Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
18/10/2022, 18:18
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.Olock.1.13406.20665.exe
Resource
win7-20220812-en
General
-
Target
SecuriteInfo.com.Trojan.Olock.1.13406.20665.exe
-
Size
1.2MB
-
MD5
2f34f1cd493828d80ab5f2473c37e159
-
SHA1
55d9656261db2239ad238a996f2d7ea6a940d89e
-
SHA256
7a1545afc398e83882ebf804bf3849579356e36e70a0acfac0c8962218171645
-
SHA512
4a10fb7ecb7ed65ef6e5defd1a3425df448305bbd6f63830ac8d399bf60cc9977f0bbf71e2c5de7060b2f722f9b80bdbad6ab9da07c729fad40bb4535deb13d1
-
SSDEEP
24576:94QZCt1v7TYTQON65BQ1qso4UhdND3we8MmsCKaWy:94z1QTe5BAjiNLDe+
Malware Config
Extracted
formbook
dj6o
eHTcR+KSbIHKrEJYcaqomJrw
d4CQy4B84xPiXuPwHUtF
8eIkbHEq+BPxberwHUtF
m0+kGJZPG1H1jgngcA==
AMbXEsJxX4/J80MD
cxBd6axquGelQQc=
J9URjF0q/TbJ80MD
HxxYujs6bp7dberwHUtF
VhwjWCuW1Xau
Hs4ZrXYwBycFVX7hJpekXd1oRg==
XyAqZOXgWECQBQ==
H+HaBrNXMlQ5j+GkDTwf7dEalRSG8g==
Kvj6PwPvL2f1jgngcA==
q3F0mzHxjbyi
G/sniBrf1waZ08/yTxyN8qLm
9uD0ZBYgb5ZiuP3wHUtF
Ndkqiyj14RhyZziD6WwV4O8=
PuY9wEs6hMAOTUs2mUCtdjzUeRyb+A==
PwsHXAKokKjJ80MD
xa4YnG9AI0WKthDfFO0=
MQ8MH62d8yYM76ur+PSq1rv4
3bzBJcCw7xdiv6jgTRiI8E6SoqA=
gllski02plO4hezwHUtF
fFupcJ7vWECQBQ==
t6rT74IzHwBjQg/PFfJ+XkwUqbyJ5R0=
56Sm6qNmn1DQ0GlhvXvBC8S/VqKP
WUlz+MBsMUUotVBYcaqomJrw
byiB84SNALIdtosIbQ==
Tl6H0INUQnheJvdAtTwA8vY=
AqzubjoPnUI=
pjxDfDsybJ4Evov1Zw==
MAQDK8y6Gb0I8vGtGwxpvjK2JAGH
UO5BqmVqz165KziylGwV4O8=
47b4ZydnxKzyMwE=
Bf7i1stH8J4Hvov1Zw==
tK7qfS7XseFCG6OY3GwV4O8=
p7cCavm6qOBKr71GbhlsLg==
0bXQHb94wGTx++0ubw==
t46Y0lNYob2TEONj2nnu4vA=
gkCQBL5zSXzPIzOm/2M+jjzEWfA+cYlv5g==
Kzh59Yh31ILszGVWratKal6xHAOH
BLr9ZQYBWbxKmbIgLtHALA==
VlyjEKNUSG6hcUoFandY
H/INXiD4y/bdLYKCq/LdOw==
f01NhTwlcqR+CogrfHrHtan3
V6baC439Psa1
t6uu52heoTqUcvDwHUtF
bXDKLuDkj/MmnzHyQ1Qp7b2/VqKP
kFa9Hr2GVXzP1qfEwpH66PI=
hFlcmTAgXE26HA==
85LuilH7N+c6mufwHUtF
9Mjd/JJR6hbo8fQjZg==
SkA7YPrxX12JbRo=
2fZDwaBN5E+tBw==
VlSNGsrK/95sfUVy24flta+6Ioi43B32
CLjlLea4n8MLvov1Zw==
S02ihrc5x/C6
gGV6xWcvWECQBQ==
EcQcUtKDg91tUQ4=
YQpcvUdGvKPaHg==
YQhIzXwraFg/LwQ=
pJbkcPbqSzli0jIB
x3zE9noxWECQBQ==
b1pvqkHtG0wdjQv4Vz+4h06SoqA=
hotelarta.cloud
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 7 992 cmstp.exe -
Loads dropped DLL 1 IoCs
pid Process 992 cmstp.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1388 set thread context of 1804 1388 SecuriteInfo.com.Trojan.Olock.1.13406.20665.exe 26 PID 1804 set thread context of 1396 1804 RegSvcs.exe 15 PID 992 set thread context of 1396 992 cmstp.exe 15 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \Registry\User\S-1-5-21-999675638-2867687379-27515722-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 cmstp.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1804 RegSvcs.exe 1804 RegSvcs.exe 1804 RegSvcs.exe 1804 RegSvcs.exe 992 cmstp.exe 992 cmstp.exe 992 cmstp.exe 992 cmstp.exe 992 cmstp.exe 992 cmstp.exe 992 cmstp.exe 992 cmstp.exe 992 cmstp.exe 992 cmstp.exe 992 cmstp.exe 992 cmstp.exe 992 cmstp.exe 992 cmstp.exe 992 cmstp.exe 992 cmstp.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 1804 RegSvcs.exe 1804 RegSvcs.exe 1804 RegSvcs.exe 992 cmstp.exe 992 cmstp.exe 992 cmstp.exe 992 cmstp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1804 RegSvcs.exe Token: SeDebugPrivilege 992 cmstp.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1396 Explorer.EXE 1396 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1396 Explorer.EXE 1396 Explorer.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1388 SecuriteInfo.com.Trojan.Olock.1.13406.20665.exe 1388 SecuriteInfo.com.Trojan.Olock.1.13406.20665.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1388 wrote to memory of 1804 1388 SecuriteInfo.com.Trojan.Olock.1.13406.20665.exe 26 PID 1388 wrote to memory of 1804 1388 SecuriteInfo.com.Trojan.Olock.1.13406.20665.exe 26 PID 1388 wrote to memory of 1804 1388 SecuriteInfo.com.Trojan.Olock.1.13406.20665.exe 26 PID 1388 wrote to memory of 1804 1388 SecuriteInfo.com.Trojan.Olock.1.13406.20665.exe 26 PID 1388 wrote to memory of 1804 1388 SecuriteInfo.com.Trojan.Olock.1.13406.20665.exe 26 PID 1388 wrote to memory of 1804 1388 SecuriteInfo.com.Trojan.Olock.1.13406.20665.exe 26 PID 1388 wrote to memory of 1804 1388 SecuriteInfo.com.Trojan.Olock.1.13406.20665.exe 26 PID 1388 wrote to memory of 1804 1388 SecuriteInfo.com.Trojan.Olock.1.13406.20665.exe 26 PID 1388 wrote to memory of 1804 1388 SecuriteInfo.com.Trojan.Olock.1.13406.20665.exe 26 PID 1388 wrote to memory of 1804 1388 SecuriteInfo.com.Trojan.Olock.1.13406.20665.exe 26 PID 1396 wrote to memory of 992 1396 Explorer.EXE 27 PID 1396 wrote to memory of 992 1396 Explorer.EXE 27 PID 1396 wrote to memory of 992 1396 Explorer.EXE 27 PID 1396 wrote to memory of 992 1396 Explorer.EXE 27 PID 1396 wrote to memory of 992 1396 Explorer.EXE 27 PID 1396 wrote to memory of 992 1396 Explorer.EXE 27 PID 1396 wrote to memory of 992 1396 Explorer.EXE 27 PID 992 wrote to memory of 1320 992 cmstp.exe 30 PID 992 wrote to memory of 1320 992 cmstp.exe 30 PID 992 wrote to memory of 1320 992 cmstp.exe 30 PID 992 wrote to memory of 1320 992 cmstp.exe 30 PID 992 wrote to memory of 1320 992 cmstp.exe 30
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Olock.1.13406.20665.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Olock.1.13406.20665.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1804
-
-
-
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1320
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
910KB
MD5d79258c5189103d69502eac786addb04
SHA1f34b33681cfe8ce649218173a7f58b237821c1ef
SHA25657d89a52061d70d87e40281f1196d53273f87860c4d707d667a8c7d9573da675
SHA512da797f4dd1ad628aa4e8004b2e00b7c278facbc57a313f56b70dc8fcfbdb0050ea8b025b3475098223cce96ea53537d678273656d46c2d33d81b496d90da34b2