Analysis
-
max time kernel
226s -
max time network
311s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:35
Static task
static1
Behavioral task
behavioral1
Sample
image004.exe
Resource
win7-20221111-en
General
-
Target
image004.exe
-
Size
15KB
-
MD5
05a64724337efd906ee2b96271794fb0
-
SHA1
b4e5d9f568e75f03ec6d6162e7cccc5fb51f1dfa
-
SHA256
dfef95aace8bc4b84638abf73bdfb24e3108f8fef08ad6129546a2ffe9c13341
-
SHA512
08977076cb53c9b7770e3860debcea22246a2e05b5d9b6e0a4783dd4528aa6af511ea086ec628ccefac899afe0e9f9694d8e265380e529bf7e1ca6e9192b6b87
-
SSDEEP
192:bGbLYuZbHzxQMKek0LhkgSleWk8Lngcq2/4yTLzzcyrwzc5+45ZPw4d+U43P25:AkXv0LhQoWfgcq2wyDwySc5+c1h4+
Malware Config
Extracted
formbook
s2h0
aPAdsgRiM5x/yL/X5cm0VzOos18VCw==
dSikZMo3DX9YnT+x5r59
MuZXDW3373RVmozB4qxFB4TP
etxRTtBOmdLv9Ji3bO4a6w==
cV0TtnwKShHy
sMCRJpM3pLEzQGF7OA==
8/z1y5az+w6oJEvAnYJg
yStNFwgJB8qEsJ63zrBFB4TP
cTzYzR2KJdPl
XmERsrbQFFc8I6TW3/oJz61Zs18VCw==
kRd/feIxF5FObwVf1+Y=
OKPBaPCEyH0oM6Hn7oMSUso=
CgmzVibsv66DWPAUrXU4U8I=
sS1SCHE+uG6FD0TAnYJg
+KVTMo4N6VwErccB
lMaVXfE6YN3aeg==
YdgFnvPAI1QPrdAn34YUY8Gohu68JYOv
KzcRJLlCQHwbpOQqYoCB+Bp7yA==
wbtcD0JabN3m
vNfSa+yFzotDbAVf1+Y=
nt0O8HE/ewYrpFqNLw==
9GJ/MAsgfzAIyeIL
iXsowp/g5lUXLdUHrXU4U8I=
u3vpdnNvRjkTpFqNLw==
r1EB/GXr2EwpL2HAnYJg
6GwJoZEka2ZvewVf1+Y=
W3y5o4uPdnhZG320cWLW+3TTwPP2NA4zUg==
4vWFSlqhBf4njWi7YURw+Bp7yA==
U9P90sDDBVkvqFJc3rT74w==
ygvvxa4DfH7zIgM5Vu4=
qBjIQOvNELebbQ==
lhFCGQIYcx8Yek+yw5to
zcZxNUmZELebbQ==
vHkW0bd52oFbOfA=
GbUi0Toxp+uLEDptk5CEOBSAqLYNMQE=
wOIFGnzxvjkIyeIL
ZCvTTP86Jw==
2on9txa1/AMGpFqNLw==
t2nlpbYHOi4p/lx2b2Fi+Bp7yA==
ELloYrFvrS4uhGGJpUbeOaz4BTaur7Oq
XCV3TzZZoiMkVL4D
P+1nHG4Gbzz7KQMDD++g8CRyps/b
dONOk3TkvXT1Geg=
yzlqOLt6tS0THFaR+Ixm
FOaDas1XjTPM26Dqj1lw+Bp7yA==
2sZwE/gye3T1Geg=
UUP3mXyOQgGLaA==
uvUYDhIpGiU4Q/sVoHU4U8I=
7JtOL3gCZS7NyXiLpV/BQ8c=
Q4GrtLu7wHoD3VCFbO4a6w==
ZnVNMo8eF5x+z9ViWyvmP8o=
gULr+lcNdSwIyeIL
VWETrHE9EAsHpFqNLw==
Ltk94SrLViU2OfU=
E8V2WrJI1ZXkZFh4OA==
5yRIMgDX3p9KbQVf1+Y=
j5WKlobNDQYDpFqNLw==
XZHLsHhrrADjsCx6bO4a6w==
DQa1f5LrMScQpFqNLw==
1xJ7Jo9RiTU=
w3US+oAcEpFZdQVf1+Y=
BPv3BBwyH/6sPnq1yalFB4TP
SIBcBuEp2Maxcg==
kXReotqKJdPl
lenderark.com
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
image004.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Control Panel\International\Geo\Nation image004.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
image004.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Gjzsxrkx = "\"C:\\Users\\Admin\\AppData\\Roaming\\Rnflpyebj\\Gjzsxrkx.exe\"" image004.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
image004.exeimage004.exehelp.exedescription pid process target process PID 1288 set thread context of 432 1288 image004.exe image004.exe PID 432 set thread context of 1212 432 image004.exe Explorer.EXE PID 432 set thread context of 1212 432 image004.exe Explorer.EXE PID 924 set thread context of 1212 924 help.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
help.exedescription ioc process Key created \Registry\User\S-1-5-21-1214520366-621468234-4062160515-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 help.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
powershell.exeimage004.exehelp.exepid process 820 powershell.exe 432 image004.exe 432 image004.exe 432 image004.exe 432 image004.exe 432 image004.exe 924 help.exe 924 help.exe 924 help.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 1212 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
image004.exehelp.exepid process 432 image004.exe 432 image004.exe 432 image004.exe 432 image004.exe 924 help.exe 924 help.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
image004.exepowershell.exeimage004.exehelp.exedescription pid process Token: SeDebugPrivilege 1288 image004.exe Token: SeDebugPrivilege 820 powershell.exe Token: SeDebugPrivilege 432 image004.exe Token: SeDebugPrivilege 924 help.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
image004.exeimage004.exedescription pid process target process PID 1288 wrote to memory of 820 1288 image004.exe powershell.exe PID 1288 wrote to memory of 820 1288 image004.exe powershell.exe PID 1288 wrote to memory of 820 1288 image004.exe powershell.exe PID 1288 wrote to memory of 820 1288 image004.exe powershell.exe PID 1288 wrote to memory of 432 1288 image004.exe image004.exe PID 1288 wrote to memory of 432 1288 image004.exe image004.exe PID 1288 wrote to memory of 432 1288 image004.exe image004.exe PID 1288 wrote to memory of 432 1288 image004.exe image004.exe PID 1288 wrote to memory of 432 1288 image004.exe image004.exe PID 1288 wrote to memory of 432 1288 image004.exe image004.exe PID 1288 wrote to memory of 432 1288 image004.exe image004.exe PID 432 wrote to memory of 924 432 image004.exe help.exe PID 432 wrote to memory of 924 432 image004.exe help.exe PID 432 wrote to memory of 924 432 image004.exe help.exe PID 432 wrote to memory of 924 432 image004.exe help.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\image004.exe"C:\Users\Admin\AppData\Local\Temp\image004.exe"2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANQAxAA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:820 -
C:\Users\Admin\AppData\Local\Temp\image004.exeC:\Users\Admin\AppData\Local\Temp\image004.exe3⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"4⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:924