Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 06:18
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order No. 4502717956.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Purchase Order No. 4502717956.exe
Resource
win10v2004-20221111-en
General
-
Target
Purchase Order No. 4502717956.exe
-
Size
659KB
-
MD5
56478f00ad85f32b299aa3450f761901
-
SHA1
8bea35f5c67818749cbcf9a367735fea13c32894
-
SHA256
77a99df0938f000db363d3f123fed3a7e6c6b9ebce4f9f59d68a277327d15eb4
-
SHA512
39e02f1355b953926683509b64c889554e390716c170d735837b53299d4afb3654e5e7a1890bd43cd259d7d06fb15b529ffc5380a8cce121f69c45853e7ef177
-
SSDEEP
12288:H7EIZxD7RP51oQP/ZcrHrEr3MyLWETdDGw3zH+fvmWxsZPbLj:H7ElQP/ZioLWadDGwafvmGcbL
Malware Config
Extracted
formbook
snky
AiMFvkl6+A4HEgZ99q5x4naN7lGmvJo=
tvj/KUTKeKgxszIemQ==
DTrTokBrjB5leF4=
tPeTOuIjJPtH
taxtMdIygEdpskxzOQ2ZjoAEeA==
CxLuaKAFRrJyuIqQUPbhZw==
Tn4fapT5kPmk1H0gpXQ=
h5p8hDqGSiRzdSbV
i3lg8tbRNRU6jC9pQSOxzHYZgpbnOKBx
EwbfBo6m+UXU2qaVUPbhZw==
WpeenFSMquJ3xXD1/b43
niV5qTFu3tfmcgrI
fqyyyElbdxWswJ7A
Lh7o92ZOr4ghbwvK
Y2RYMDue4x+KszIemQ==
lN3Y3z5AS85eah1MDvfFQQA=
uq+Oqh8MNRxHOOkqA9lqYEZZhJU=
FEtGDeGnnRoSQEM=
TkMlruotvsmtpFwg6shr03LjwMWGow==
7PGx8hNMep8EMj5Q39dsq16IbbaIrA==
JWBJ1NPwDiQGtx/1/b43
jLyxuI7yXHuMCAAEo4w2
u8emc+77PGLK1m71/b43
x/CcdfoDSCRZnVXDPRSpyXmY8VGmvJo=
KVhmdDtqi+J1szIemQ==
wsdvKMDzVJnqRRgHkQ==
t7qiOXzCVU8uTkrIRfwcGc3MSI4=
KmYObYWgvRG0NUY=
nAjQEiY0lBR3szIemQ==
Rbp9QuwhlL3Y6n0gpXQ=
9i/2sO0wWSEWFN1VSTPOC7s4
D3mUkmojJPtH
9j9GR6fFQB5leF4=
xgbp6k8+ov9wcVRTFshikCZFcA==
aWX+xof8Okn/Uuku87rXRjMObIg=
eoNOhYB9un2qA/7BczPs5Zow
2kojAargCM7IyqgrpHwFKbyNjtQU
y/zzintehOseIvyhZ/kDfx4=
YXZNaeznGso2Kkk=
GQyw87qm1C7hMOLb56xmcRg=
gnhB/W9glMlovyXzX2M=
/gTb6IIzhtlsszIemQ==
2fykfBhO0wIGGB+bIbX48vyNjtQU
fLG3th9M26TDQcwJ3rhAbw==
gYBibCt5+mkhszIemQ==
Mi/qtVF8lR5leF4=
+osZ4s4sfzWTmA==
P1bvKyhWmoIcNgpGUPbhZw==
tMR5NMrQNkZ5ynv1/b43
FEJcaBIWVA0qfh1GUPbhZw==
DT4eVFxUjh5leF4=
Vo6XENrMLrVRVhnMjQXkeQk=
gMjK4FdEoqrdLt+edDrs5Zow
HVTpxnKwL8wkcCtAwHw=
E6AxvSU83Q==
cZo27n9MYTcGQEM=
TI52b9eXk5vmcgrI
ERLi/Ii6F/1Yop3wxqYtazMObIg=
4xO77Ma1ILuS1H0gpXQ=
EuWM4vsLahvPCQb1/b43
EDhHQvo3aRJreGabWzYAeQ==
nNXES0A+b9Kj9ZaBgGw=
ERz8ic0GIJfIxoQ79dShF63fAA3QHcSDFw==
Pm9i8+HMLb1+wn0gpXQ=
lodehewulan.yachts
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Purchase Order No. 4502717956.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\International\Geo\Nation Purchase Order No. 4502717956.exe -
Loads dropped DLL 1 IoCs
Processes:
mstsc.exepid process 268 mstsc.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Purchase Order No. 4502717956.exePurchase Order No. 4502717956.exemstsc.exedescription pid process target process PID 1308 set thread context of 764 1308 Purchase Order No. 4502717956.exe Purchase Order No. 4502717956.exe PID 764 set thread context of 1212 764 Purchase Order No. 4502717956.exe Explorer.EXE PID 268 set thread context of 1212 268 mstsc.exe Explorer.EXE -
Processes:
mstsc.exedescription ioc process Key created \Registry\User\S-1-5-21-4063495947-34355257-727531523-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 mstsc.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
Purchase Order No. 4502717956.exemstsc.exepid process 764 Purchase Order No. 4502717956.exe 764 Purchase Order No. 4502717956.exe 764 Purchase Order No. 4502717956.exe 764 Purchase Order No. 4502717956.exe 268 mstsc.exe 268 mstsc.exe 268 mstsc.exe 268 mstsc.exe 268 mstsc.exe 268 mstsc.exe 268 mstsc.exe 268 mstsc.exe 268 mstsc.exe 268 mstsc.exe 268 mstsc.exe 268 mstsc.exe 268 mstsc.exe 268 mstsc.exe 268 mstsc.exe 268 mstsc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 1212 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
Processes:
Purchase Order No. 4502717956.exemstsc.exepid process 764 Purchase Order No. 4502717956.exe 764 Purchase Order No. 4502717956.exe 764 Purchase Order No. 4502717956.exe 268 mstsc.exe 268 mstsc.exe 268 mstsc.exe 268 mstsc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Purchase Order No. 4502717956.exemstsc.exedescription pid process Token: SeDebugPrivilege 764 Purchase Order No. 4502717956.exe Token: SeDebugPrivilege 268 mstsc.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1212 Explorer.EXE 1212 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1212 Explorer.EXE 1212 Explorer.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
Purchase Order No. 4502717956.exeExplorer.EXEmstsc.exedescription pid process target process PID 1308 wrote to memory of 764 1308 Purchase Order No. 4502717956.exe Purchase Order No. 4502717956.exe PID 1308 wrote to memory of 764 1308 Purchase Order No. 4502717956.exe Purchase Order No. 4502717956.exe PID 1308 wrote to memory of 764 1308 Purchase Order No. 4502717956.exe Purchase Order No. 4502717956.exe PID 1308 wrote to memory of 764 1308 Purchase Order No. 4502717956.exe Purchase Order No. 4502717956.exe PID 1308 wrote to memory of 764 1308 Purchase Order No. 4502717956.exe Purchase Order No. 4502717956.exe PID 1308 wrote to memory of 764 1308 Purchase Order No. 4502717956.exe Purchase Order No. 4502717956.exe PID 1308 wrote to memory of 764 1308 Purchase Order No. 4502717956.exe Purchase Order No. 4502717956.exe PID 1212 wrote to memory of 268 1212 Explorer.EXE mstsc.exe PID 1212 wrote to memory of 268 1212 Explorer.EXE mstsc.exe PID 1212 wrote to memory of 268 1212 Explorer.EXE mstsc.exe PID 1212 wrote to memory of 268 1212 Explorer.EXE mstsc.exe PID 268 wrote to memory of 968 268 mstsc.exe Firefox.exe PID 268 wrote to memory of 968 268 mstsc.exe Firefox.exe PID 268 wrote to memory of 968 268 mstsc.exe Firefox.exe PID 268 wrote to memory of 968 268 mstsc.exe Firefox.exe PID 268 wrote to memory of 968 268 mstsc.exe Firefox.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\Purchase Order No. 4502717956.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order No. 4502717956.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\Purchase Order No. 4502717956.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order No. 4502717956.exe"3⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:764
-
-
-
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:968
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
895KB
MD51eb6acf76a15b74b38333af47dc1218d
SHA1a3fbc817f59b6a8899dc338cc15a75cdd17dfff1
SHA256a5ef3a78eb333b0e6dca194ea711dcbb036119a788ecfe125f05176fb0fb70a3
SHA512717931aa928de150abbb70d523c7dbd472bfa6c511ab55e0b50df8d9661d33635156ed7b750285fa383cdd4064f225ea022f0bead3e066ee2beba84ef5731c15