Analysis
-
max time kernel
152s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 15:17
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
General
-
Target
file.exe
-
Size
1.1MB
-
MD5
6a48cce91cb89eb4405f9ba2c2124cd6
-
SHA1
5de7e1fd1eac0078123e4c9b63f11ce6d0527152
-
SHA256
46c11187b0eeba2ad55a36d97fc897cd2612a4cdf491405826346092af6e261e
-
SHA512
bc95a9a76dd49db6669bf9ccb2acbf23db77fd4f774eca37483768ef87b6319c8525b6acdd67ceb82fad17fcfa52f6c445367aa525775a422095a5fa20d65d34
-
SSDEEP
24576:szq5gh/aw3XyilFIUM7jP9o71sURfUHvB32Dz:szqKh/d3Xy8FIUMvPIXfkU
Malware Config
Extracted
formbook
dcn0
ZVx68vDtAMBCwg==
oBMBvsNORkM/O/ox
Ff9pISWkm6eG4lByIspp
c2T42c6CIIF6B8xTxm9XzpVw
bvjhxRbnAC183w==
0lTttSNG4HUDNflyIspp
hPXFlstqiHA/O/ox
WLR+MeerxZ0cNn1ja+IQAYo=
IHRn4xXOVKi477zarG+ObSy7YJA=
Xhf3e+tdAC183w==
Xk0ZAezv2rWH
kngo+vBeSRN7AszNwam3Osmguuqc0MoC
a2Qp7a+E8fSw7LDjpnqEKjsRZA==
3zjy4E7+QM48wg==
YcCmqT3OUNAigVott2pBKiy7YJA=
4+SMeX1juat/5cZ1AZihcyy7YJA=
/+m7sro0OBTl3TMpCw==
i2ctEfe4//a64yklMsgS2J90
+loZ2QKGX0UWgpvErMs=
b9BNCnJWQJS8IfsR0uR3bCy7YJA=
9eiUYE0ynHE/O/ox
F2/75pOIYNg0hzOD99192J8=
Y1xOONdO105okfha33EZ2A==
qYZIIB+dfF0wp1nVWFz067hJ2/qoXEVeAA==
moQMzat7tfKyKPYs
aMZJI/NfUSSpPQUBJ8/11g==
QKMN15GjpHcpyA==
6+S1hTvphhFfoCdj6tw=
DPynhWcnZWho7a0p33EZ2A==
EXY//zDm7ej3Guwo
PSWxPYkk0SNioSdj6tw=
jv+tmhv1ySZloydj6tw=
P8GUV5BhNZflCCBBFg==
IQZ0PWog1lcVVkJYHg==
aOTCq/Cet6AdhSdj6tw=
OBzJrqYS+eac46nZo4aI84kWMEtH
kBzTkbI2LTo/O/ox
a8pwOrU/tyx93a/QrGBpXGQIfZI=
GWoC9K5Mx0GR34urFcDPyQ==
dGxKGM2FI4iAkTOD99192J8=
UqQv8Vkx7WzkCCBBFg==
NcBsPK+YmdZP0cyhY+Lrzw==
zcKbk5oK7NCgFOpa4tHv0g==
uIomFkUTzdWa
QkAF8NuWMZmnPjCFgJBa+Y1t
51w6Gw7c3NyY
IyDnsW89dXaMrAxotF8jGZc=
1s1RHCrCwI8PnVhMY+Lrzw==
zBnRazUUWCsrM5t0SEth
1z4R/XM98Wn3j1RMY+Lrzw==
h3b34yQL3cI8wg==
/+27PhUTzdWa
CO0jnOIoAC183w==
Cn8jz+pyZEfWCCBBFg==
jI4f4NnKFwoSUb4YbnkzePzLv+Sc0MoC
xZnrS1Y+5Sxv1g==
phjYsTTGW8zAMydj6tw=
v7JcJyW3x64phzOD99192J8=
tBJ+Uh3sJxYqbyvrfF6BKjsRZA==
xRTxyfuTgMhGxg==
6ceNTfir2qmQHtxWwqIrI8GQ7h/Te/A2CA==
00gVx7d5/U5soCdj6tw=
Jgvgt58H8MFLfBzTp1VZXCe2ZYg=
1NKRY1QTzdWa
ahmedo.ch
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
file.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation file.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
file.exefile.exewlanext.exedescription pid process target process PID 4960 set thread context of 3432 4960 file.exe file.exe PID 3432 set thread context of 3092 3432 file.exe Explorer.EXE PID 2844 set thread context of 3092 2844 wlanext.exe Explorer.EXE -
Processes:
wlanext.exedescription ioc process Key created \Registry\User\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 wlanext.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
Processes:
file.exefile.exewlanext.exepid process 4960 file.exe 4960 file.exe 3432 file.exe 3432 file.exe 3432 file.exe 3432 file.exe 3432 file.exe 3432 file.exe 3432 file.exe 3432 file.exe 2844 wlanext.exe 2844 wlanext.exe 2844 wlanext.exe 2844 wlanext.exe 2844 wlanext.exe 2844 wlanext.exe 2844 wlanext.exe 2844 wlanext.exe 2844 wlanext.exe 2844 wlanext.exe 2844 wlanext.exe 2844 wlanext.exe 2844 wlanext.exe 2844 wlanext.exe 2844 wlanext.exe 2844 wlanext.exe 2844 wlanext.exe 2844 wlanext.exe 2844 wlanext.exe 2844 wlanext.exe 2844 wlanext.exe 2844 wlanext.exe 2844 wlanext.exe 2844 wlanext.exe 2844 wlanext.exe 2844 wlanext.exe 2844 wlanext.exe 2844 wlanext.exe 2844 wlanext.exe 2844 wlanext.exe 2844 wlanext.exe 2844 wlanext.exe 2844 wlanext.exe 2844 wlanext.exe 2844 wlanext.exe 2844 wlanext.exe 2844 wlanext.exe 2844 wlanext.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3092 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
Processes:
file.exewlanext.exepid process 3432 file.exe 3432 file.exe 3432 file.exe 2844 wlanext.exe 2844 wlanext.exe 2844 wlanext.exe 2844 wlanext.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
file.exefile.exewlanext.exedescription pid process Token: SeDebugPrivilege 4960 file.exe Token: SeDebugPrivilege 3432 file.exe Token: SeDebugPrivilege 2844 wlanext.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
file.exeExplorer.EXEwlanext.exedescription pid process target process PID 4960 wrote to memory of 4764 4960 file.exe file.exe PID 4960 wrote to memory of 4764 4960 file.exe file.exe PID 4960 wrote to memory of 4764 4960 file.exe file.exe PID 4960 wrote to memory of 3432 4960 file.exe file.exe PID 4960 wrote to memory of 3432 4960 file.exe file.exe PID 4960 wrote to memory of 3432 4960 file.exe file.exe PID 4960 wrote to memory of 3432 4960 file.exe file.exe PID 4960 wrote to memory of 3432 4960 file.exe file.exe PID 4960 wrote to memory of 3432 4960 file.exe file.exe PID 3092 wrote to memory of 2844 3092 Explorer.EXE wlanext.exe PID 3092 wrote to memory of 2844 3092 Explorer.EXE wlanext.exe PID 3092 wrote to memory of 2844 3092 Explorer.EXE wlanext.exe PID 2844 wrote to memory of 4604 2844 wlanext.exe Firefox.exe PID 2844 wrote to memory of 4604 2844 wlanext.exe Firefox.exe PID 2844 wrote to memory of 4604 2844 wlanext.exe Firefox.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"3⤵PID:4764
-
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"3⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3432
-
-
-
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:4604
-
-