ
UJeO5oYq0kJjHBfB50vi3aAnkQ==
ImHJSjymU8oQ
4jEWBDVCEW+ZlcN0KN3v
eMoitt7JSH2HaKx0KN3v
C2vSbJSqetPuq7F0KN3v
gWcoOtbjvU68b6bD
XL2ZjKRp8z1lF2T+0sw=
6y35AIdp+O+H1wobLQ==
Q9ZKFkouoNP1we60LMDl
9ltHTW0GzWapec1LJNjxSlOm7a+w
l7d4+LOXM3782go=
URUNnUgWrMfKjYddTQgPDdXY9Rw=
VJmoBI1S5f8cz1gnIw==
wKv5b/utK22seZUGJL5KQg==
xAfW2nN9X1V3cbhmCTk7RQ==
EVvqxNyaHXjBV77HDdM=
Dl2X3ndBIm2yM6ZRa8NLQA==
f9Z59IKzkA8O
E2NpxIazkA8O
xyMcaBMp1xQrLW0hWjKbDc5N
OY4M4fO7lOAEAjX3Kkp67LUjRwcsknqH1Q==
OYtqhgPf7DtlGh4=
ermg8HUcmuT5psNphdl+eAs=
Im/HTEZA4g4RqykeWFfm
7T23dIBqJX/MdLvB
6dFHFhDOte5NDB0=
I3Ngq11D/Ov61AA=
SqP4dW1lC+5NDB0=
yJ+qP/TCnAwW8kY3RQmpW3qmmQ==
UbWlxHCQV8/y2w8RauxeQgE=
0KOF1JwhrdAR
BF/jpcXPi7UVEGAUL69WSg==
HHdwwksTqcvm1A/AqGf60qXcIGoVYBRm3Q==
i1nDz1teN88V8R/kwkCNkBY=
rPVY6PjqshMt7RLKwW+I3rbvOg8uknqH1Q==
/2TrwPD7kcrxueftLvIXcCVx/b+/7Rfx
+U7WpMmsOY69prx8XAKfW3qmmQ==
aWcsXqQ9SrvAS6lZOg==
/OHzgirgSoOzpePqTiyAfg8=
2CoQYwO+LZjJteblFLOeOtJQ
xUN4AJdF7Osp9g==
vendingmachinesltd.com
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
RFQ PBMS 401055-STR-22.pdf.exedescription ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" RFQ PBMS 401055-STR-22.pdf.exe -
NWorm
A TrickBot module used to propagate to vulnerable domain controllers.
-
Executes dropped EXE 2 IoCs
Processes:
tmp6826.tmpQ2Dmo8cwUrb1GWZ.exetmp6826.tmpQ2Dmo8cwUrb1GWZ.exepid Process 1776 tmp6826.tmpQ2Dmo8cwUrb1GWZ.exe 1936 tmp6826.tmpQ2Dmo8cwUrb1GWZ.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
tmp6826.tmpQ2Dmo8cwUrb1GWZ.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Control Panel\International\Geo\Nation tmp6826.tmpQ2Dmo8cwUrb1GWZ.exe -
Loads dropped DLL 3 IoCs
Processes:
RFQ PBMS 401055-STR-22.pdf.exetmp6826.tmpQ2Dmo8cwUrb1GWZ.exepid Process 1772 RFQ PBMS 401055-STR-22.pdf.exe 1772 RFQ PBMS 401055-STR-22.pdf.exe 1776 tmp6826.tmpQ2Dmo8cwUrb1GWZ.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 3 IoCs
Processes:
RFQ PBMS 401055-STR-22.pdf.exetmp6826.tmpQ2Dmo8cwUrb1GWZ.exetmp6826.tmpQ2Dmo8cwUrb1GWZ.exedescription pid Process procid_target PID 1912 set thread context of 1772 1912 RFQ PBMS 401055-STR-22.pdf.exe 28 PID 1776 set thread context of 1936 1776 tmp6826.tmpQ2Dmo8cwUrb1GWZ.exe 31 PID 1936 set thread context of 1256 1936 tmp6826.tmpQ2Dmo8cwUrb1GWZ.exe 16 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
RFQ PBMS 401055-STR-22.pdf.exetmp6826.tmpQ2Dmo8cwUrb1GWZ.exepid Process 1772 RFQ PBMS 401055-STR-22.pdf.exe 1936 tmp6826.tmpQ2Dmo8cwUrb1GWZ.exe 1936 tmp6826.tmpQ2Dmo8cwUrb1GWZ.exe 1936 tmp6826.tmpQ2Dmo8cwUrb1GWZ.exe 1936 tmp6826.tmpQ2Dmo8cwUrb1GWZ.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
tmp6826.tmpQ2Dmo8cwUrb1GWZ.exepid Process 1936 tmp6826.tmpQ2Dmo8cwUrb1GWZ.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
RFQ PBMS 401055-STR-22.pdf.exetmp6826.tmpQ2Dmo8cwUrb1GWZ.exedescription pid Process Token: SeDebugPrivilege 1772 RFQ PBMS 401055-STR-22.pdf.exe Token: SeDebugPrivilege 1936 tmp6826.tmpQ2Dmo8cwUrb1GWZ.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
RFQ PBMS 401055-STR-22.pdf.exeRFQ PBMS 401055-STR-22.pdf.exetmp6826.tmpQ2Dmo8cwUrb1GWZ.exeExplorer.EXEdescription pid Process procid_target PID 1912 wrote to memory of 1772 1912 RFQ PBMS 401055-STR-22.pdf.exe 28 PID 1912 wrote to memory of 1772 1912 RFQ PBMS 401055-STR-22.pdf.exe 28 PID 1912 wrote to memory of 1772 1912 RFQ PBMS 401055-STR-22.pdf.exe 28 PID 1912 wrote to memory of 1772 1912 RFQ PBMS 401055-STR-22.pdf.exe 28 PID 1912 wrote to memory of 1772 1912 RFQ PBMS 401055-STR-22.pdf.exe 28 PID 1912 wrote to memory of 1772 1912 RFQ PBMS 401055-STR-22.pdf.exe 28 PID 1912 wrote to memory of 1772 1912 RFQ PBMS 401055-STR-22.pdf.exe 28 PID 1912 wrote to memory of 1772 1912 RFQ PBMS 401055-STR-22.pdf.exe 28 PID 1912 wrote to memory of 1772 1912 RFQ PBMS 401055-STR-22.pdf.exe 28 PID 1772 wrote to memory of 1776 1772 RFQ PBMS 401055-STR-22.pdf.exe 30 PID 1772 wrote to memory of 1776 1772 RFQ PBMS 401055-STR-22.pdf.exe 30 PID 1772 wrote to memory of 1776 1772 RFQ PBMS 401055-STR-22.pdf.exe 30 PID 1772 wrote to memory of 1776 1772 RFQ PBMS 401055-STR-22.pdf.exe 30 PID 1776 wrote to memory of 1936 1776 tmp6826.tmpQ2Dmo8cwUrb1GWZ.exe 31 PID 1776 wrote to memory of 1936 1776 tmp6826.tmpQ2Dmo8cwUrb1GWZ.exe 31 PID 1776 wrote to memory of 1936 1776 tmp6826.tmpQ2Dmo8cwUrb1GWZ.exe 31 PID 1776 wrote to memory of 1936 1776 tmp6826.tmpQ2Dmo8cwUrb1GWZ.exe 31 PID 1776 wrote to memory of 1936 1776 tmp6826.tmpQ2Dmo8cwUrb1GWZ.exe 31 PID 1776 wrote to memory of 1936 1776 tmp6826.tmpQ2Dmo8cwUrb1GWZ.exe 31 PID 1776 wrote to memory of 1936 1776 tmp6826.tmpQ2Dmo8cwUrb1GWZ.exe 31 PID 1256 wrote to memory of 1584 1256 Explorer.EXE 32 PID 1256 wrote to memory of 1584 1256 Explorer.EXE 32 PID 1256 wrote to memory of 1584 1256 Explorer.EXE 32 PID 1256 wrote to memory of 1584 1256 Explorer.EXE 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\RFQ PBMS 401055-STR-22.pdf.exe"C:\Users\Admin\AppData\Local\Temp\RFQ PBMS 401055-STR-22.pdf.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\RFQ PBMS 401055-STR-22.pdf.exe"C:\Users\Admin\AppData\Local\Temp\RFQ PBMS 401055-STR-22.pdf.exe"3⤵
- Modifies visibility of file extensions in Explorer
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\tmp6826.tmpQ2Dmo8cwUrb1GWZ.exe"C:\Users\Admin\AppData\Local\Temp\tmp6826.tmpQ2Dmo8cwUrb1GWZ.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\tmp6826.tmpQ2Dmo8cwUrb1GWZ.exe"C:\Users\Admin\AppData\Local\Temp\tmp6826.tmpQ2Dmo8cwUrb1GWZ.exe"5⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1936
-
-
-
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\SysWOW64\netsh.exe"2⤵PID:1584
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1009KB
MD5a8ba4d5116a3db61e57d8de3b578b869
SHA1dce87e252cf55b8366897bbf2cfd6b11d989859f
SHA256f1c99e2f74b4c7b6b98e43b946e6ec8e2515ff2fac0cab86fb2a37ebb641eb01
SHA5122c6221bd7dd230239afac5ae20e30495b7617579406a1058ab85942f414a2d22abdf7d7b2e71e3b1ff7129f246e6d0f6150d0bd433b970f70f936bfe7f990d47
-
Filesize
1009KB
MD5a8ba4d5116a3db61e57d8de3b578b869
SHA1dce87e252cf55b8366897bbf2cfd6b11d989859f
SHA256f1c99e2f74b4c7b6b98e43b946e6ec8e2515ff2fac0cab86fb2a37ebb641eb01
SHA5122c6221bd7dd230239afac5ae20e30495b7617579406a1058ab85942f414a2d22abdf7d7b2e71e3b1ff7129f246e6d0f6150d0bd433b970f70f936bfe7f990d47
-
Filesize
1009KB
MD5a8ba4d5116a3db61e57d8de3b578b869
SHA1dce87e252cf55b8366897bbf2cfd6b11d989859f
SHA256f1c99e2f74b4c7b6b98e43b946e6ec8e2515ff2fac0cab86fb2a37ebb641eb01
SHA5122c6221bd7dd230239afac5ae20e30495b7617579406a1058ab85942f414a2d22abdf7d7b2e71e3b1ff7129f246e6d0f6150d0bd433b970f70f936bfe7f990d47
-
Filesize
1009KB
MD5a8ba4d5116a3db61e57d8de3b578b869
SHA1dce87e252cf55b8366897bbf2cfd6b11d989859f
SHA256f1c99e2f74b4c7b6b98e43b946e6ec8e2515ff2fac0cab86fb2a37ebb641eb01
SHA5122c6221bd7dd230239afac5ae20e30495b7617579406a1058ab85942f414a2d22abdf7d7b2e71e3b1ff7129f246e6d0f6150d0bd433b970f70f936bfe7f990d47
-
Filesize
1009KB
MD5a8ba4d5116a3db61e57d8de3b578b869
SHA1dce87e252cf55b8366897bbf2cfd6b11d989859f
SHA256f1c99e2f74b4c7b6b98e43b946e6ec8e2515ff2fac0cab86fb2a37ebb641eb01
SHA5122c6221bd7dd230239afac5ae20e30495b7617579406a1058ab85942f414a2d22abdf7d7b2e71e3b1ff7129f246e6d0f6150d0bd433b970f70f936bfe7f990d47
-
Filesize
1009KB
MD5a8ba4d5116a3db61e57d8de3b578b869
SHA1dce87e252cf55b8366897bbf2cfd6b11d989859f
SHA256f1c99e2f74b4c7b6b98e43b946e6ec8e2515ff2fac0cab86fb2a37ebb641eb01
SHA5122c6221bd7dd230239afac5ae20e30495b7617579406a1058ab85942f414a2d22abdf7d7b2e71e3b1ff7129f246e6d0f6150d0bd433b970f70f936bfe7f990d47