Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
18-10-2022 12:46
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220812-en
General
-
Target
tmp.exe
-
Size
880KB
-
MD5
7a0e96f78e83a1d55e045972883b04d0
-
SHA1
33e82a9963397ebd4c786a8f62a5b464899f6929
-
SHA256
79df449dc86d423ea6b59361b7bc839efd8149bf49f138540327d9e94ec89733
-
SHA512
81e1d33bb133073f8a6349630693c11a44f63deb0b6cafef8e4d4eea58da9db6b981e3c6c5d4f42436c05ce5c0859faeea2ba6166774674000ad9183e71ab62c
-
SSDEEP
12288:bCRjG9rD4sbdehUG0CrkDPhaoh+s3dHzqm0wcas/:DD4KXhC6aq1qm
Malware Config
Extracted
formbook
s8gw
b/iFndOEL2rKvw==
HK7quAepCJH6CkNgpH2cDYx1
YEayMA+cR1WQ0Qw/lQ==
kPVNVkAC6pEPHVFQnzCxsA==
yLE1wrE7kf1KRGRm5a95qQ==
D6ktQZWoaOJGopmOlg==
98rmMok6y5e47YvCCMQNPaqM6qf+7PsEAQ==
7Po3fdN1NNtop0X5Ryv9PnUrSLQ=
+vk1DU92V465rf1+gFhdWMFoAsAY
AuhZ6jw45aHmPdzGVilx
/9ln8smKekiYzqePkA==
7+gsdtTlpqcSL0/GVilx
6pXLEOumjAfvK8Y=
inT5kfC0FBmcw/hw7NYua819
wb/qKZCjfrEiKFz9Vyn9chrZxA==
Pil1K4a6ruUXJ2fPD5qXo+2pNMn5VdCREA==
mxo3/mBm1hMSWd8=
8ltzwIsdiPpJXbK30JecDYx1
BmrK2y9G+VyimqzrK9YtmYY=
jPP9Q/IqWt3JQSZtvqI1jb9oAsAY
xWzxa9GO6uM2f8ZremM=
81ZOUHEixtUIVv6NlIycDYx1
x3TwA2aHOqP09Rlz967tvg==
YcGkK4ptotZo
rRGPhtHpxhA5vg1ye2E=
s0nEUS76+DG4N0jCxIuMCH5s
sww09+l42RMSWd8=
nxSyL4EzoozGUpBZhw==
uyCPelMDq3XHVZFL
vctY16I47LsuQmtZV/z7PBzNzA==
E2OPZ4qidzKSyJNN
D6dFPTDUg8kaLmUmd0ldWMJoAsAY
Hfxr+EtmR3rHVZFL
GHz5DGiEOpXU1RopdxGnqQ==
vkyMO5bIjgF3jazpQxN7rCkLjaWsutEg
yCa7yRAQa3bHVZFL
IKm4cOp321WOog==
I3XZ+15s2tImMUjGVilx
x/Jd3b8EpiJXqemg4rgrchrZxA==
4mC1PjLusl2XzqePkA==
tYbmbDzOglrJ4zt2u61ws56J3tPwebg=
DuxD/09nTPBbkjfcIAAIB3QpxWbK3rA=
HHuuqojxl4TAA5Jf
C17m7sNUuc5hra6AeHQ=
vgw+g9qBRjWM3Ik7mA==
GGODX7tmIuDHVZFL
KH6t4TE6FtX+T+PT05shjfFoAsAY
nwWYlWch9TA3hqlW
bXb0fcySIOTHVZFL
aPlXnvfBsGj7O5hRUSQnGI4=
Zpznw5MtmI3HVZFL
19Zg6zNnTPgWPmPM0qicDYx1
kgAZh+ZmxRMSWd8=
f2gI+k/SivxGUIFve1MFSHUrSLQ=
IShqS5bKxWbWFU6N5rNJPRG+W5SWLQ==
67fiJ39totZo
0+kxCeKnjAfvK8Y=
xJoBjOzyVM4zNDhpwpcuchrZxA==
oIoetRFMRHP1M2jDwZmcDYx1
J3OgdY4S7Sg=
fBJLDHKdTs5VZHdiWTH9RXUrSLQ=
kHi1PIBtotZo
cFOqg9WHL2rKvw==
wi6VpX8DXHHHVZFL
aeneontrue.com
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4308 set thread context of 4644 4308 tmp.exe 92 PID 4644 set thread context of 2560 4644 tmp.exe 40 PID 4144 set thread context of 2560 4144 explorer.exe 40 -
description ioc Process Key created \Registry\User\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 explorer.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 4644 tmp.exe 4644 tmp.exe 4644 tmp.exe 4644 tmp.exe 4644 tmp.exe 4644 tmp.exe 4644 tmp.exe 4644 tmp.exe 4144 explorer.exe 4144 explorer.exe 4144 explorer.exe 4144 explorer.exe 4144 explorer.exe 4144 explorer.exe 4144 explorer.exe 4144 explorer.exe 4144 explorer.exe 4144 explorer.exe 4144 explorer.exe 4144 explorer.exe 4144 explorer.exe 4144 explorer.exe 4144 explorer.exe 4144 explorer.exe 4144 explorer.exe 4144 explorer.exe 4144 explorer.exe 4144 explorer.exe 4144 explorer.exe 4144 explorer.exe 4144 explorer.exe 4144 explorer.exe 4144 explorer.exe 4144 explorer.exe 4144 explorer.exe 4144 explorer.exe 4144 explorer.exe 4144 explorer.exe 4144 explorer.exe 4144 explorer.exe 4144 explorer.exe 4144 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2560 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 4644 tmp.exe 4644 tmp.exe 4644 tmp.exe 4144 explorer.exe 4144 explorer.exe 4144 explorer.exe 4144 explorer.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4644 tmp.exe Token: SeDebugPrivilege 4144 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4308 wrote to memory of 4644 4308 tmp.exe 92 PID 4308 wrote to memory of 4644 4308 tmp.exe 92 PID 4308 wrote to memory of 4644 4308 tmp.exe 92 PID 4308 wrote to memory of 4644 4308 tmp.exe 92 PID 4308 wrote to memory of 4644 4308 tmp.exe 92 PID 4308 wrote to memory of 4644 4308 tmp.exe 92 PID 2560 wrote to memory of 4144 2560 Explorer.EXE 93 PID 2560 wrote to memory of 4144 2560 Explorer.EXE 93 PID 2560 wrote to memory of 4144 2560 Explorer.EXE 93 PID 4144 wrote to memory of 4332 4144 explorer.exe 94 PID 4144 wrote to memory of 4332 4144 explorer.exe 94 PID 4144 wrote to memory of 4332 4144 explorer.exe 94
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"3⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4644
-
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:4332
-
-