Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/10/2022, 07:19
Static task
static1
Behavioral task
behavioral1
Sample
vAsA7v93dCn2vOg.exe
Resource
win7-20220812-en
General
-
Target
vAsA7v93dCn2vOg.exe
-
Size
1.1MB
-
MD5
b66e3047c2dd35c5f477b29c12bf8499
-
SHA1
bda916b26b30ede5e2817c736afbc54cf06cc2b7
-
SHA256
cfe210ae906aaa82fdf2bf3879af8f271897e5497c285140d1ca130b38936982
-
SHA512
5ba8b8d10408bfce85c2e84d90f6f4e99195d1da14f6d76343e10c6de3144a4ff10d07f82bbac8588e048bc6f56fd00fd1a1d60f14d557f0051f49bb418f7938
-
SSDEEP
24576:8xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxNuss8qAb+RWK:QqAqRWVg35/qroFdj
Malware Config
Extracted
formbook
axe3
nV63ydJMXMf7memspIpnnVLl3Q==
uJ50rs5Y/80AqT79guHh
FcsTFQ1xekTgcal8G0P2ZTQ=
uLWWVJP++ID3dkoB8g==
YyoybGF5Fsa/UH8=
Tk4htwkBBfM5ZA==
QgJ8vN9f+uCdsD79guHh
wmjC9UuSBGyTrY5PAX9t1A==
Sw7JEwOKl576ndxw/A==
BOqs09Ikjej1BN98ZYtVfSi5xQ==
YA5cbH3/4wVAYg==
fRWIvatAXM3+t0X9guHh
FAbZXq/jFuaEq2YCwQh3b2oE
STL+RDTA652/tD/9guHh
zgLNcuX32aFB
WmgwW1UCJ/9Nc0ofkIhVyQ==
jiWgy9ckGh8G+3Q7Rl//NW9ZU7TU
JCoawiBkwAkeJOehkNXRCYnj3A==
WQDFZvang91P
zGrJ4CA2pAhR
QPRTjvEmeNHJHLw4
hEsOq/9JLoNbN7xMFR/pVZbo3A==
v8ye4m6wAfCjtD/9guHh
BBLwmMMaoKz+DbU6
sjgLlNkZ9mir2p0w
RA94vAgqczVm8w+fAX9t1A==
Jc7S9gc/CMtY
d3Q3djg/CMtY
VhqBnq4x3sYMs0L9guHh
n/v36+MW2b27KCv99g==
Vi71NEakLqvP3MqenbNiUC4Ag77W
q2PO39wujdOnAuxj/A==
ZR3lmukghPyiLio14Qr3UzQ=
Zl6HrWMq4wVAYg==
cSLhluP/Ofkn0vf86RH8
9eSoKHzSznZ2E2I=
VS76OTqEeTTUTf3yG0P2ZTQ=
SvRzutQ0LP2xOD65OIlNvcGjf7wR95Ls
k35uD09p0eN9KnU=
lFirx9M0pQpUg0jpvjMpH5S0UrTP
ajKdwrz9WE/8A1dLTCw=
CaL/NoESHca/R3Y0GCQ=
Sghzwgx+c9nHatnaLXxVyQ==
UwF0yGa7uiI=
fjKKobYsUVNpBGc=
OScsLPAH3p9A
kVEWzgFRqnZTJ5QB4w==
wpZxCWOk7NaBlkkWI2dWfSi5xQ==
ijqu3+QWAg603ptOFAq1qfMEc1sXIr/5
zZ4ewkBx7qdG
qI9yt8kQwDhe/2/igMWe3CgL
ANUmYpsVtpbSTJViQ3TjXDY=
nzb3pvZA80MQWk3SbYjyUi8=
HAbPWI0YyvXqYJgf4EEpi3xdT6B13J7x
olY01h1WKvkhBy/y7Q==
dGJK/EiDz5UuvM1W9Q==
em4mQ1fciHK2cC3u/EdFfSi5xQ==
pxC52NcfWmjL+qUw
j3o1VEaAW6jAS1tkRjs=
UAK5/hRmtnmXLXQbf+3sTCs=
v2yzvsMvthMyTA7Gq50ZfSi5xQ==
ehryofUgZVKUMZtJ2vCggmkD
B7kHDAhZxHzJHLw4
nYxx+02TYE35jH5JXYU0fLuPYDw=
succes-digitalmlm.com
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation vAsA7v93dCn2vOg.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3044 set thread context of 4272 3044 vAsA7v93dCn2vOg.exe 91 PID 4272 set thread context of 376 4272 vAsA7v93dCn2vOg.exe 35 PID 4272 set thread context of 376 4272 vAsA7v93dCn2vOg.exe 35 PID 2936 set thread context of 376 2936 chkdsk.exe 35 -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe -
description ioc Process Key created \Registry\User\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 chkdsk.exe -
Suspicious behavior: EnumeratesProcesses 40 IoCs
pid Process 4272 vAsA7v93dCn2vOg.exe 4272 vAsA7v93dCn2vOg.exe 4272 vAsA7v93dCn2vOg.exe 4272 vAsA7v93dCn2vOg.exe 4272 vAsA7v93dCn2vOg.exe 4272 vAsA7v93dCn2vOg.exe 4272 vAsA7v93dCn2vOg.exe 4272 vAsA7v93dCn2vOg.exe 4272 vAsA7v93dCn2vOg.exe 4272 vAsA7v93dCn2vOg.exe 2936 chkdsk.exe 2936 chkdsk.exe 2936 chkdsk.exe 2936 chkdsk.exe 2936 chkdsk.exe 2936 chkdsk.exe 2936 chkdsk.exe 2936 chkdsk.exe 2936 chkdsk.exe 2936 chkdsk.exe 2936 chkdsk.exe 2936 chkdsk.exe 2936 chkdsk.exe 2936 chkdsk.exe 2936 chkdsk.exe 2936 chkdsk.exe 2936 chkdsk.exe 2936 chkdsk.exe 2936 chkdsk.exe 2936 chkdsk.exe 2936 chkdsk.exe 2936 chkdsk.exe 2936 chkdsk.exe 2936 chkdsk.exe 2936 chkdsk.exe 2936 chkdsk.exe 2936 chkdsk.exe 2936 chkdsk.exe 2936 chkdsk.exe 2936 chkdsk.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 376 Explorer.EXE -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 4272 vAsA7v93dCn2vOg.exe 4272 vAsA7v93dCn2vOg.exe 4272 vAsA7v93dCn2vOg.exe 4272 vAsA7v93dCn2vOg.exe 2936 chkdsk.exe 2936 chkdsk.exe 2936 chkdsk.exe 2936 chkdsk.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4272 vAsA7v93dCn2vOg.exe Token: SeDebugPrivilege 2936 chkdsk.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3044 wrote to memory of 4272 3044 vAsA7v93dCn2vOg.exe 91 PID 3044 wrote to memory of 4272 3044 vAsA7v93dCn2vOg.exe 91 PID 3044 wrote to memory of 4272 3044 vAsA7v93dCn2vOg.exe 91 PID 3044 wrote to memory of 4272 3044 vAsA7v93dCn2vOg.exe 91 PID 3044 wrote to memory of 4272 3044 vAsA7v93dCn2vOg.exe 91 PID 3044 wrote to memory of 4272 3044 vAsA7v93dCn2vOg.exe 91 PID 376 wrote to memory of 2936 376 Explorer.EXE 92 PID 376 wrote to memory of 2936 376 Explorer.EXE 92 PID 376 wrote to memory of 2936 376 Explorer.EXE 92 PID 2936 wrote to memory of 836 2936 chkdsk.exe 93 PID 2936 wrote to memory of 836 2936 chkdsk.exe 93 PID 2936 wrote to memory of 836 2936 chkdsk.exe 93
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Users\Admin\AppData\Local\Temp\vAsA7v93dCn2vOg.exe"C:\Users\Admin\AppData\Local\Temp\vAsA7v93dCn2vOg.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\vAsA7v93dCn2vOg.exe"C:\Users\Admin\AppData\Local\Temp\vAsA7v93dCn2vOg.exe"3⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4272
-
-
-
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Suspicious use of SetThreadContext
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:836
-
-