Analysis
-
max time kernel
600s -
max time network
510s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27-10-2022 00:07
Static task
static1
Behavioral task
behavioral1
Sample
514b0d82faa73cee71e7b9323411f496be435bfe01844f9369ffb2fa8cef9d54.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
514b0d82faa73cee71e7b9323411f496be435bfe01844f9369ffb2fa8cef9d54.exe
Resource
win10v2004-20220812-en
General
-
Target
514b0d82faa73cee71e7b9323411f496be435bfe01844f9369ffb2fa8cef9d54.exe
-
Size
497KB
-
MD5
607b8176885a9c8c8f2be0067ee9aeba
-
SHA1
7bbe505272fac18a05491b0c6f6bc92a7c26dc23
-
SHA256
514b0d82faa73cee71e7b9323411f496be435bfe01844f9369ffb2fa8cef9d54
-
SHA512
372eda54a5ddba51de3f091df58d00d451bb83820d79b3f97209dfbfda6991a3e3f5647b8ba0291b80b1d6322cef844ced08c7a74e0cf280b86455f00fc626a8
-
SSDEEP
12288:U80ftiYRgLLrxRzG6h2/8E9rK/PIEIkqv59SLes:10tjRgXG6h2D04EIkqv5UV
Malware Config
Extracted
gozi_ifsb
1000
rastobona.com
artefaki.com
spamhouseanilingus.ru
gazitivaton.ru
-
build
200000
-
exe_type
worker
-
server_id
12
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Appxplua.exepid process 5100 Appxplua.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
514b0d82faa73cee71e7b9323411f496be435bfe01844f9369ffb2fa8cef9d54.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 514b0d82faa73cee71e7b9323411f496be435bfe01844f9369ffb2fa8cef9d54.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
514b0d82faa73cee71e7b9323411f496be435bfe01844f9369ffb2fa8cef9d54.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\altsangs = "C:\\Users\\Admin\\AppData\\Roaming\\baseeMas\\Appxplua.exe" 514b0d82faa73cee71e7b9323411f496be435bfe01844f9369ffb2fa8cef9d54.exe -
Suspicious use of SetThreadContext 6 IoCs
Processes:
Appxplua.exesvchost.exeExplorer.EXEdescription pid process target process PID 5100 set thread context of 5036 5100 Appxplua.exe svchost.exe PID 5036 set thread context of 380 5036 svchost.exe Explorer.EXE PID 380 set thread context of 3408 380 Explorer.EXE RuntimeBroker.exe PID 380 set thread context of 3704 380 Explorer.EXE RuntimeBroker.exe PID 380 set thread context of 4752 380 Explorer.EXE RuntimeBroker.exe PID 380 set thread context of 4704 380 Explorer.EXE RuntimeBroker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
Appxplua.exeExplorer.EXEpid process 5100 Appxplua.exe 5100 Appxplua.exe 380 Explorer.EXE 380 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 380 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
Appxplua.exesvchost.exeExplorer.EXEpid process 5100 Appxplua.exe 5036 svchost.exe 380 Explorer.EXE 380 Explorer.EXE 380 Explorer.EXE 380 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
RuntimeBroker.exeExplorer.EXEdescription pid process Token: SeShutdownPrivilege 3408 RuntimeBroker.exe Token: SeShutdownPrivilege 3408 RuntimeBroker.exe Token: SeShutdownPrivilege 3408 RuntimeBroker.exe Token: SeShutdownPrivilege 380 Explorer.EXE Token: SeCreatePagefilePrivilege 380 Explorer.EXE Token: SeShutdownPrivilege 380 Explorer.EXE Token: SeCreatePagefilePrivilege 380 Explorer.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Explorer.EXEpid process 380 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 380 Explorer.EXE -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
514b0d82faa73cee71e7b9323411f496be435bfe01844f9369ffb2fa8cef9d54.execmd.execmd.exeAppxplua.exesvchost.exeExplorer.EXEdescription pid process target process PID 5024 wrote to memory of 2500 5024 514b0d82faa73cee71e7b9323411f496be435bfe01844f9369ffb2fa8cef9d54.exe cmd.exe PID 5024 wrote to memory of 2500 5024 514b0d82faa73cee71e7b9323411f496be435bfe01844f9369ffb2fa8cef9d54.exe cmd.exe PID 5024 wrote to memory of 2500 5024 514b0d82faa73cee71e7b9323411f496be435bfe01844f9369ffb2fa8cef9d54.exe cmd.exe PID 2500 wrote to memory of 4824 2500 cmd.exe cmd.exe PID 2500 wrote to memory of 4824 2500 cmd.exe cmd.exe PID 2500 wrote to memory of 4824 2500 cmd.exe cmd.exe PID 4824 wrote to memory of 5100 4824 cmd.exe Appxplua.exe PID 4824 wrote to memory of 5100 4824 cmd.exe Appxplua.exe PID 4824 wrote to memory of 5100 4824 cmd.exe Appxplua.exe PID 5100 wrote to memory of 5036 5100 Appxplua.exe svchost.exe PID 5100 wrote to memory of 5036 5100 Appxplua.exe svchost.exe PID 5100 wrote to memory of 5036 5100 Appxplua.exe svchost.exe PID 5100 wrote to memory of 5036 5100 Appxplua.exe svchost.exe PID 5100 wrote to memory of 5036 5100 Appxplua.exe svchost.exe PID 5036 wrote to memory of 380 5036 svchost.exe Explorer.EXE PID 5036 wrote to memory of 380 5036 svchost.exe Explorer.EXE PID 5036 wrote to memory of 380 5036 svchost.exe Explorer.EXE PID 380 wrote to memory of 3408 380 Explorer.EXE RuntimeBroker.exe PID 380 wrote to memory of 3408 380 Explorer.EXE RuntimeBroker.exe PID 380 wrote to memory of 3408 380 Explorer.EXE RuntimeBroker.exe PID 380 wrote to memory of 3704 380 Explorer.EXE RuntimeBroker.exe PID 380 wrote to memory of 3704 380 Explorer.EXE RuntimeBroker.exe PID 380 wrote to memory of 3704 380 Explorer.EXE RuntimeBroker.exe PID 380 wrote to memory of 4752 380 Explorer.EXE RuntimeBroker.exe PID 380 wrote to memory of 4752 380 Explorer.EXE RuntimeBroker.exe PID 380 wrote to memory of 4752 380 Explorer.EXE RuntimeBroker.exe PID 380 wrote to memory of 4704 380 Explorer.EXE RuntimeBroker.exe PID 380 wrote to memory of 4704 380 Explorer.EXE RuntimeBroker.exe PID 380 wrote to memory of 4704 380 Explorer.EXE RuntimeBroker.exe
Processes
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3408
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4752
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3704
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Users\Admin\AppData\Local\Temp\514b0d82faa73cee71e7b9323411f496be435bfe01844f9369ffb2fa8cef9d54.exe"C:\Users\Admin\AppData\Local\Temp\514b0d82faa73cee71e7b9323411f496be435bfe01844f9369ffb2fa8cef9d54.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\9638\51B6.bat" "C:\Users\Admin\AppData\Roaming\baseeMas\Appxplua.exe" "C:\Users\Admin\AppData\Local\Temp\514B0D~1.EXE""3⤵
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\baseeMas\Appxplua.exe" "C:\Users\Admin\AppData\Local\Temp\514B0D~1.EXE""4⤵
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Users\Admin\AppData\Roaming\baseeMas\Appxplua.exe"C:\Users\Admin\AppData\Roaming\baseeMas\Appxplua.exe" "C:\Users\Admin\AppData\Local\Temp\514B0D~1.EXE"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:5036
-
-
-
-
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4704
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112B
MD5798567b8fc66be01ff3a11d7cb2cbb05
SHA14ffc63f59a2ce00c0e94a2fd43d5ab767b325e15
SHA256354c636fa48948869c7e78a5b0e160819345fd628417f3d58aa22d99f4f2d10e
SHA5129ca26b50e4d60c8975c1a9325a3d43b548d20829e336df40701825b07156035ba75ab7e4d9ca25fddecbd444d66eedc00c11ee926147b011479c3a163e401c8d
-
Filesize
497KB
MD5607b8176885a9c8c8f2be0067ee9aeba
SHA17bbe505272fac18a05491b0c6f6bc92a7c26dc23
SHA256514b0d82faa73cee71e7b9323411f496be435bfe01844f9369ffb2fa8cef9d54
SHA512372eda54a5ddba51de3f091df58d00d451bb83820d79b3f97209dfbfda6991a3e3f5647b8ba0291b80b1d6322cef844ced08c7a74e0cf280b86455f00fc626a8
-
Filesize
497KB
MD5607b8176885a9c8c8f2be0067ee9aeba
SHA17bbe505272fac18a05491b0c6f6bc92a7c26dc23
SHA256514b0d82faa73cee71e7b9323411f496be435bfe01844f9369ffb2fa8cef9d54
SHA512372eda54a5ddba51de3f091df58d00d451bb83820d79b3f97209dfbfda6991a3e3f5647b8ba0291b80b1d6322cef844ced08c7a74e0cf280b86455f00fc626a8