Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
18-10-2022 12:46
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220812-en
General
-
Target
tmp.exe
-
Size
880KB
-
MD5
7a0e96f78e83a1d55e045972883b04d0
-
SHA1
33e82a9963397ebd4c786a8f62a5b464899f6929
-
SHA256
79df449dc86d423ea6b59361b7bc839efd8149bf49f138540327d9e94ec89733
-
SHA512
81e1d33bb133073f8a6349630693c11a44f63deb0b6cafef8e4d4eea58da9db6b981e3c6c5d4f42436c05ce5c0859faeea2ba6166774674000ad9183e71ab62c
-
SSDEEP
12288:bCRjG9rD4sbdehUG0CrkDPhaoh+s3dHzqm0wcas/:DD4KXhC6aq1qm
Malware Config
Extracted
formbook
s8gw
b/iFndOEL2rKvw==
HK7quAepCJH6CkNgpH2cDYx1
YEayMA+cR1WQ0Qw/lQ==
kPVNVkAC6pEPHVFQnzCxsA==
yLE1wrE7kf1KRGRm5a95qQ==
D6ktQZWoaOJGopmOlg==
98rmMok6y5e47YvCCMQNPaqM6qf+7PsEAQ==
7Po3fdN1NNtop0X5Ryv9PnUrSLQ=
+vk1DU92V465rf1+gFhdWMFoAsAY
AuhZ6jw45aHmPdzGVilx
/9ln8smKekiYzqePkA==
7+gsdtTlpqcSL0/GVilx
6pXLEOumjAfvK8Y=
inT5kfC0FBmcw/hw7NYua819
wb/qKZCjfrEiKFz9Vyn9chrZxA==
Pil1K4a6ruUXJ2fPD5qXo+2pNMn5VdCREA==
mxo3/mBm1hMSWd8=
8ltzwIsdiPpJXbK30JecDYx1
BmrK2y9G+VyimqzrK9YtmYY=
jPP9Q/IqWt3JQSZtvqI1jb9oAsAY
xWzxa9GO6uM2f8ZremM=
81ZOUHEixtUIVv6NlIycDYx1
x3TwA2aHOqP09Rlz967tvg==
YcGkK4ptotZo
rRGPhtHpxhA5vg1ye2E=
s0nEUS76+DG4N0jCxIuMCH5s
sww09+l42RMSWd8=
nxSyL4EzoozGUpBZhw==
uyCPelMDq3XHVZFL
vctY16I47LsuQmtZV/z7PBzNzA==
E2OPZ4qidzKSyJNN
D6dFPTDUg8kaLmUmd0ldWMJoAsAY
Hfxr+EtmR3rHVZFL
GHz5DGiEOpXU1RopdxGnqQ==
vkyMO5bIjgF3jazpQxN7rCkLjaWsutEg
yCa7yRAQa3bHVZFL
IKm4cOp321WOog==
I3XZ+15s2tImMUjGVilx
x/Jd3b8EpiJXqemg4rgrchrZxA==
4mC1PjLusl2XzqePkA==
tYbmbDzOglrJ4zt2u61ws56J3tPwebg=
DuxD/09nTPBbkjfcIAAIB3QpxWbK3rA=
HHuuqojxl4TAA5Jf
C17m7sNUuc5hra6AeHQ=
vgw+g9qBRjWM3Ik7mA==
GGODX7tmIuDHVZFL
KH6t4TE6FtX+T+PT05shjfFoAsAY
nwWYlWch9TA3hqlW
bXb0fcySIOTHVZFL
aPlXnvfBsGj7O5hRUSQnGI4=
Zpznw5MtmI3HVZFL
19Zg6zNnTPgWPmPM0qicDYx1
kgAZh+ZmxRMSWd8=
f2gI+k/SivxGUIFve1MFSHUrSLQ=
IShqS5bKxWbWFU6N5rNJPRG+W5SWLQ==
67fiJ39totZo
0+kxCeKnjAfvK8Y=
xJoBjOzyVM4zNDhpwpcuchrZxA==
oIoetRFMRHP1M2jDwZmcDYx1
J3OgdY4S7Sg=
fBJLDHKdTs5VZHdiWTH9RXUrSLQ=
kHi1PIBtotZo
cFOqg9WHL2rKvw==
wi6VpX8DXHHHVZFL
aeneontrue.com
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Control Panel\International\Geo\Nation tmp.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1088 set thread context of 936 1088 tmp.exe 27 PID 936 set thread context of 1276 936 tmp.exe 13 PID 936 set thread context of 1276 936 tmp.exe 13 PID 1164 set thread context of 1276 1164 chkdsk.exe 13 -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe -
description ioc Process Key created \Registry\User\S-1-5-21-2292972927-2705560509-2768824231-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 chkdsk.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 936 tmp.exe 936 tmp.exe 936 tmp.exe 936 tmp.exe 936 tmp.exe 1164 chkdsk.exe 1164 chkdsk.exe 1164 chkdsk.exe 1164 chkdsk.exe 1164 chkdsk.exe 1164 chkdsk.exe 1164 chkdsk.exe 1164 chkdsk.exe 1164 chkdsk.exe 1164 chkdsk.exe 1164 chkdsk.exe 1164 chkdsk.exe 1164 chkdsk.exe -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 936 tmp.exe 936 tmp.exe 936 tmp.exe 936 tmp.exe 1164 chkdsk.exe 1164 chkdsk.exe 1164 chkdsk.exe 1164 chkdsk.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 936 tmp.exe Token: SeDebugPrivilege 1164 chkdsk.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1276 Explorer.EXE 1276 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1276 Explorer.EXE 1276 Explorer.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1088 wrote to memory of 936 1088 tmp.exe 27 PID 1088 wrote to memory of 936 1088 tmp.exe 27 PID 1088 wrote to memory of 936 1088 tmp.exe 27 PID 1088 wrote to memory of 936 1088 tmp.exe 27 PID 1088 wrote to memory of 936 1088 tmp.exe 27 PID 1088 wrote to memory of 936 1088 tmp.exe 27 PID 1088 wrote to memory of 936 1088 tmp.exe 27 PID 1276 wrote to memory of 1164 1276 Explorer.EXE 28 PID 1276 wrote to memory of 1164 1276 Explorer.EXE 28 PID 1276 wrote to memory of 1164 1276 Explorer.EXE 28 PID 1276 wrote to memory of 1164 1276 Explorer.EXE 28 PID 1164 wrote to memory of 1976 1164 chkdsk.exe 31 PID 1164 wrote to memory of 1976 1164 chkdsk.exe 31 PID 1164 wrote to memory of 1976 1164 chkdsk.exe 31 PID 1164 wrote to memory of 1976 1164 chkdsk.exe 31 PID 1164 wrote to memory of 1976 1164 chkdsk.exe 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"3⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:936
-
-
-
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Suspicious use of SetThreadContext
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1976
-
-