Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 09:35
Static task
static1
Behavioral task
behavioral1
Sample
image004.exe
Resource
win7-20221111-en
General
-
Target
image004.exe
-
Size
15KB
-
MD5
05a64724337efd906ee2b96271794fb0
-
SHA1
b4e5d9f568e75f03ec6d6162e7cccc5fb51f1dfa
-
SHA256
dfef95aace8bc4b84638abf73bdfb24e3108f8fef08ad6129546a2ffe9c13341
-
SHA512
08977076cb53c9b7770e3860debcea22246a2e05b5d9b6e0a4783dd4528aa6af511ea086ec628ccefac899afe0e9f9694d8e265380e529bf7e1ca6e9192b6b87
-
SSDEEP
192:bGbLYuZbHzxQMKek0LhkgSleWk8Lngcq2/4yTLzzcyrwzc5+45ZPw4d+U43P25:AkXv0LhQoWfgcq2wyDwySc5+c1h4+
Malware Config
Extracted
formbook
s2h0
aPAdsgRiM5x/yL/X5cm0VzOos18VCw==
dSikZMo3DX9YnT+x5r59
MuZXDW3373RVmozB4qxFB4TP
etxRTtBOmdLv9Ji3bO4a6w==
cV0TtnwKShHy
sMCRJpM3pLEzQGF7OA==
8/z1y5az+w6oJEvAnYJg
yStNFwgJB8qEsJ63zrBFB4TP
cTzYzR2KJdPl
XmERsrbQFFc8I6TW3/oJz61Zs18VCw==
kRd/feIxF5FObwVf1+Y=
OKPBaPCEyH0oM6Hn7oMSUso=
CgmzVibsv66DWPAUrXU4U8I=
sS1SCHE+uG6FD0TAnYJg
+KVTMo4N6VwErccB
lMaVXfE6YN3aeg==
YdgFnvPAI1QPrdAn34YUY8Gohu68JYOv
KzcRJLlCQHwbpOQqYoCB+Bp7yA==
wbtcD0JabN3m
vNfSa+yFzotDbAVf1+Y=
nt0O8HE/ewYrpFqNLw==
9GJ/MAsgfzAIyeIL
iXsowp/g5lUXLdUHrXU4U8I=
u3vpdnNvRjkTpFqNLw==
r1EB/GXr2EwpL2HAnYJg
6GwJoZEka2ZvewVf1+Y=
W3y5o4uPdnhZG320cWLW+3TTwPP2NA4zUg==
4vWFSlqhBf4njWi7YURw+Bp7yA==
U9P90sDDBVkvqFJc3rT74w==
ygvvxa4DfH7zIgM5Vu4=
qBjIQOvNELebbQ==
lhFCGQIYcx8Yek+yw5to
zcZxNUmZELebbQ==
vHkW0bd52oFbOfA=
GbUi0Toxp+uLEDptk5CEOBSAqLYNMQE=
wOIFGnzxvjkIyeIL
ZCvTTP86Jw==
2on9txa1/AMGpFqNLw==
t2nlpbYHOi4p/lx2b2Fi+Bp7yA==
ELloYrFvrS4uhGGJpUbeOaz4BTaur7Oq
XCV3TzZZoiMkVL4D
P+1nHG4Gbzz7KQMDD++g8CRyps/b
dONOk3TkvXT1Geg=
yzlqOLt6tS0THFaR+Ixm
FOaDas1XjTPM26Dqj1lw+Bp7yA==
2sZwE/gye3T1Geg=
UUP3mXyOQgGLaA==
uvUYDhIpGiU4Q/sVoHU4U8I=
7JtOL3gCZS7NyXiLpV/BQ8c=
Q4GrtLu7wHoD3VCFbO4a6w==
ZnVNMo8eF5x+z9ViWyvmP8o=
gULr+lcNdSwIyeIL
VWETrHE9EAsHpFqNLw==
Ltk94SrLViU2OfU=
E8V2WrJI1ZXkZFh4OA==
5yRIMgDX3p9KbQVf1+Y=
j5WKlobNDQYDpFqNLw==
XZHLsHhrrADjsCx6bO4a6w==
DQa1f5LrMScQpFqNLw==
1xJ7Jo9RiTU=
w3US+oAcEpFZdQVf1+Y=
BPv3BBwyH/6sPnq1yalFB4TP
SIBcBuEp2Maxcg==
kXReotqKJdPl
lenderark.com
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
image004.exeimage004.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation image004.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation image004.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
image004.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Gjzsxrkx = "\"C:\\Users\\Admin\\AppData\\Roaming\\Rnflpyebj\\Gjzsxrkx.exe\"" image004.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
image004.exeimage004.exeWWAHost.exedescription pid process target process PID 3376 set thread context of 2564 3376 image004.exe image004.exe PID 2564 set thread context of 3064 2564 image004.exe Explorer.EXE PID 1512 set thread context of 3064 1512 WWAHost.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
WWAHost.exedescription ioc process Key created \Registry\User\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 WWAHost.exe -
Suspicious behavior: EnumeratesProcesses 40 IoCs
Processes:
powershell.exeimage004.exeWWAHost.exepid process 3916 powershell.exe 3916 powershell.exe 2564 image004.exe 2564 image004.exe 2564 image004.exe 2564 image004.exe 2564 image004.exe 2564 image004.exe 2564 image004.exe 2564 image004.exe 1512 WWAHost.exe 1512 WWAHost.exe 1512 WWAHost.exe 1512 WWAHost.exe 1512 WWAHost.exe 1512 WWAHost.exe 1512 WWAHost.exe 1512 WWAHost.exe 1512 WWAHost.exe 1512 WWAHost.exe 1512 WWAHost.exe 1512 WWAHost.exe 1512 WWAHost.exe 1512 WWAHost.exe 1512 WWAHost.exe 1512 WWAHost.exe 1512 WWAHost.exe 1512 WWAHost.exe 1512 WWAHost.exe 1512 WWAHost.exe 1512 WWAHost.exe 1512 WWAHost.exe 1512 WWAHost.exe 1512 WWAHost.exe 1512 WWAHost.exe 1512 WWAHost.exe 1512 WWAHost.exe 1512 WWAHost.exe 1512 WWAHost.exe 1512 WWAHost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3064 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
Processes:
image004.exeWWAHost.exepid process 2564 image004.exe 2564 image004.exe 2564 image004.exe 1512 WWAHost.exe 1512 WWAHost.exe 1512 WWAHost.exe 1512 WWAHost.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
image004.exepowershell.exeimage004.exeWWAHost.exedescription pid process Token: SeDebugPrivilege 3376 image004.exe Token: SeDebugPrivilege 3916 powershell.exe Token: SeDebugPrivilege 2564 image004.exe Token: SeDebugPrivilege 1512 WWAHost.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
image004.exeExplorer.EXEWWAHost.exedescription pid process target process PID 3376 wrote to memory of 3916 3376 image004.exe powershell.exe PID 3376 wrote to memory of 3916 3376 image004.exe powershell.exe PID 3376 wrote to memory of 3916 3376 image004.exe powershell.exe PID 3376 wrote to memory of 2564 3376 image004.exe image004.exe PID 3376 wrote to memory of 2564 3376 image004.exe image004.exe PID 3376 wrote to memory of 2564 3376 image004.exe image004.exe PID 3376 wrote to memory of 2564 3376 image004.exe image004.exe PID 3376 wrote to memory of 2564 3376 image004.exe image004.exe PID 3376 wrote to memory of 2564 3376 image004.exe image004.exe PID 3064 wrote to memory of 1512 3064 Explorer.EXE WWAHost.exe PID 3064 wrote to memory of 1512 3064 Explorer.EXE WWAHost.exe PID 3064 wrote to memory of 1512 3064 Explorer.EXE WWAHost.exe PID 1512 wrote to memory of 1152 1512 WWAHost.exe Firefox.exe PID 1512 wrote to memory of 1152 1512 WWAHost.exe Firefox.exe PID 1512 wrote to memory of 1152 1512 WWAHost.exe Firefox.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\image004.exe"C:\Users\Admin\AppData\Local\Temp\image004.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANQAxAA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3916 -
C:\Users\Admin\AppData\Local\Temp\image004.exeC:\Users\Admin\AppData\Local\Temp\image004.exe3⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2564 -
C:\Windows\SysWOW64\WWAHost.exe"C:\Windows\SysWOW64\WWAHost.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1152