Analysis
-
max time kernel
171s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 00:06
Static task
static1
Behavioral task
behavioral1
Sample
903ba9c8405222214484f6d5cfa6afb76afb927bfb23297a2f520d9bc953ac56.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
903ba9c8405222214484f6d5cfa6afb76afb927bfb23297a2f520d9bc953ac56.exe
Resource
win10v2004-20220901-en
General
-
Target
903ba9c8405222214484f6d5cfa6afb76afb927bfb23297a2f520d9bc953ac56.exe
-
Size
1.1MB
-
MD5
f7bf40a04f42e1f14e54a18d3c61897f
-
SHA1
3eebc14f1c70ae9d4fa493c650a94d12257b2435
-
SHA256
903ba9c8405222214484f6d5cfa6afb76afb927bfb23297a2f520d9bc953ac56
-
SHA512
18aeeebd2733f3e0db865a3bd79433162cf6459bc75fc1883373c94800223334610eb3c8a123c760cf6378fe2b9741ba8299aeab6cb72682375619ee558503fb
-
SSDEEP
12288:gpQzNWXXasPZqh+unTEDA9ukiVATu83lf6YiRuRVlbEU6kw801pyVklLgjN25Kt7:g5asBpDDkqAT31Bi0RQ1EqG2+EC
Malware Config
Extracted
C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DecryptAllFiles 7294856.txt
http://wypwtzc2kaceyufw.onion
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
obvnomb.exeobvnomb.exepid process 1976 obvnomb.exe 1752 obvnomb.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
903ba9c8405222214484f6d5cfa6afb76afb927bfb23297a2f520d9bc953ac56.exeobvnomb.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\International\Geo\Nation 903ba9c8405222214484f6d5cfa6afb76afb927bfb23297a2f520d9bc953ac56.exe Key value queried \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\International\Geo\Nation obvnomb.exe -
Loads dropped DLL 1 IoCs
Processes:
obvnomb.exepid process 1976 obvnomb.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
903ba9c8405222214484f6d5cfa6afb76afb927bfb23297a2f520d9bc953ac56.exeobvnomb.exedescription pid process target process PID 1776 set thread context of 1968 1776 903ba9c8405222214484f6d5cfa6afb76afb927bfb23297a2f520d9bc953ac56.exe 903ba9c8405222214484f6d5cfa6afb76afb927bfb23297a2f520d9bc953ac56.exe PID 1976 set thread context of 1752 1976 obvnomb.exe obvnomb.exe -
Drops file in Program Files directory 2 IoCs
Processes:
obvnomb.exedescription ioc process File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DecryptAllFiles 7294856.txt obvnomb.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AllFilesAreLocked 7294856.bmp obvnomb.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
903ba9c8405222214484f6d5cfa6afb76afb927bfb23297a2f520d9bc953ac56.exe903ba9c8405222214484f6d5cfa6afb76afb927bfb23297a2f520d9bc953ac56.exeobvnomb.exeobvnomb.exepid process 1776 903ba9c8405222214484f6d5cfa6afb76afb927bfb23297a2f520d9bc953ac56.exe 1776 903ba9c8405222214484f6d5cfa6afb76afb927bfb23297a2f520d9bc953ac56.exe 1968 903ba9c8405222214484f6d5cfa6afb76afb927bfb23297a2f520d9bc953ac56.exe 1976 obvnomb.exe 1976 obvnomb.exe 1752 obvnomb.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
903ba9c8405222214484f6d5cfa6afb76afb927bfb23297a2f520d9bc953ac56.exeobvnomb.exepid process 1776 903ba9c8405222214484f6d5cfa6afb76afb927bfb23297a2f520d9bc953ac56.exe 1776 903ba9c8405222214484f6d5cfa6afb76afb927bfb23297a2f520d9bc953ac56.exe 1976 obvnomb.exe 1976 obvnomb.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
903ba9c8405222214484f6d5cfa6afb76afb927bfb23297a2f520d9bc953ac56.exetaskeng.exeobvnomb.exedescription pid process target process PID 1776 wrote to memory of 1968 1776 903ba9c8405222214484f6d5cfa6afb76afb927bfb23297a2f520d9bc953ac56.exe 903ba9c8405222214484f6d5cfa6afb76afb927bfb23297a2f520d9bc953ac56.exe PID 1776 wrote to memory of 1968 1776 903ba9c8405222214484f6d5cfa6afb76afb927bfb23297a2f520d9bc953ac56.exe 903ba9c8405222214484f6d5cfa6afb76afb927bfb23297a2f520d9bc953ac56.exe PID 1776 wrote to memory of 1968 1776 903ba9c8405222214484f6d5cfa6afb76afb927bfb23297a2f520d9bc953ac56.exe 903ba9c8405222214484f6d5cfa6afb76afb927bfb23297a2f520d9bc953ac56.exe PID 1776 wrote to memory of 1968 1776 903ba9c8405222214484f6d5cfa6afb76afb927bfb23297a2f520d9bc953ac56.exe 903ba9c8405222214484f6d5cfa6afb76afb927bfb23297a2f520d9bc953ac56.exe PID 1776 wrote to memory of 1968 1776 903ba9c8405222214484f6d5cfa6afb76afb927bfb23297a2f520d9bc953ac56.exe 903ba9c8405222214484f6d5cfa6afb76afb927bfb23297a2f520d9bc953ac56.exe PID 1776 wrote to memory of 1968 1776 903ba9c8405222214484f6d5cfa6afb76afb927bfb23297a2f520d9bc953ac56.exe 903ba9c8405222214484f6d5cfa6afb76afb927bfb23297a2f520d9bc953ac56.exe PID 1776 wrote to memory of 1968 1776 903ba9c8405222214484f6d5cfa6afb76afb927bfb23297a2f520d9bc953ac56.exe 903ba9c8405222214484f6d5cfa6afb76afb927bfb23297a2f520d9bc953ac56.exe PID 564 wrote to memory of 1976 564 taskeng.exe obvnomb.exe PID 564 wrote to memory of 1976 564 taskeng.exe obvnomb.exe PID 564 wrote to memory of 1976 564 taskeng.exe obvnomb.exe PID 564 wrote to memory of 1976 564 taskeng.exe obvnomb.exe PID 1976 wrote to memory of 1752 1976 obvnomb.exe obvnomb.exe PID 1976 wrote to memory of 1752 1976 obvnomb.exe obvnomb.exe PID 1976 wrote to memory of 1752 1976 obvnomb.exe obvnomb.exe PID 1976 wrote to memory of 1752 1976 obvnomb.exe obvnomb.exe PID 1976 wrote to memory of 1752 1976 obvnomb.exe obvnomb.exe PID 1976 wrote to memory of 1752 1976 obvnomb.exe obvnomb.exe PID 1976 wrote to memory of 1752 1976 obvnomb.exe obvnomb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\903ba9c8405222214484f6d5cfa6afb76afb927bfb23297a2f520d9bc953ac56.exe"C:\Users\Admin\AppData\Local\Temp\903ba9c8405222214484f6d5cfa6afb76afb927bfb23297a2f520d9bc953ac56.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\903ba9c8405222214484f6d5cfa6afb76afb927bfb23297a2f520d9bc953ac56.exeC:\Users\Admin\AppData\Local\Temp\903ba9c8405222214484f6d5cfa6afb76afb927bfb23297a2f520d9bc953ac56.exe2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\taskeng.exetaskeng.exe {979C1381-9E32-4842-BF1C-152D40824640} S-1-5-21-3406023954-474543476-3319432036-1000:VUIIVLGQ\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\obvnomb.exeC:\Users\Admin\AppData\Local\Temp\obvnomb.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\obvnomb.exeC:\Users\Admin\AppData\Local\Temp\obvnomb.exe3⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Adobe\lvixnfhFilesize
654B
MD55b30cb92b9e3277ca58212446ae7431f
SHA10f5a70a9d222b40e185501f2acb70de3f35ca9a3
SHA256b3142edf56ec003a0ae4cfa077946143726a5f69b072aaa01792f51bfaca1c63
SHA5121e690dde7fa08d9f449b0e1e5e491679b42307784df9fc1f3f626de16fda3ba2a1ab2d6c7d734d4d52c17ec79977243b34839a608a136e66fbadcdf35e156d21
-
C:\Users\Admin\AppData\Local\Temp\obvnomb.exeFilesize
1.1MB
MD5f7bf40a04f42e1f14e54a18d3c61897f
SHA13eebc14f1c70ae9d4fa493c650a94d12257b2435
SHA256903ba9c8405222214484f6d5cfa6afb76afb927bfb23297a2f520d9bc953ac56
SHA51218aeeebd2733f3e0db865a3bd79433162cf6459bc75fc1883373c94800223334610eb3c8a123c760cf6378fe2b9741ba8299aeab6cb72682375619ee558503fb
-
C:\Users\Admin\AppData\Local\Temp\obvnomb.exeFilesize
1.1MB
MD5f7bf40a04f42e1f14e54a18d3c61897f
SHA13eebc14f1c70ae9d4fa493c650a94d12257b2435
SHA256903ba9c8405222214484f6d5cfa6afb76afb927bfb23297a2f520d9bc953ac56
SHA51218aeeebd2733f3e0db865a3bd79433162cf6459bc75fc1883373c94800223334610eb3c8a123c760cf6378fe2b9741ba8299aeab6cb72682375619ee558503fb
-
C:\Users\Admin\AppData\Local\Temp\obvnomb.exeFilesize
1.1MB
MD5f7bf40a04f42e1f14e54a18d3c61897f
SHA13eebc14f1c70ae9d4fa493c650a94d12257b2435
SHA256903ba9c8405222214484f6d5cfa6afb76afb927bfb23297a2f520d9bc953ac56
SHA51218aeeebd2733f3e0db865a3bd79433162cf6459bc75fc1883373c94800223334610eb3c8a123c760cf6378fe2b9741ba8299aeab6cb72682375619ee558503fb
-
\Users\Admin\AppData\Local\Temp\obvnomb.exeFilesize
1.1MB
MD5f7bf40a04f42e1f14e54a18d3c61897f
SHA13eebc14f1c70ae9d4fa493c650a94d12257b2435
SHA256903ba9c8405222214484f6d5cfa6afb76afb927bfb23297a2f520d9bc953ac56
SHA51218aeeebd2733f3e0db865a3bd79433162cf6459bc75fc1883373c94800223334610eb3c8a123c760cf6378fe2b9741ba8299aeab6cb72682375619ee558503fb
-
memory/1752-80-0x0000000000890000-0x0000000000AD1000-memory.dmpFilesize
2.3MB
-
memory/1752-75-0x00000000004707F5-mapping.dmp
-
memory/1776-54-0x0000000075D61000-0x0000000075D63000-memory.dmpFilesize
8KB
-
memory/1776-60-0x0000000000230000-0x0000000000234000-memory.dmpFilesize
16KB
-
memory/1968-58-0x0000000000400000-0x00000000004A7000-memory.dmpFilesize
668KB
-
memory/1968-65-0x0000000000880000-0x0000000000AC1000-memory.dmpFilesize
2.3MB
-
memory/1968-63-0x0000000000400000-0x00000000004A6E00-memory.dmpFilesize
667KB
-
memory/1968-62-0x0000000000670000-0x0000000000880000-memory.dmpFilesize
2.1MB
-
memory/1968-59-0x00000000004707F5-mapping.dmp
-
memory/1968-55-0x0000000000400000-0x00000000004A7000-memory.dmpFilesize
668KB
-
memory/1968-56-0x0000000000400000-0x00000000004A7000-memory.dmpFilesize
668KB
-
memory/1976-67-0x0000000000000000-mapping.dmp