Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03/11/2022, 10:14
Static task
static1
Behavioral task
behavioral1
Sample
108722FTTOO17_Advance TT.exe
Resource
win7-20220901-en
General
-
Target
108722FTTOO17_Advance TT.exe
-
Size
225KB
-
MD5
35c80a1656228ab11b5ea483dc7b5b20
-
SHA1
b4e46cf73a2cb91ca01a0b534749e14cfea12f27
-
SHA256
2b3d32ba155e67989eb11a9cf80ca81dc5ebccd90e1589996cbeb613d445874c
-
SHA512
4fbf15c926e718ef22f5c736d042a0459ca9e75b2a3fd2c1ca268595465fb8c068177c2f98a01c2c4ad76c1e3c1a965626d834389ea77af3cdcb8709a2365b36
-
SSDEEP
6144:qweEpLSWkNHG9sRXzoeHvqwf6CoOVj2JWJD:bVwH2Azhdf6+2OD
Malware Config
Extracted
formbook
axe3
nV63ydJMXMf7memspIpnnVLl3Q==
uJ50rs5Y/80AqT79guHh
FcsTFQ1xekTgcal8G0P2ZTQ=
uLWWVJP++ID3dkoB8g==
YyoybGF5Fsa/UH8=
Tk4htwkBBfM5ZA==
QgJ8vN9f+uCdsD79guHh
wmjC9UuSBGyTrY5PAX9t1A==
Sw7JEwOKl576ndxw/A==
BOqs09Ikjej1BN98ZYtVfSi5xQ==
YA5cbH3/4wVAYg==
fRWIvatAXM3+t0X9guHh
FAbZXq/jFuaEq2YCwQh3b2oE
STL+RDTA652/tD/9guHh
zgLNcuX32aFB
WmgwW1UCJ/9Nc0ofkIhVyQ==
jiWgy9ckGh8G+3Q7Rl//NW9ZU7TU
JCoawiBkwAkeJOehkNXRCYnj3A==
WQDFZvang91P
zGrJ4CA2pAhR
QPRTjvEmeNHJHLw4
hEsOq/9JLoNbN7xMFR/pVZbo3A==
v8ye4m6wAfCjtD/9guHh
BBLwmMMaoKz+DbU6
sjgLlNkZ9mir2p0w
RA94vAgqczVm8w+fAX9t1A==
Jc7S9gc/CMtY
d3Q3djg/CMtY
VhqBnq4x3sYMs0L9guHh
n/v36+MW2b27KCv99g==
Vi71NEakLqvP3MqenbNiUC4Ag77W
q2PO39wujdOnAuxj/A==
ZR3lmukghPyiLio14Qr3UzQ=
Zl6HrWMq4wVAYg==
cSLhluP/Ofkn0vf86RH8
9eSoKHzSznZ2E2I=
VS76OTqEeTTUTf3yG0P2ZTQ=
SvRzutQ0LP2xOD65OIlNvcGjf7wR95Ls
k35uD09p0eN9KnU=
lFirx9M0pQpUg0jpvjMpH5S0UrTP
ajKdwrz9WE/8A1dLTCw=
CaL/NoESHca/R3Y0GCQ=
Sghzwgx+c9nHatnaLXxVyQ==
UwF0yGa7uiI=
fjKKobYsUVNpBGc=
OScsLPAH3p9A
kVEWzgFRqnZTJ5QB4w==
wpZxCWOk7NaBlkkWI2dWfSi5xQ==
ijqu3+QWAg603ptOFAq1qfMEc1sXIr/5
zZ4ewkBx7qdG
qI9yt8kQwDhe/2/igMWe3CgL
ANUmYpsVtpbSTJViQ3TjXDY=
nzb3pvZA80MQWk3SbYjyUi8=
HAbPWI0YyvXqYJgf4EEpi3xdT6B13J7x
olY01h1WKvkhBy/y7Q==
dGJK/EiDz5UuvM1W9Q==
em4mQ1fciHK2cC3u/EdFfSi5xQ==
pxC52NcfWmjL+qUw
j3o1VEaAW6jAS1tkRjs=
UAK5/hRmtnmXLXQbf+3sTCs=
v2yzvsMvthMyTA7Gq50ZfSi5xQ==
ehryofUgZVKUMZtJ2vCggmkD
B7kHDAhZxHzJHLw4
nYxx+02TYE35jH5JXYU0fLuPYDw=
succes-digitalmlm.com
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1696 jxybtdctyj.exe 1684 jxybtdctyj.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\International\Geo\Nation jxybtdctyj.exe -
Loads dropped DLL 3 IoCs
pid Process 1456 108722FTTOO17_Advance TT.exe 1696 jxybtdctyj.exe 2024 control.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1696 set thread context of 1684 1696 jxybtdctyj.exe 27 PID 1684 set thread context of 1360 1684 jxybtdctyj.exe 8 PID 2024 set thread context of 1360 2024 control.exe 8 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \Registry\User\S-1-5-21-4063495947-34355257-727531523-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 control.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 1684 jxybtdctyj.exe 1684 jxybtdctyj.exe 1684 jxybtdctyj.exe 1684 jxybtdctyj.exe 2024 control.exe 2024 control.exe 2024 control.exe 2024 control.exe 2024 control.exe 2024 control.exe 2024 control.exe 2024 control.exe 2024 control.exe 2024 control.exe 2024 control.exe 2024 control.exe 2024 control.exe 2024 control.exe 2024 control.exe 2024 control.exe 2024 control.exe 2024 control.exe 2024 control.exe 2024 control.exe 2024 control.exe 2024 control.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1360 Explorer.EXE -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 1696 jxybtdctyj.exe 1684 jxybtdctyj.exe 1684 jxybtdctyj.exe 1684 jxybtdctyj.exe 2024 control.exe 2024 control.exe 2024 control.exe 2024 control.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1684 jxybtdctyj.exe Token: SeDebugPrivilege 2024 control.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1360 Explorer.EXE 1360 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1360 Explorer.EXE 1360 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1456 wrote to memory of 1696 1456 108722FTTOO17_Advance TT.exe 26 PID 1456 wrote to memory of 1696 1456 108722FTTOO17_Advance TT.exe 26 PID 1456 wrote to memory of 1696 1456 108722FTTOO17_Advance TT.exe 26 PID 1456 wrote to memory of 1696 1456 108722FTTOO17_Advance TT.exe 26 PID 1696 wrote to memory of 1684 1696 jxybtdctyj.exe 27 PID 1696 wrote to memory of 1684 1696 jxybtdctyj.exe 27 PID 1696 wrote to memory of 1684 1696 jxybtdctyj.exe 27 PID 1696 wrote to memory of 1684 1696 jxybtdctyj.exe 27 PID 1696 wrote to memory of 1684 1696 jxybtdctyj.exe 27 PID 1360 wrote to memory of 2024 1360 Explorer.EXE 29 PID 1360 wrote to memory of 2024 1360 Explorer.EXE 29 PID 1360 wrote to memory of 2024 1360 Explorer.EXE 29 PID 1360 wrote to memory of 2024 1360 Explorer.EXE 29 PID 2024 wrote to memory of 984 2024 control.exe 32 PID 2024 wrote to memory of 984 2024 control.exe 32 PID 2024 wrote to memory of 984 2024 control.exe 32 PID 2024 wrote to memory of 984 2024 control.exe 32 PID 2024 wrote to memory of 984 2024 control.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\108722FTTOO17_Advance TT.exe"C:\Users\Admin\AppData\Local\Temp\108722FTTOO17_Advance TT.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\jxybtdctyj.exe"C:\Users\Admin\AppData\Local\Temp\jxybtdctyj.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\jxybtdctyj.exe"C:\Users\Admin\AppData\Local\Temp\jxybtdctyj.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1684
-
-
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:1680
-
-
C:\Windows\SysWOW64\control.exe"C:\Windows\SysWOW64\control.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:984
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD529231bce34fd03ba1db8ee339b1051e3
SHA1b6235dd3f7d15266004e196128947a2374bdece1
SHA25680b505f709a1596565857ae0bbee9f6089e353043ba6bbd40b02dc4afdfe8c96
SHA5120d93741365094039f7219f03085640dd8de31d03abf2a5d9dc4afde346cd267c9d914a88bfc16fda1470d2bfd3cbaccc3b0a4c01172ae45fa715457a58b0eea2
-
Filesize
7KB
MD51b3c05fa6e5175137fa0a1b7257ff606
SHA1810da138b5b6703899518a48cfabb14df6185782
SHA256e4e8f5fa19be282e3926e259265ec048ada69822b47622c0d1a26cb8652125a3
SHA512bed6e7088aa2b11e9d5817be2f3cdbab5d1eef3dd62db8cc45351bc60c280006503756d20f9567141aa4564787e18843e1c47e7467ae1a750f874d60b2210517
-
Filesize
7KB
MD51b3c05fa6e5175137fa0a1b7257ff606
SHA1810da138b5b6703899518a48cfabb14df6185782
SHA256e4e8f5fa19be282e3926e259265ec048ada69822b47622c0d1a26cb8652125a3
SHA512bed6e7088aa2b11e9d5817be2f3cdbab5d1eef3dd62db8cc45351bc60c280006503756d20f9567141aa4564787e18843e1c47e7467ae1a750f874d60b2210517
-
Filesize
7KB
MD51b3c05fa6e5175137fa0a1b7257ff606
SHA1810da138b5b6703899518a48cfabb14df6185782
SHA256e4e8f5fa19be282e3926e259265ec048ada69822b47622c0d1a26cb8652125a3
SHA512bed6e7088aa2b11e9d5817be2f3cdbab5d1eef3dd62db8cc45351bc60c280006503756d20f9567141aa4564787e18843e1c47e7467ae1a750f874d60b2210517
-
Filesize
185KB
MD55d307f59a0a8c63fd7384058eaf68dbe
SHA1e41e48332b4c1f770d89e3636266030288730624
SHA2565b80d85079a29aba8c30f1eb794bb31588cf11a2829c208236cc80df3f67bbc2
SHA512ebbe24d2e35c8ec1f6c6061e68fdb2e252c12b4ebfa3d6e45cd5a5a3862dbf515a090aea40ec7d1fba4c7364f456093e438045b773dfa7139257511074e3f48f
-
Filesize
7KB
MD51b3c05fa6e5175137fa0a1b7257ff606
SHA1810da138b5b6703899518a48cfabb14df6185782
SHA256e4e8f5fa19be282e3926e259265ec048ada69822b47622c0d1a26cb8652125a3
SHA512bed6e7088aa2b11e9d5817be2f3cdbab5d1eef3dd62db8cc45351bc60c280006503756d20f9567141aa4564787e18843e1c47e7467ae1a750f874d60b2210517
-
Filesize
7KB
MD51b3c05fa6e5175137fa0a1b7257ff606
SHA1810da138b5b6703899518a48cfabb14df6185782
SHA256e4e8f5fa19be282e3926e259265ec048ada69822b47622c0d1a26cb8652125a3
SHA512bed6e7088aa2b11e9d5817be2f3cdbab5d1eef3dd62db8cc45351bc60c280006503756d20f9567141aa4564787e18843e1c47e7467ae1a750f874d60b2210517
-
Filesize
1.1MB
MD5f55e5766477de5997da50f12c9c74c91
SHA14dc98900a887be95411f07b9e597c57bdc7dbab3
SHA25690be88984ee60864256378c952d44b13d55ac032ab6a7b8c698885176bcece69
SHA512983417a297e68b58fbd1c07fed7a1697d249110a2c10644b2dc96e3facedd3fbfbcac6a7809631ffd62894f02cadd4d3e62022b9e5e026e5bf434f1eb1878f05