Analysis
-
max time kernel
167s -
max time network
178s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2022 20:31
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.BackDoor.SpyBotNET.25.21875.15886.exe
Resource
win7-20221111-en
General
-
Target
SecuriteInfo.com.BackDoor.SpyBotNET.25.21875.15886.exe
-
Size
643KB
-
MD5
fcd6f1cc2f300673b3940b9623f4267f
-
SHA1
d8f8e1b07996ba6d8d3f482c2ab710853ee91f8b
-
SHA256
987834ddf97f12dbb06e1f6820fd3436f0226dffa78ac6fcec8b31cc52fdb26b
-
SHA512
d31c8238e17de73f352e6a7bb62449e7de951b6d5a9e3cc7ebb47403c1b22ffa8e504a979f915fa28f25d3bdf6be7471f72d19d57567a86ff79892a77c094c50
-
SSDEEP
12288:dec3pbKbflZUMvkEN2KMK+SknwYDZD5BUUEwcfJZSpH+:d1ZbKbUM7MKJYVEEbp
Malware Config
Extracted
formbook
q4k5
ZXN4RZ1db9JIzC7mhQ==
5+KpXZWys/DewpGQbChh6uPT5SNzFQ==
A8YuEKESXrzBhw==
uYH/9+Amwe1ZMkaR
KAusoWlA4I1Rt0P0jA==
AgIBy9IHiq8cdo4h47hB
PsX/0DrQRr+0hQ==
3z4v9UwXBjNTf48h47hB
bySPUkT+SFuT
VsQK5NkDks06l5z+TUG3eetd/twx2Mcjlg==
3+DcnQWuXG84sOphj5LEHIv/hA==
TOZXSDkjSHDoLk/pl2HYpOXJ
q7GGZ9KJrss/oTNwyxI=
2+O/k7y22Qo=
Joatk/qnSoO3q48h47hB
KT1UQcQ9yxWFQzCI
onRBEIHmYIl9XzhAIMtPLFAh5SNzFQ==
a8IY/+/oCDOj2TuM4Ohc
UlIOzyniF1sRnTNwyxI=
8UJiR6gijbvt+exXo7oCvdNV4BE=
Urjip46/QFqY3IbL49JI
JfhnyyWmRr+0hQ==
NQ/x1kqxFzdlZxj77D50BA==
s8KGT8F9hORX0PpkwQ0=
YSzTpB3S8xCI8ULHIqGXNgY=
sh5wMyQZI1vLJmwH6iCYYhs=
btoWw6OWyfyFQzCI
K5bFl4HSibSwnJIh47hB
5sRZGfCxukuFQzCI
4jiHORQB/0EDbaGQl2ilFw==
Ts7ysROSFE3HrOnU8EqBDg==
2z9tHQD6Gjl3YUCJh1vLdcrTwRt+Hw==
w91HMRoJOmeYopkN49VL
a1ga8Wf5Bx9fUzPDjUWJEw==
rBpOLYYTzP++KoBH2XWmbB8=
JZPo4OETkqGrdBDliw+PrW4Zmg==
PYzy1tDDx/96nYLpl2HYpOXJ
p/M0Ef80rdYbFfcO4p7irW4Zmg==
6YhhQS0qE0+O
rT4fBVXCf+hb2xM=
pwQDw8H/dewWOzpxb1HPt0gcMA9t
P6X8tCGrSmWZLbWjgQ==
wrCGfm2dv+KgNsISa42zHM+BOgxl
GXjQw6Xfj8VBF9/mng==
x6WEd+1T0d6iSdb9jA+DOQQ=
v5Y09doqE0+O
e7Kvto6ClseFgnKzlA==
PAAwEG/mkb2xgvobt0+ADA==
ddEnEwXzDyZodU9dK7/prW4Zmg==
hmTOmXa3PWqtq9PR1dRY
d3ZqOq8XkK635xo=
sf1cMQ5W4RhWZE52h5nbZNOAgFKsUS7B
b4hMHaBbU3d5twfgmg==
wNLg11vUbqOUPNLH3mmtLxE=
9D5oSLllFkJugkZbVThn404IIRl0
LaEqCfmuAyFwVPLwnQ==
ryEt5D/BRWVRKvgL53n30PG/Rb8M9pMXlQ==
alIsGunV8xlUdI4h47hB
yCI/OqUUpcHxdgrymg==
6FJ1QUNw7x5hf44h47hB
/f4T9lO+KIVF2Rk=
etr639YLfJni1+vy8sFD
DWvuYbw2NEmZ
1ndLKAERBY9kUkKt3fRdXdGFAAlv
qkbe4.xyz
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
SecuriteInfo.com.BackDoor.SpyBotNET.25.21875.15886.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation SecuriteInfo.com.BackDoor.SpyBotNET.25.21875.15886.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
SecuriteInfo.com.BackDoor.SpyBotNET.25.21875.15886.exedescription pid process target process PID 4588 set thread context of 3752 4588 SecuriteInfo.com.BackDoor.SpyBotNET.25.21875.15886.exe SecuriteInfo.com.BackDoor.SpyBotNET.25.21875.15886.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
powershell.exeSecuriteInfo.com.BackDoor.SpyBotNET.25.21875.15886.exepid process 2724 powershell.exe 3752 SecuriteInfo.com.BackDoor.SpyBotNET.25.21875.15886.exe 3752 SecuriteInfo.com.BackDoor.SpyBotNET.25.21875.15886.exe 2724 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 2724 powershell.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
SecuriteInfo.com.BackDoor.SpyBotNET.25.21875.15886.exedescription pid process target process PID 4588 wrote to memory of 2724 4588 SecuriteInfo.com.BackDoor.SpyBotNET.25.21875.15886.exe powershell.exe PID 4588 wrote to memory of 2724 4588 SecuriteInfo.com.BackDoor.SpyBotNET.25.21875.15886.exe powershell.exe PID 4588 wrote to memory of 2724 4588 SecuriteInfo.com.BackDoor.SpyBotNET.25.21875.15886.exe powershell.exe PID 4588 wrote to memory of 4840 4588 SecuriteInfo.com.BackDoor.SpyBotNET.25.21875.15886.exe schtasks.exe PID 4588 wrote to memory of 4840 4588 SecuriteInfo.com.BackDoor.SpyBotNET.25.21875.15886.exe schtasks.exe PID 4588 wrote to memory of 4840 4588 SecuriteInfo.com.BackDoor.SpyBotNET.25.21875.15886.exe schtasks.exe PID 4588 wrote to memory of 3752 4588 SecuriteInfo.com.BackDoor.SpyBotNET.25.21875.15886.exe SecuriteInfo.com.BackDoor.SpyBotNET.25.21875.15886.exe PID 4588 wrote to memory of 3752 4588 SecuriteInfo.com.BackDoor.SpyBotNET.25.21875.15886.exe SecuriteInfo.com.BackDoor.SpyBotNET.25.21875.15886.exe PID 4588 wrote to memory of 3752 4588 SecuriteInfo.com.BackDoor.SpyBotNET.25.21875.15886.exe SecuriteInfo.com.BackDoor.SpyBotNET.25.21875.15886.exe PID 4588 wrote to memory of 3752 4588 SecuriteInfo.com.BackDoor.SpyBotNET.25.21875.15886.exe SecuriteInfo.com.BackDoor.SpyBotNET.25.21875.15886.exe PID 4588 wrote to memory of 3752 4588 SecuriteInfo.com.BackDoor.SpyBotNET.25.21875.15886.exe SecuriteInfo.com.BackDoor.SpyBotNET.25.21875.15886.exe PID 4588 wrote to memory of 3752 4588 SecuriteInfo.com.BackDoor.SpyBotNET.25.21875.15886.exe SecuriteInfo.com.BackDoor.SpyBotNET.25.21875.15886.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BackDoor.SpyBotNET.25.21875.15886.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BackDoor.SpyBotNET.25.21875.15886.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\NdTjnguQflTNNq.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2724 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\NdTjnguQflTNNq" /XML "C:\Users\Admin\AppData\Local\Temp\tmp450.tmp"2⤵
- Creates scheduled task(s)
PID:4840 -
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BackDoor.SpyBotNET.25.21875.15886.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BackDoor.SpyBotNET.25.21875.15886.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3752
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp450.tmpFilesize
1KB
MD58de0779587df1d83dbdba3609e6644e3
SHA1e1965942660ac0d08134890550e77ab231a727b3
SHA256ffdcdc9a0caae9fe43a18eaae13b67900b5f9f23f56c3a2053c45fd613207453
SHA51299c929dc53dc1048e84d2aa2e79ebc3a5ce503f055b6b6de78c38d24720e77b3080a7a95932f4e95206378a61400089de0a9a5784308d7b21cbed7a94ff13fca
-
memory/2724-147-0x0000000004FA0000-0x0000000004FC2000-memory.dmpFilesize
136KB
-
memory/2724-153-0x0000000071690000-0x00000000716DC000-memory.dmpFilesize
304KB
-
memory/2724-160-0x0000000007720000-0x000000000773A000-memory.dmpFilesize
104KB
-
memory/2724-158-0x0000000007680000-0x0000000007716000-memory.dmpFilesize
600KB
-
memory/2724-137-0x0000000000000000-mapping.dmp
-
memory/2724-157-0x00000000073C0000-0x00000000073CA000-memory.dmpFilesize
40KB
-
memory/2724-139-0x0000000002730000-0x0000000002766000-memory.dmpFilesize
216KB
-
memory/2724-156-0x0000000006080000-0x000000000609A000-memory.dmpFilesize
104KB
-
memory/2724-155-0x0000000007A30000-0x00000000080AA000-memory.dmpFilesize
6.5MB
-
memory/2724-154-0x0000000006610000-0x000000000662E000-memory.dmpFilesize
120KB
-
memory/2724-144-0x00000000053D0000-0x00000000059F8000-memory.dmpFilesize
6.2MB
-
memory/2724-148-0x0000000005250000-0x00000000052B6000-memory.dmpFilesize
408KB
-
memory/2724-161-0x0000000007670000-0x0000000007678000-memory.dmpFilesize
32KB
-
memory/2724-159-0x0000000007630000-0x000000000763E000-memory.dmpFilesize
56KB
-
memory/2724-152-0x0000000006630000-0x0000000006662000-memory.dmpFilesize
200KB
-
memory/2724-149-0x0000000005A70000-0x0000000005AD6000-memory.dmpFilesize
408KB
-
memory/2724-151-0x0000000004E40000-0x0000000004E5E000-memory.dmpFilesize
120KB
-
memory/3752-150-0x0000000001130000-0x000000000147A000-memory.dmpFilesize
3.3MB
-
memory/3752-145-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/3752-142-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/3752-141-0x0000000000000000-mapping.dmp
-
memory/3752-146-0x0000000000401000-0x000000000042F000-memory.dmpFilesize
184KB
-
memory/4588-134-0x0000000005440000-0x00000000054D2000-memory.dmpFilesize
584KB
-
memory/4588-133-0x00000000059F0000-0x0000000005F94000-memory.dmpFilesize
5.6MB
-
memory/4588-136-0x00000000011C0000-0x000000000125C000-memory.dmpFilesize
624KB
-
memory/4588-132-0x00000000009A0000-0x0000000000A46000-memory.dmpFilesize
664KB
-
memory/4588-135-0x0000000005400000-0x000000000540A000-memory.dmpFilesize
40KB
-
memory/4840-138-0x0000000000000000-mapping.dmp