Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2022 13:51
Static task
static1
Behavioral task
behavioral1
Sample
dc4fbd4c5afc724315acba1b784d042c.exe
Resource
win7-20220812-en
General
-
Target
dc4fbd4c5afc724315acba1b784d042c.exe
-
Size
725KB
-
MD5
dc4fbd4c5afc724315acba1b784d042c
-
SHA1
2e1cdca264a4e29571079c2c2a2b36d899812ec8
-
SHA256
5399fd8bbc8978896233268aa24421cd3d206c606d11bcf64548e8a628be6fc3
-
SHA512
a2371f0158f41e0bdc651a81e299292f9a73b233074b6ed829d2caab3fedf1ba657a57b890c44b89ed1a0c02f5e38fb14ddd13da6069ed864e1966526bd63c1e
-
SSDEEP
12288:4i/Pag+5072eFlCk2D3U6xMrDpm6UssNkIhGM/:vF+iquCxnxMrNlU5kq
Malware Config
Extracted
formbook
oc5e
ODVenWNCx27xmAQc
4XFONwe0gAX06UZqkA==
AD3Pph7KlPo7lQ==
UR3vF7OcYyyilfE=
dYHbq1q35dWIhecnJZ3aFJEGlDwKDoVM
ZjGUfBForJkYdek=
eHXQr1tI+ySegwM4iBtUkk4KNg0FYMk=
4a8FTkEp+vCjm+4=
aCWI49e/KcsQ8E+EU4GeShabmBah
E6V1p68mgTWfSkhOiA==
iWj9y0Sg3MU2lw==
oHsJ45Ot5v14oRA8Ut6Tqxw=
trdTtZNlNF+VuwQU
tEUYVnll1L4ojA==
Es81jGdN1YW3luwCr3T+WFk0wA==
g5eqC/tlYmtjxxJjnZM4
lFju1HzZ7iWVxxEe
4KE7NhR0YoW9Wllpmw==
qWVEpocCITjplgcphg==
FuCHb/9aumc7
9solfHRs+358btT+ICFPiAc=
tVMvI9pSsj900AspyDLMdBI=
2K0xKwVpUl3N51N/mQ==
h4+eAvNVPE6J90aG7p00iINg2A==
MDtVx804KSsdmQ1VHVl7omC63PA=
oGxIcxsO1AcFY5+lIxrYGMsCW5RM4A==
BNw4jWlRz0C9nfA=
Rxtz4+DGO3Cnj/I=
vYeUbhaGWnOrGXOc/I6w8dHQA2RZ6g==
2aB4v3ttPEVsYpyvEE/CUw==
56vPAfvrZ+3fxRUhVU1mnvA8oAz6LY1R
g02qFCMBbb6yG4SW5ZoKKuaDlEP4SCRE
T4dx2vRagxeH6EHDuzazUQ==
TymyrnpzOnbu5CRdq3DrCYic
nGYJPUKWvWERK32jre4Gm1CK
ITrT1ZSuCL0971aGng==
5/FaSxx52YeLetEABlOFy00HAJCEkIiYlQ==
uq+coqeUamvplgcphg==
JOv48bAqCSmVxxEe
qWXG0XZmMF/XveJa77Qw
oKQQ/80sLTFhit8H
zuHxUEel7GWd9GuEQnh+lmC63PA=
bgNcmKOZEI54cqA4ICFPiAc=
ubtLqo56AYN0dbjgQP22bijjA2RZ6g==
xF83cWLHx/xDnwpAWd6Tqxw=
hxdrR+fYNLvryzWzNDXDRA==
12mD5kSd3MU2lw==
QhaqqXJjHUhOqwQVS74uiINg2A==
wVerfBoN2QgJZcTsQMU3iINg2A==
xsQeXn7h6hA/8hpJkw==
n6s6m0JjPT5sYGq6bm8l
/sXNDCgBlNocAFuQmQ==
Zd0DzEkqIDcx
tDsQ6poE6K2pjew=
iZeg/t5RdZgO51iE12GEiINg2A==
q3vY15TzAwsAauVjnZM4
gUbs4XPeLzk0
l2vzNz0b6/MfDnnRLGOFoRg=
CM7u4bqabWrplgcphg==
mq81dD4nrVuQet0L41pGgQU=
dXeUolDOIdWJvg84iA==
Bs6w8L/mKS0s
Hdu7KDSnnsb6Ysslv6OOMPl/pUC4
7e7ey5Bt46jtA1lplw==
precisionride.com
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
dc4fbd4c5afc724315acba1b784d042c.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation dc4fbd4c5afc724315acba1b784d042c.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
dc4fbd4c5afc724315acba1b784d042c.exeMSBuild.execolorcpl.exedescription pid Process procid_target PID 4572 set thread context of 1068 4572 dc4fbd4c5afc724315acba1b784d042c.exe 92 PID 1068 set thread context of 2228 1068 MSBuild.exe 54 PID 4240 set thread context of 2228 4240 colorcpl.exe 54 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Processes:
colorcpl.exedescription ioc Process Key created \Registry\User\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 colorcpl.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
Processes:
dc4fbd4c5afc724315acba1b784d042c.exepowershell.exeMSBuild.execolorcpl.exepid Process 4572 dc4fbd4c5afc724315acba1b784d042c.exe 4572 dc4fbd4c5afc724315acba1b784d042c.exe 820 powershell.exe 1068 MSBuild.exe 1068 MSBuild.exe 1068 MSBuild.exe 1068 MSBuild.exe 1068 MSBuild.exe 1068 MSBuild.exe 1068 MSBuild.exe 1068 MSBuild.exe 820 powershell.exe 4240 colorcpl.exe 4240 colorcpl.exe 4240 colorcpl.exe 4240 colorcpl.exe 4240 colorcpl.exe 4240 colorcpl.exe 4240 colorcpl.exe 4240 colorcpl.exe 4240 colorcpl.exe 4240 colorcpl.exe 4240 colorcpl.exe 4240 colorcpl.exe 4240 colorcpl.exe 4240 colorcpl.exe 4240 colorcpl.exe 4240 colorcpl.exe 4240 colorcpl.exe 4240 colorcpl.exe 4240 colorcpl.exe 4240 colorcpl.exe 4240 colorcpl.exe 4240 colorcpl.exe 4240 colorcpl.exe 4240 colorcpl.exe 4240 colorcpl.exe 4240 colorcpl.exe 4240 colorcpl.exe 4240 colorcpl.exe 4240 colorcpl.exe 4240 colorcpl.exe 4240 colorcpl.exe 4240 colorcpl.exe 4240 colorcpl.exe 4240 colorcpl.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid Process 2228 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
Processes:
MSBuild.execolorcpl.exepid Process 1068 MSBuild.exe 1068 MSBuild.exe 1068 MSBuild.exe 4240 colorcpl.exe 4240 colorcpl.exe 4240 colorcpl.exe 4240 colorcpl.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
dc4fbd4c5afc724315acba1b784d042c.exepowershell.exeMSBuild.execolorcpl.exeExplorer.EXEdescription pid Process Token: SeDebugPrivilege 4572 dc4fbd4c5afc724315acba1b784d042c.exe Token: SeDebugPrivilege 820 powershell.exe Token: SeDebugPrivilege 1068 MSBuild.exe Token: SeDebugPrivilege 4240 colorcpl.exe Token: SeShutdownPrivilege 2228 Explorer.EXE Token: SeCreatePagefilePrivilege 2228 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
dc4fbd4c5afc724315acba1b784d042c.exeExplorer.EXEcolorcpl.exedescription pid Process procid_target PID 4572 wrote to memory of 820 4572 dc4fbd4c5afc724315acba1b784d042c.exe 88 PID 4572 wrote to memory of 820 4572 dc4fbd4c5afc724315acba1b784d042c.exe 88 PID 4572 wrote to memory of 820 4572 dc4fbd4c5afc724315acba1b784d042c.exe 88 PID 4572 wrote to memory of 3564 4572 dc4fbd4c5afc724315acba1b784d042c.exe 90 PID 4572 wrote to memory of 3564 4572 dc4fbd4c5afc724315acba1b784d042c.exe 90 PID 4572 wrote to memory of 3564 4572 dc4fbd4c5afc724315acba1b784d042c.exe 90 PID 4572 wrote to memory of 1068 4572 dc4fbd4c5afc724315acba1b784d042c.exe 92 PID 4572 wrote to memory of 1068 4572 dc4fbd4c5afc724315acba1b784d042c.exe 92 PID 4572 wrote to memory of 1068 4572 dc4fbd4c5afc724315acba1b784d042c.exe 92 PID 4572 wrote to memory of 1068 4572 dc4fbd4c5afc724315acba1b784d042c.exe 92 PID 4572 wrote to memory of 1068 4572 dc4fbd4c5afc724315acba1b784d042c.exe 92 PID 4572 wrote to memory of 1068 4572 dc4fbd4c5afc724315acba1b784d042c.exe 92 PID 2228 wrote to memory of 4240 2228 Explorer.EXE 93 PID 2228 wrote to memory of 4240 2228 Explorer.EXE 93 PID 2228 wrote to memory of 4240 2228 Explorer.EXE 93 PID 4240 wrote to memory of 4128 4240 colorcpl.exe 94 PID 4240 wrote to memory of 4128 4240 colorcpl.exe 94 PID 4240 wrote to memory of 4128 4240 colorcpl.exe 94
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\dc4fbd4c5afc724315acba1b784d042c.exe"C:\Users\Admin\AppData\Local\Temp\dc4fbd4c5afc724315acba1b784d042c.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\EJiyRa.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:820
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\EJiyRa" /XML "C:\Users\Admin\AppData\Local\Temp\tmp7714.tmp"3⤵
- Creates scheduled task(s)
PID:3564
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1068
-
-
-
C:\Windows\SysWOW64\colorcpl.exe"C:\Windows\SysWOW64\colorcpl.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:4128
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD523ab34f2929dc2e2de7eb997234bf2c4
SHA10a1b1d341fd51ceb611a9eb9c7202c85ed1e99b1
SHA2569d3ff5228a20adb102d3d6ef7bdbedd107fb7b28ecc4867eb92f2dfa792eb39c
SHA5128472aefc0c66f87b13fc424dd38bdcd32378ccc94188b7e8f9c7eb34ad9dfc1cd46b64c879b99225513c957cf3c439cf54e20ca0780ae97ab235b6a3266d22a3