Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2022, 06:12
Static task
static1
Behavioral task
behavioral1
Sample
AJiwZGDbCiDzbQ0.exe
Resource
win7-20220901-en
General
-
Target
AJiwZGDbCiDzbQ0.exe
-
Size
833KB
-
MD5
39033dab0fd89aa8ecaff242fc98c7dc
-
SHA1
aa8a83d78a929dce80bad2786bc92e08028d134b
-
SHA256
a6f5f14ccd69b162c953507c108e4bf73fd12ab1563666ab680ea685e93cde71
-
SHA512
5a338c29938f29597ad42653eeec84886143c3d85bcae46a7ea0ebbaf4e0b103c421a9b9828cca90ba7ccb80681d564c2b0352ab25e60a328d7e1b6998929f00
-
SSDEEP
12288:rqAn3v9HiPyfPYD//DmqOINvJl7uQqO4mGwuo0Es/:p3vayfQrDmqOI9aQkmGwuo0
Malware Config
Extracted
formbook
axe3
nV63ydJMXMf7memspIpnnVLl3Q==
uJ50rs5Y/80AqT79guHh
FcsTFQ1xekTgcal8G0P2ZTQ=
uLWWVJP++ID3dkoB8g==
YyoybGF5Fsa/UH8=
Tk4htwkBBfM5ZA==
QgJ8vN9f+uCdsD79guHh
wmjC9UuSBGyTrY5PAX9t1A==
Sw7JEwOKl576ndxw/A==
BOqs09Ikjej1BN98ZYtVfSi5xQ==
YA5cbH3/4wVAYg==
fRWIvatAXM3+t0X9guHh
FAbZXq/jFuaEq2YCwQh3b2oE
STL+RDTA652/tD/9guHh
zgLNcuX32aFB
WmgwW1UCJ/9Nc0ofkIhVyQ==
jiWgy9ckGh8G+3Q7Rl//NW9ZU7TU
JCoawiBkwAkeJOehkNXRCYnj3A==
WQDFZvang91P
zGrJ4CA2pAhR
QPRTjvEmeNHJHLw4
hEsOq/9JLoNbN7xMFR/pVZbo3A==
v8ye4m6wAfCjtD/9guHh
BBLwmMMaoKz+DbU6
sjgLlNkZ9mir2p0w
RA94vAgqczVm8w+fAX9t1A==
Jc7S9gc/CMtY
d3Q3djg/CMtY
VhqBnq4x3sYMs0L9guHh
n/v36+MW2b27KCv99g==
Vi71NEakLqvP3MqenbNiUC4Ag77W
q2PO39wujdOnAuxj/A==
ZR3lmukghPyiLio14Qr3UzQ=
Zl6HrWMq4wVAYg==
cSLhluP/Ofkn0vf86RH8
9eSoKHzSznZ2E2I=
VS76OTqEeTTUTf3yG0P2ZTQ=
SvRzutQ0LP2xOD65OIlNvcGjf7wR95Ls
k35uD09p0eN9KnU=
lFirx9M0pQpUg0jpvjMpH5S0UrTP
ajKdwrz9WE/8A1dLTCw=
CaL/NoESHca/R3Y0GCQ=
Sghzwgx+c9nHatnaLXxVyQ==
UwF0yGa7uiI=
fjKKobYsUVNpBGc=
OScsLPAH3p9A
kVEWzgFRqnZTJ5QB4w==
wpZxCWOk7NaBlkkWI2dWfSi5xQ==
ijqu3+QWAg603ptOFAq1qfMEc1sXIr/5
zZ4ewkBx7qdG
qI9yt8kQwDhe/2/igMWe3CgL
ANUmYpsVtpbSTJViQ3TjXDY=
nzb3pvZA80MQWk3SbYjyUi8=
HAbPWI0YyvXqYJgf4EEpi3xdT6B13J7x
olY01h1WKvkhBy/y7Q==
dGJK/EiDz5UuvM1W9Q==
em4mQ1fciHK2cC3u/EdFfSi5xQ==
pxC52NcfWmjL+qUw
j3o1VEaAW6jAS1tkRjs=
UAK5/hRmtnmXLXQbf+3sTCs=
v2yzvsMvthMyTA7Gq50ZfSi5xQ==
ehryofUgZVKUMZtJ2vCggmkD
B7kHDAhZxHzJHLw4
nYxx+02TYE35jH5JXYU0fLuPYDw=
succes-digitalmlm.com
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation AJiwZGDbCiDzbQ0.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3868 set thread context of 1820 3868 AJiwZGDbCiDzbQ0.exe 91 PID 1820 set thread context of 2740 1820 AJiwZGDbCiDzbQ0.exe 45 PID 3920 set thread context of 2740 3920 WWAHost.exe 45 -
description ioc Process Key created \Registry\User\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 WWAHost.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 1820 AJiwZGDbCiDzbQ0.exe 1820 AJiwZGDbCiDzbQ0.exe 1820 AJiwZGDbCiDzbQ0.exe 1820 AJiwZGDbCiDzbQ0.exe 1820 AJiwZGDbCiDzbQ0.exe 1820 AJiwZGDbCiDzbQ0.exe 1820 AJiwZGDbCiDzbQ0.exe 1820 AJiwZGDbCiDzbQ0.exe 3920 WWAHost.exe 3920 WWAHost.exe 3920 WWAHost.exe 3920 WWAHost.exe 3920 WWAHost.exe 3920 WWAHost.exe 3920 WWAHost.exe 3920 WWAHost.exe 3920 WWAHost.exe 3920 WWAHost.exe 3920 WWAHost.exe 3920 WWAHost.exe 3920 WWAHost.exe 3920 WWAHost.exe 3920 WWAHost.exe 3920 WWAHost.exe 3920 WWAHost.exe 3920 WWAHost.exe 3920 WWAHost.exe 3920 WWAHost.exe 3920 WWAHost.exe 3920 WWAHost.exe 3920 WWAHost.exe 3920 WWAHost.exe 3920 WWAHost.exe 3920 WWAHost.exe 3920 WWAHost.exe 3920 WWAHost.exe 3920 WWAHost.exe 3920 WWAHost.exe 3920 WWAHost.exe 3920 WWAHost.exe 3920 WWAHost.exe 3920 WWAHost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2740 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 1820 AJiwZGDbCiDzbQ0.exe 1820 AJiwZGDbCiDzbQ0.exe 1820 AJiwZGDbCiDzbQ0.exe 3920 WWAHost.exe 3920 WWAHost.exe 3920 WWAHost.exe 3920 WWAHost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1820 AJiwZGDbCiDzbQ0.exe Token: SeDebugPrivilege 3920 WWAHost.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3868 wrote to memory of 1820 3868 AJiwZGDbCiDzbQ0.exe 91 PID 3868 wrote to memory of 1820 3868 AJiwZGDbCiDzbQ0.exe 91 PID 3868 wrote to memory of 1820 3868 AJiwZGDbCiDzbQ0.exe 91 PID 3868 wrote to memory of 1820 3868 AJiwZGDbCiDzbQ0.exe 91 PID 3868 wrote to memory of 1820 3868 AJiwZGDbCiDzbQ0.exe 91 PID 3868 wrote to memory of 1820 3868 AJiwZGDbCiDzbQ0.exe 91 PID 2740 wrote to memory of 3920 2740 Explorer.EXE 92 PID 2740 wrote to memory of 3920 2740 Explorer.EXE 92 PID 2740 wrote to memory of 3920 2740 Explorer.EXE 92 PID 3920 wrote to memory of 616 3920 WWAHost.exe 93 PID 3920 wrote to memory of 616 3920 WWAHost.exe 93 PID 3920 wrote to memory of 616 3920 WWAHost.exe 93
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\AJiwZGDbCiDzbQ0.exe"C:\Users\Admin\AppData\Local\Temp\AJiwZGDbCiDzbQ0.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Users\Admin\AppData\Local\Temp\AJiwZGDbCiDzbQ0.exe"C:\Users\Admin\AppData\Local\Temp\AJiwZGDbCiDzbQ0.exe"3⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1820
-
-
-
C:\Windows\SysWOW64\WWAHost.exe"C:\Windows\SysWOW64\WWAHost.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:616
-
-