Analysis
-
max time kernel
56s -
max time network
76s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26/10/2022, 11:44
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220812-en
General
-
Target
tmp.exe
-
Size
547KB
-
MD5
0b839e22f9277f4b0781578197972509
-
SHA1
f2fe6205fd3642acd8a7ac87cdb3509959cbf16a
-
SHA256
cc268916fb77287ae7258a4301c427751c9a0277786d101aa74a761419564f28
-
SHA512
7d0ceb71d54b4d8a01366987d17399e28d5f071bdf8bd58ccc4013a2fbe126c7567692608373c8f7eb53c5c86e19e328ec1bd4e4cfb1a86c8d85a713fd11143c
-
SSDEEP
12288:2xDqh7zKuImX1RWjosbfrjQajiqIjU4t3:2eKuHFmbjcahIj
Malware Config
Extracted
formbook
ncpr
bVBX5DcJzr9yf94C3w==
pAza9ePFpFp759M=
GeHCdpsX/21yf94C3w==
A86m2jOAb2lCta5KjFGSBLa0Bdru/eQt
bEERX4lbMxXbYU3pYqPIU32+
XLFilcOTXqV04j9CxpgWTXS2
UQTWj58OqzP2ew==
MqVmrtvUwL+EuyI6FfY+xgYaxA==
Fe3ugYgE7GZT3UohKWCrog==
YsWZa7gt9HJXwDhOrwIWTXS2
9mk4g8/Nnlp759M=
g01M0Tsk/vVnrhpC5zZrpw==
ec6PYogewB7aZw==
JveT+/6JbtwGUcTPwA==
EO3y7N6/n5uK0eyQ+bdcU7x9zA==
SRMfKoboyEnEDYOUZWns8TU=
kW15b1o+IOtNpgst5zZrpw==
gUo40RWBHijfIAiuuMdrKA+WMdA=
HvDy2QVdG2cjuiJC7WrE6i4=
uwOMiN8j6q9/966Mltg=
jGl4hoFfLsM2gFepP7yasA==
F9PNZXw2urMl
k2FrywMA6aJo7cQ=
Ng3noMWKcFQ=
EuCdSYcTs1q158o=
PSkxISg1Fva3Bq6Mltg=
owviBgoV5l2741JmLBWt2yw=
poGxVFnHiIswLZqrHO8x
s4GxhtRZS89Ei3D67zF/f1TTdHPftqbF3g==
cURKrRXcL5oGUcTPwA==
/9buSWtJK3Mpdtj01Po8lZHVLL1eOPY0
H45aHTqMYOpwphsrEBWt2yw=
sH6A2FwjBeQ5Z3rUWtthoQ==
+cWc4/rSlSGWuN9+
V71ZMXn/4EYToBMbnAQWTXS2
XjULZr+1mZPtIRd5Hm45
GNvf2ca7mieVzbRhvhWt2yw=
tlOai8pPJq2g9q3Gwg==
roNR+zzHawfLZQ==
DvjMi90/KPOwLg+zPNAMvt0wkNg=
w5NlsQYyva8k
Zs2Ou/8H5bt8BQGCXaQHu90wkNg=
+F0fc8zJvy4howMRzwtLOdir2dnrOa4=
bzoKyxiadPnsg+4bFBWt2yw=
gJ9dNXnjawfLZQ==
sQGNBXFmQjH+iX4OEGnfoJwZ8EKj
W71kR3LUvFp759M=
1KuNrKJmAEO66tNavhWt2yw=
kOJy3d5mQEWzC3+H4C5jHgqc4dnrOa4=
JwWrVtWddVA=
mf23iNlF+LGAbWj2Ut4=
NZdjjpqRbWlLmwke5zZrpw==
m3WDjZyYajwEc2MPjAcWTXS2
LhghnJUq2bEy
G3Mm4RbijgT3eA==
shOpqBODYNmj9q3Gwg==
ontbDjy2awfLZQ==
r3+D+/p5Tq2b9q3Gwg==
ZzVDzkBG5dLEzcNm
bVVTRjUfCtuRHw15Hm45
1j8BKBn537Gu59Y=
H4VSiOs792XTF4e2B3NRy72I4GOD/w==
7Tb4rBHr2U8qlxgunO2+SwwZ8EKj
abdxkcyGTsUlN5qFztm9qA==
youlian.fund
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1332 set thread context of 1324 1332 tmp.exe 93 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1332 tmp.exe 1332 tmp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1332 tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1332 wrote to memory of 3176 1332 tmp.exe 90 PID 1332 wrote to memory of 3176 1332 tmp.exe 90 PID 1332 wrote to memory of 3176 1332 tmp.exe 90 PID 1332 wrote to memory of 2516 1332 tmp.exe 92 PID 1332 wrote to memory of 2516 1332 tmp.exe 92 PID 1332 wrote to memory of 2516 1332 tmp.exe 92 PID 1332 wrote to memory of 1324 1332 tmp.exe 93 PID 1332 wrote to memory of 1324 1332 tmp.exe 93 PID 1332 wrote to memory of 1324 1332 tmp.exe 93 PID 1332 wrote to memory of 1324 1332 tmp.exe 93 PID 1332 wrote to memory of 1324 1332 tmp.exe 93 PID 1332 wrote to memory of 1324 1332 tmp.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵PID:3176
-
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵PID:2516
-
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵PID:1324
-