Analysis
-
max time kernel
194s -
max time network
210s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 09:35
Static task
static1
Behavioral task
behavioral1
Sample
RCY-ENG-SPA-44-22-SPARES.exe
Resource
win7-20221111-en
General
-
Target
RCY-ENG-SPA-44-22-SPARES.exe
-
Size
566KB
-
MD5
6a884bb90de45f882b333131a56b30d3
-
SHA1
2bb5a01be489174666024a97573c4a725415ceef
-
SHA256
4d19688eba48474ab160de7ebf85fa55f2f2fc50f678ce822f8ede4beaf427cc
-
SHA512
e7ad8ad36ddd750efddb400c134d30dc90b47974860ea0248464245520aae67f4b14a94b980b43323051c0e84a9149ac760ae83b39c8ac0cac24eb1c2a7f8f24
-
SSDEEP
12288:G1str70ixogYv28Q05rjBKS+r9AH0Ue2:Gir9ulvLLRwqH0P2
Malware Config
Extracted
formbook
ermr
ErOK6LFCgNIAlQmH54oaYOL/CN29Z78=
qNSdDhu/PT/1fgafDagiCSZH1SY=
wLpPOAkYS8EABl3pHGc4hNT/Q1sHBrU=
jSxRvptHkeTGl7PT0SEmaZmjqzanuA==
b91oL+2wCcpyhnd6yvF6Pg==
mr81yp1/qqZX
hy7Xsz/PU/LWHMcGL4UYJx9n3A==
KlwrHt1gouPaXaWhoQ==
ng8M320IRJL9Ptw=
8GQbOXuaWxvKnNM=
XndOL7E5sNpVUNty4d/a
rryPBBC8PybYb+2h2MF3FHGL
kEoeyERSVCYO0g==
5/P+SBDby5hO
1fYXc30/h9W7iO17
34X+YKR+wRFE
8ir/X2MlVByh5lQ1ow8=
u9ikm2UMZ7J7hpCYow==
FLI+c3clp1BNDjVAfvC2Dnw=
t21Erq8/r09wAzAJTAH3Ng==
VAg3gU1KH9uW3YIPAgc=
Gjlc09d6qurdLePSLZktDmGA1A==
MMraOD3ve5odaf+03cB3FHGL
mLRTTAycMcrHgomShQHVwfFKkGQaehvF
fpab65mlchvKnNM=
M6jUQU0omipqaUNXyvF6Pg==
S/XrNQGVvwUsSnKFyvF6Pg==
LeC0GeF2zvCosNtMx5RltjCD
Y+IGYC/XHS63wIus5n08ADN2qzanuA==
3tJus7Rc6OtWnx9y4d/a
4uSOYiXhGxumZcTLuA==
5PyP2thOiIucXaWhoQ==
6978Rw3FNTibYVQ1ow8=
3Ah90lcSVCYO0g==
V/UQWRsOOQjDye9m0cLQ
yRXcMfySzTmEhddhqljeGH8=
vWuKFZKZ48E=
8+UEda631IpZ
LUofBqVNdT/v+MXiEWm90Ape3g==
NCi29RHdDYd7hso=
i36jBdNko/HyUKg1eWYgJx9n3A==
vdblMhHYSkgDmBly4d/a
oQmZH6K31IpZ
fCBHqaFGx9OUMMuBr5GWDXXY5DAT
FDXweHcHVCYO0g==
qSQd9bd7BQavQ9NbcUT+O6e4OGsaehvF
vN98englU4HHzqi36ju/91SJ
prTUIBi6MhiXZFQ1ow8=
w008jVXdCYd7hso=
p1kghFnjD9iADog5cVDmvrDiTjk=
xLjHJFYDQL+ysdk=
6tiR9MZa9xSMXVQ1ow8=
WMzXJPGcyIrP2g==
SeI4PsQ+N/O0iMs=
+4o0lKRDsz+RUqpoBvt3FHGL
AHQG4ZsybzCo8ZlBs1jeGH8=
kIgR46ls4wiGUJZLtFjeGH8=
b/fmPTHIRhvKnNM=
lTL5XnA4eKLb4snpHXt2s/MaSVsHBrU=
psOQcAKjHxyFw0vIwrZ3FHGL
F806xNnby5hO
7t72ZXkhmSAc8xLYD4J2XXc=
Ihmk3OR96/2HSbdi
ea/NKy3VVcx7hpCYow==
ifair.ltd
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
RCY-ENG-SPA-44-22-SPARES.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Control Panel\International\Geo\Nation RCY-ENG-SPA-44-22-SPARES.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
netsh.exedescription ioc process Key created \Registry\Machine\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run netsh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\I8TPYBG0XJN = "C:\\Program Files (x86)\\Xmvkdxxo\\04iijrp-.exe" netsh.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
RCY-ENG-SPA-44-22-SPARES.exeRCY-ENG-SPA-44-22-SPARES.exenetsh.exedescription pid process target process PID 456 set thread context of 4972 456 RCY-ENG-SPA-44-22-SPARES.exe RCY-ENG-SPA-44-22-SPARES.exe PID 4972 set thread context of 2380 4972 RCY-ENG-SPA-44-22-SPARES.exe Explorer.EXE PID 2800 set thread context of 2380 2800 netsh.exe Explorer.EXE -
Drops file in Program Files directory 1 IoCs
Processes:
netsh.exedescription ioc process File opened for modification C:\Program Files (x86)\Xmvkdxxo\04iijrp-.exe netsh.exe -
Processes:
netsh.exedescription ioc process Key created \Registry\User\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 netsh.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
Processes:
RCY-ENG-SPA-44-22-SPARES.exenetsh.exepid process 4972 RCY-ENG-SPA-44-22-SPARES.exe 4972 RCY-ENG-SPA-44-22-SPARES.exe 4972 RCY-ENG-SPA-44-22-SPARES.exe 4972 RCY-ENG-SPA-44-22-SPARES.exe 4972 RCY-ENG-SPA-44-22-SPARES.exe 4972 RCY-ENG-SPA-44-22-SPARES.exe 4972 RCY-ENG-SPA-44-22-SPARES.exe 4972 RCY-ENG-SPA-44-22-SPARES.exe 2800 netsh.exe 2800 netsh.exe 2800 netsh.exe 2800 netsh.exe 2800 netsh.exe 2800 netsh.exe 2800 netsh.exe 2800 netsh.exe 2800 netsh.exe 2800 netsh.exe 2800 netsh.exe 2800 netsh.exe 2800 netsh.exe 2800 netsh.exe 2800 netsh.exe 2800 netsh.exe 2800 netsh.exe 2800 netsh.exe 2800 netsh.exe 2800 netsh.exe 2800 netsh.exe 2800 netsh.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 2380 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
RCY-ENG-SPA-44-22-SPARES.exenetsh.exepid process 4972 RCY-ENG-SPA-44-22-SPARES.exe 4972 RCY-ENG-SPA-44-22-SPARES.exe 4972 RCY-ENG-SPA-44-22-SPARES.exe 2800 netsh.exe 2800 netsh.exe 2800 netsh.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
RCY-ENG-SPA-44-22-SPARES.exenetsh.exedescription pid process Token: SeDebugPrivilege 4972 RCY-ENG-SPA-44-22-SPARES.exe Token: SeDebugPrivilege 2800 netsh.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
RCY-ENG-SPA-44-22-SPARES.exeExplorer.EXEnetsh.exedescription pid process target process PID 456 wrote to memory of 4972 456 RCY-ENG-SPA-44-22-SPARES.exe RCY-ENG-SPA-44-22-SPARES.exe PID 456 wrote to memory of 4972 456 RCY-ENG-SPA-44-22-SPARES.exe RCY-ENG-SPA-44-22-SPARES.exe PID 456 wrote to memory of 4972 456 RCY-ENG-SPA-44-22-SPARES.exe RCY-ENG-SPA-44-22-SPARES.exe PID 456 wrote to memory of 4972 456 RCY-ENG-SPA-44-22-SPARES.exe RCY-ENG-SPA-44-22-SPARES.exe PID 456 wrote to memory of 4972 456 RCY-ENG-SPA-44-22-SPARES.exe RCY-ENG-SPA-44-22-SPARES.exe PID 456 wrote to memory of 4972 456 RCY-ENG-SPA-44-22-SPARES.exe RCY-ENG-SPA-44-22-SPARES.exe PID 2380 wrote to memory of 2800 2380 Explorer.EXE netsh.exe PID 2380 wrote to memory of 2800 2380 Explorer.EXE netsh.exe PID 2380 wrote to memory of 2800 2380 Explorer.EXE netsh.exe PID 2800 wrote to memory of 1852 2800 netsh.exe cmd.exe PID 2800 wrote to memory of 1852 2800 netsh.exe cmd.exe PID 2800 wrote to memory of 1852 2800 netsh.exe cmd.exe PID 2800 wrote to memory of 812 2800 netsh.exe Firefox.exe PID 2800 wrote to memory of 812 2800 netsh.exe Firefox.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\RCY-ENG-SPA-44-22-SPARES.exe"C:\Users\Admin\AppData\Local\Temp\RCY-ENG-SPA-44-22-SPARES.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Users\Admin\AppData\Local\Temp\RCY-ENG-SPA-44-22-SPARES.exe"C:\Users\Admin\AppData\Local\Temp\RCY-ENG-SPA-44-22-SPARES.exe"3⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4972 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\SysWOW64\netsh.exe"2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\RCY-ENG-SPA-44-22-SPARES.exe"3⤵PID:1852
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:812