Analysis
-
max time kernel
126s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
16-11-2022 09:18
Static task
static1
Behavioral task
behavioral1
Sample
f4a2a8a7d1d2c7b26f4e54ca2612f71a.exe
Resource
win7-20220812-en
General
-
Target
f4a2a8a7d1d2c7b26f4e54ca2612f71a.exe
-
Size
1.2MB
-
MD5
f4a2a8a7d1d2c7b26f4e54ca2612f71a
-
SHA1
744fadee7a1e67bee2cf1a534a63483ab1d2e3f8
-
SHA256
9d5670638fac6e9e5670cd6985894e9b2fcf1fb334973e5e3424fb246f835e11
-
SHA512
4432c4f8cdfb4b36eb7f6b8794348bce1ecc06709ceb2a804998b1685d22f5f539134dc6e1df95b9834390a06ff8eb804f5bbd517522e6f4b0afa7374a4cd9c5
-
SSDEEP
24576:QolGO8/6YpXCGf+SK/ftRnMh9+bTLWdaVom4v7FM:Q0GL6YpZmSat5LWdNhM
Malware Config
Extracted
systembc
89.22.225.242:4193
195.2.93.22:4193
Extracted
vidar
55.7
1754
https://t.me/deadftx
https://www.ultimate-guitar.com/u/smbfupkuhrgc1
-
profile_id
1754
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
fofew gequa botovib moca loja faromemo sow nexonide hete.exedescription pid process target process PID 4188 created 2492 4188 fofew gequa botovib moca loja faromemo sow nexonide hete.exe taskhostw.exe -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
Processes:
fofew gequa botovib moca loja faromemo sow nexonide hete.exesvchost.exepid process 4188 fofew gequa botovib moca loja faromemo sow nexonide hete.exe 4768 svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
f4a2a8a7d1d2c7b26f4e54ca2612f71a.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation f4a2a8a7d1d2c7b26f4e54ca2612f71a.exe -
Loads dropped DLL 3 IoCs
Processes:
fofew gequa botovib moca loja faromemo sow nexonide hete.exesvchost.exepid process 4188 fofew gequa botovib moca loja faromemo sow nexonide hete.exe 4768 svchost.exe 4768 svchost.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
fofew gequa botovib moca loja faromemo sow nexonide hete.exedescription pid process target process PID 4188 set thread context of 3452 4188 fofew gequa botovib moca loja faromemo sow nexonide hete.exe ngentask.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 3052 timeout.exe -
Processes:
fofew gequa botovib moca loja faromemo sow nexonide hete.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B7AB3308D1EA4477BA1480125A6FBDA936490CBB\Blob = 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 fofew gequa botovib moca loja faromemo sow nexonide hete.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B7AB3308D1EA4477BA1480125A6FBDA936490CBB fofew gequa botovib moca loja faromemo sow nexonide hete.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 32 IoCs
Processes:
f4a2a8a7d1d2c7b26f4e54ca2612f71a.exefofew gequa botovib moca loja faromemo sow nexonide hete.exesvchost.exepid process 4432 f4a2a8a7d1d2c7b26f4e54ca2612f71a.exe 4432 f4a2a8a7d1d2c7b26f4e54ca2612f71a.exe 4432 f4a2a8a7d1d2c7b26f4e54ca2612f71a.exe 4432 f4a2a8a7d1d2c7b26f4e54ca2612f71a.exe 4432 f4a2a8a7d1d2c7b26f4e54ca2612f71a.exe 4432 f4a2a8a7d1d2c7b26f4e54ca2612f71a.exe 4432 f4a2a8a7d1d2c7b26f4e54ca2612f71a.exe 4432 f4a2a8a7d1d2c7b26f4e54ca2612f71a.exe 4432 f4a2a8a7d1d2c7b26f4e54ca2612f71a.exe 4432 f4a2a8a7d1d2c7b26f4e54ca2612f71a.exe 4188 fofew gequa botovib moca loja faromemo sow nexonide hete.exe 4188 fofew gequa botovib moca loja faromemo sow nexonide hete.exe 4188 fofew gequa botovib moca loja faromemo sow nexonide hete.exe 4188 fofew gequa botovib moca loja faromemo sow nexonide hete.exe 4188 fofew gequa botovib moca loja faromemo sow nexonide hete.exe 4188 fofew gequa botovib moca loja faromemo sow nexonide hete.exe 4188 fofew gequa botovib moca loja faromemo sow nexonide hete.exe 4188 fofew gequa botovib moca loja faromemo sow nexonide hete.exe 4188 fofew gequa botovib moca loja faromemo sow nexonide hete.exe 4188 fofew gequa botovib moca loja faromemo sow nexonide hete.exe 4188 fofew gequa botovib moca loja faromemo sow nexonide hete.exe 4188 fofew gequa botovib moca loja faromemo sow nexonide hete.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
f4a2a8a7d1d2c7b26f4e54ca2612f71a.execmd.exefofew gequa botovib moca loja faromemo sow nexonide hete.exedescription pid process target process PID 4432 wrote to memory of 2600 4432 f4a2a8a7d1d2c7b26f4e54ca2612f71a.exe schtasks.exe PID 4432 wrote to memory of 2600 4432 f4a2a8a7d1d2c7b26f4e54ca2612f71a.exe schtasks.exe PID 4432 wrote to memory of 2600 4432 f4a2a8a7d1d2c7b26f4e54ca2612f71a.exe schtasks.exe PID 4432 wrote to memory of 4188 4432 f4a2a8a7d1d2c7b26f4e54ca2612f71a.exe fofew gequa botovib moca loja faromemo sow nexonide hete.exe PID 4432 wrote to memory of 4188 4432 f4a2a8a7d1d2c7b26f4e54ca2612f71a.exe fofew gequa botovib moca loja faromemo sow nexonide hete.exe PID 4432 wrote to memory of 4188 4432 f4a2a8a7d1d2c7b26f4e54ca2612f71a.exe fofew gequa botovib moca loja faromemo sow nexonide hete.exe PID 4432 wrote to memory of 4308 4432 f4a2a8a7d1d2c7b26f4e54ca2612f71a.exe cmd.exe PID 4432 wrote to memory of 4308 4432 f4a2a8a7d1d2c7b26f4e54ca2612f71a.exe cmd.exe PID 4432 wrote to memory of 4308 4432 f4a2a8a7d1d2c7b26f4e54ca2612f71a.exe cmd.exe PID 4308 wrote to memory of 4148 4308 cmd.exe chcp.com PID 4308 wrote to memory of 4148 4308 cmd.exe chcp.com PID 4308 wrote to memory of 4148 4308 cmd.exe chcp.com PID 4308 wrote to memory of 1784 4308 cmd.exe PING.EXE PID 4308 wrote to memory of 1784 4308 cmd.exe PING.EXE PID 4308 wrote to memory of 1784 4308 cmd.exe PING.EXE PID 4188 wrote to memory of 3452 4188 fofew gequa botovib moca loja faromemo sow nexonide hete.exe ngentask.exe PID 4188 wrote to memory of 3452 4188 fofew gequa botovib moca loja faromemo sow nexonide hete.exe ngentask.exe PID 4188 wrote to memory of 3452 4188 fofew gequa botovib moca loja faromemo sow nexonide hete.exe ngentask.exe PID 4188 wrote to memory of 3452 4188 fofew gequa botovib moca loja faromemo sow nexonide hete.exe ngentask.exe PID 4188 wrote to memory of 3452 4188 fofew gequa botovib moca loja faromemo sow nexonide hete.exe ngentask.exe PID 4188 wrote to memory of 4768 4188 fofew gequa botovib moca loja faromemo sow nexonide hete.exe svchost.exe PID 4188 wrote to memory of 4768 4188 fofew gequa botovib moca loja faromemo sow nexonide hete.exe svchost.exe PID 4188 wrote to memory of 4768 4188 fofew gequa botovib moca loja faromemo sow nexonide hete.exe svchost.exe
Processes
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\svchost.exe" & exit3⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /t 64⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\f4a2a8a7d1d2c7b26f4e54ca2612f71a.exe"C:\Users\Admin\AppData\Local\Temp\f4a2a8a7d1d2c7b26f4e54ca2612f71a.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /tn COMSurrogate /f /sc onlogon /rl highest /tr "C:\Users\Admin\goxijag kaqu rabojer\fofew gequa botovib moca loja faromemo sow nexonide hete.exe"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\goxijag kaqu rabojer\fofew gequa botovib moca loja faromemo sow nexonide hete.exe"C:\Users\Admin\goxijag kaqu rabojer\fofew gequa botovib moca loja faromemo sow nexonide hete.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\f4a2a8a7d1d2c7b26f4e54ca2612f71a.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650013⤵
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\mozglue.dllFilesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
C:\ProgramData\nss3.dllFilesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
C:\Users\Admin\AppData\Local\Temp\advapi32.dllFilesize
428KB
MD54880886732471a6abbb919b2d9c94e03
SHA178d331eeff674b95bf5d9756a0da7c60b0dee7b4
SHA256c1f5411008304f15bcc5fa281bd9ee8eae70948f2a58db190290adaf259dcee0
SHA512b755b402d051d6ff777249ba5eb4754eeeb2a2c47baeb1d69dac3b7e67e88aa5ef83027a41fbfaf7e170cb2ec0f15065d8bb529f989fb15319d4c143b4900432
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeFilesize
1.8MB
MD5e716ffae131666d5e0e77e5d479b1e37
SHA142fea83d3a19beecb25d2c5bd46e547bb4a09319
SHA25632684b073e05d41b49611a2d49f25d4d53ca8182d5de134bc7a4924158bc577b
SHA512c559c52b40c5b593e0687d05c9ed54229b0eb62a517940caaecc6d09aa4d21bdc129552cfcd31509e4f5c35be069ee617457ce047460cc6a23270499ca14f75c
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeFilesize
1.8MB
MD5e716ffae131666d5e0e77e5d479b1e37
SHA142fea83d3a19beecb25d2c5bd46e547bb4a09319
SHA25632684b073e05d41b49611a2d49f25d4d53ca8182d5de134bc7a4924158bc577b
SHA512c559c52b40c5b593e0687d05c9ed54229b0eb62a517940caaecc6d09aa4d21bdc129552cfcd31509e4f5c35be069ee617457ce047460cc6a23270499ca14f75c
-
C:\Users\Admin\goxijag kaqu rabojer\fofew gequa botovib moca loja faromemo sow nexonide hete.exeFilesize
351.6MB
MD519c27d8d837e71ce5cdf09da138a913c
SHA1f8c0f5637d19f8b3860530c1ec93e3012f1ce150
SHA256830c3476080fa48c445feaa8ad458a0b633e32f5c773d2ba63f065df949c7c66
SHA51283d6594d71f220749d496dde88ae18df0d99b00eb36ab71081a21faacc1df1018cb6f0720a9a78c2afe0c25ecc83e4c703b750cd193e5f10b64a03b8211826fd
-
C:\Users\Admin\goxijag kaqu rabojer\fofew gequa botovib moca loja faromemo sow nexonide hete.exeFilesize
325.9MB
MD529db6e7a232c3a6c36e2e079721434e3
SHA1a29d1c10ed5c346a1a5c8bacd3aeebb9290b0b30
SHA2565ae5315f88f10587acd7e47757437e227adef49a876aa4a36b298eafb1294509
SHA512b76cba2db5e979e30ace9eb72acfde684009dfca07a6fcf90ceb8aab8c625f63d6ed0150082227a91c823e30e6e705bc6df96134eb57761f7a57909861dcedd0
-
memory/1784-143-0x0000000000000000-mapping.dmp
-
memory/2600-136-0x0000000000000000-mapping.dmp
-
memory/3052-195-0x0000000000000000-mapping.dmp
-
memory/3452-150-0x0000000000000000-mapping.dmp
-
memory/3452-155-0x0000000000400000-0x0000000000407000-memory.dmpFilesize
28KB
-
memory/3452-153-0x0000000000400000-0x0000000000407000-memory.dmpFilesize
28KB
-
memory/3452-151-0x0000000000400000-0x0000000000407000-memory.dmpFilesize
28KB
-
memory/4148-142-0x0000000000000000-mapping.dmp
-
memory/4188-144-0x0000000002F2D000-0x0000000003414000-memory.dmpFilesize
4.9MB
-
memory/4188-148-0x000000000F6D0000-0x000000000F71B000-memory.dmpFilesize
300KB
-
memory/4188-149-0x000000000F6D0000-0x000000000F71B000-memory.dmpFilesize
300KB
-
memory/4188-147-0x0000000002DDE000-0x0000000002ED4000-memory.dmpFilesize
984KB
-
memory/4188-146-0x0000000002F2D000-0x0000000003414000-memory.dmpFilesize
4.9MB
-
memory/4188-145-0x0000000002DDE000-0x0000000002ED4000-memory.dmpFilesize
984KB
-
memory/4188-137-0x0000000000000000-mapping.dmp
-
memory/4188-159-0x0000000002DDE000-0x0000000002ED4000-memory.dmpFilesize
984KB
-
memory/4308-140-0x0000000000000000-mapping.dmp
-
memory/4432-135-0x0000000002C92000-0x0000000002D88000-memory.dmpFilesize
984KB
-
memory/4432-132-0x000000000279E000-0x0000000002C85000-memory.dmpFilesize
4.9MB
-
memory/4432-133-0x0000000002C92000-0x0000000002D88000-memory.dmpFilesize
984KB
-
memory/4432-141-0x0000000002C92000-0x0000000002D88000-memory.dmpFilesize
984KB
-
memory/4432-134-0x000000000279E000-0x0000000002C85000-memory.dmpFilesize
4.9MB
-
memory/4768-167-0x000000000F9C0000-0x000000000FA1F000-memory.dmpFilesize
380KB
-
memory/4768-163-0x0000000002E00000-0x0000000002F24000-memory.dmpFilesize
1.1MB
-
memory/4768-165-0x000000000FA20000-0x000000000FD4A000-memory.dmpFilesize
3.2MB
-
memory/4768-166-0x000000000FA20000-0x000000000FD4A000-memory.dmpFilesize
3.2MB
-
memory/4768-157-0x0000000000000000-mapping.dmp
-
memory/4768-170-0x0000000061E00000-0x0000000061EF3000-memory.dmpFilesize
972KB
-
memory/4768-162-0x0000000002800000-0x0000000002DCB000-memory.dmpFilesize
5.8MB
-
memory/4768-164-0x0000000077100000-0x00000000772A3000-memory.dmpFilesize
1.6MB
-
memory/4768-191-0x0000000002800000-0x00000000029A3000-memory.dmpFilesize
1.6MB
-
memory/4768-193-0x0000000077100000-0x00000000772A3000-memory.dmpFilesize
1.6MB
-
memory/4768-192-0x0000000002E00000-0x0000000002F24000-memory.dmpFilesize
1.1MB
-
memory/4768-194-0x000000000FA20000-0x000000000FD4A000-memory.dmpFilesize
3.2MB
-
memory/4768-161-0x0000000077100000-0x00000000772A3000-memory.dmpFilesize
1.6MB
-
memory/4768-160-0x0000000002800000-0x0000000002DCB000-memory.dmpFilesize
5.8MB
-
memory/4772-190-0x0000000000000000-mapping.dmp