Analysis
-
max time kernel
190s -
max time network
235s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2022 09:12
Static task
static1
Behavioral task
behavioral1
Sample
Order Specications.exe
Resource
win7-20220901-en
General
-
Target
Order Specications.exe
-
Size
238KB
-
MD5
c72a49e97664c9b70f96c90495bd9224
-
SHA1
16ffe09a3e7376946751825dabd50534f7d2a3f2
-
SHA256
d4764983c36112e601465b868a7300521a22603ad82be39dc5f3a796dbafc1d3
-
SHA512
abbf1e9b8643889dd5115817dad630d3b7162c45d92a8fb43fa7221ce0107cf5e67908d64aaf78c2e4c84ec05077a10bf9f887e44a7a270caa5b99ba8d86c3a1
-
SSDEEP
6144:QBn1QmZY0qzXqPLoZiQpUNmkoRH9yrDwbP8EDHjd:gBZY0CDpUNm5dyvnk
Malware Config
Extracted
formbook
0pnv
UeENxNlh2xN7FieUBpBO5lfm
VvcQB1LzT23hsKXRjUwN
UVO18MGf5AY=
oVF8eOF3t9kzAV7CeQ==
jxtEEGsdit4/yuxAdkB8E7LhuAs=
+Pyb8Pke6z59Fg==
pVcPluOJ7ka2WgGWOCCXNw==
5LDqHC4BbYeYhIb0
7pJjqueb8CWBTHLBDsSrEmnUoCy9ui4=
tB4+XKJLlrcv9ARTgCMfXbLhuAs=
4ZM3rO+R/mKOSkpPOQm3KYs=
sKlboNhxxswqHV+UYA==
Ld8s8DrxSqXbpro=
ZSMbPsuFz+gK3msQZB4=
W99Y4Ho8nu1UFo7EOCCXNw==
p48821D7QKXbpro=
Arvd0En7V5D3r1eofzZ8E7LhuAs=
dBc8LKJhweNJFVW7ewE=
BK3FWptVndAtAV7CeQ==
G9eJAmIDDXLur7g=
nxu6Al8UWnDWmKDRjUwN
5yPqQEHML3qYhIb0
2pE3uj7hJUy5bd0go08F
wn6YnfqXrROCFpsSIMvFO5U=
CL+Jywi+FqXbpro=
V06GqiXeQHvpppvRjUwN
KNEB6Tb2Rm6YhIb0
wGd8dOyi7P4ps1qpOnG4UrLhuAs=
cwP28HQ3FrfVX2rp
sK9sEmQCaoezU+5Y9J+OgZHx
8Jaw9fsyLcnggqc=
XxMeH2Y/domhhy6MDBKJf4fw
aNzOrN933yGrUOtkMcX+rs8u0BY=
v4Feg8uHyIGlYxrm7+f60rwTkQ==
2L9Zkvyz/DyoZo0kq0jJprPhhg==
fwuq900Kfs4a0NkUNgm3KYs=
Q8VlqwKuFmnIRP2WOCCXNw==
0cd3qrJMvA5yIGVoiRY=
iQ2GehTAF0BwU3iifA==
c26YRn43iLEPls9U5J6OgZHx
1oYsn9t1td5UCGVoiRY=
8ou4q+Z75yCJPMe5tUdPbIM=
9bMyW2oMftZNE2VoiRY=
ou+RD5aKu/Ro
qHjuIvPLEC1nGg==
SREDHpw1l+MK3msQZB4=
zDakFWb/b5bVgwyWOCCXNw==
vS5ZJjfR6z59Fg==
59QiIpiWuAx1
QsFvrcVlqco5+gxHd//B7dQ7I1/reg==
urHdIH4dJ4LadvL8
vyeTDncsboHrtVzf56fTR9A9I1/reg==
/H+Im4iDeBvtAV7CeQ==
s04++Auc7PQoAV7CeQ==
gjqoKDz4R26YhIb0
/se5dsGA7A4zy3PKOCCXNw==
0sWCObOKu/Ro
9eOaWvWx9P4yF1agVw17Iw==
XU1kLrZytMb4cMkDi0UF
GoUm3WMJS1qAEWVoiRY=
fDvoqLxmxOwoAV7CeQ==
C/2i3BvTN3GYhIb0
LtvNirJ08BJ2FmVoiRY=
4akhvksFTD6kdHVh966Pwprv
pcmigrationpro.com
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
vynlrafu.exevynlrafu.exepid process 2832 vynlrafu.exe 1424 vynlrafu.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
vynlrafu.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation vynlrafu.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
vynlrafu.exevynlrafu.exeraserver.exedescription pid process target process PID 2832 set thread context of 1424 2832 vynlrafu.exe vynlrafu.exe PID 1424 set thread context of 2720 1424 vynlrafu.exe Explorer.EXE PID 3476 set thread context of 2720 3476 raserver.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
raserver.exedescription ioc process Key created \Registry\User\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 raserver.exe -
Suspicious behavior: EnumeratesProcesses 40 IoCs
Processes:
vynlrafu.exeraserver.exepid process 1424 vynlrafu.exe 1424 vynlrafu.exe 1424 vynlrafu.exe 1424 vynlrafu.exe 1424 vynlrafu.exe 1424 vynlrafu.exe 1424 vynlrafu.exe 1424 vynlrafu.exe 3476 raserver.exe 3476 raserver.exe 3476 raserver.exe 3476 raserver.exe 3476 raserver.exe 3476 raserver.exe 3476 raserver.exe 3476 raserver.exe 3476 raserver.exe 3476 raserver.exe 3476 raserver.exe 3476 raserver.exe 3476 raserver.exe 3476 raserver.exe 3476 raserver.exe 3476 raserver.exe 3476 raserver.exe 3476 raserver.exe 3476 raserver.exe 3476 raserver.exe 3476 raserver.exe 3476 raserver.exe 3476 raserver.exe 3476 raserver.exe 3476 raserver.exe 3476 raserver.exe 3476 raserver.exe 3476 raserver.exe 3476 raserver.exe 3476 raserver.exe 3476 raserver.exe 3476 raserver.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 2720 Explorer.EXE -
Suspicious behavior: MapViewOfSection 8 IoCs
Processes:
vynlrafu.exevynlrafu.exeraserver.exepid process 2832 vynlrafu.exe 1424 vynlrafu.exe 1424 vynlrafu.exe 1424 vynlrafu.exe 3476 raserver.exe 3476 raserver.exe 3476 raserver.exe 3476 raserver.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
vynlrafu.exeraserver.exedescription pid process Token: SeDebugPrivilege 1424 vynlrafu.exe Token: SeDebugPrivilege 3476 raserver.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 2720 Explorer.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
Order Specications.exevynlrafu.exeExplorer.EXEraserver.exedescription pid process target process PID 3732 wrote to memory of 2832 3732 Order Specications.exe vynlrafu.exe PID 3732 wrote to memory of 2832 3732 Order Specications.exe vynlrafu.exe PID 3732 wrote to memory of 2832 3732 Order Specications.exe vynlrafu.exe PID 2832 wrote to memory of 1424 2832 vynlrafu.exe vynlrafu.exe PID 2832 wrote to memory of 1424 2832 vynlrafu.exe vynlrafu.exe PID 2832 wrote to memory of 1424 2832 vynlrafu.exe vynlrafu.exe PID 2832 wrote to memory of 1424 2832 vynlrafu.exe vynlrafu.exe PID 2720 wrote to memory of 3476 2720 Explorer.EXE raserver.exe PID 2720 wrote to memory of 3476 2720 Explorer.EXE raserver.exe PID 2720 wrote to memory of 3476 2720 Explorer.EXE raserver.exe PID 3476 wrote to memory of 2144 3476 raserver.exe Firefox.exe PID 3476 wrote to memory of 2144 3476 raserver.exe Firefox.exe PID 3476 wrote to memory of 2144 3476 raserver.exe Firefox.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\Order Specications.exe"C:\Users\Admin\AppData\Local\Temp\Order Specications.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Users\Admin\AppData\Local\Temp\vynlrafu.exe"C:\Users\Admin\AppData\Local\Temp\vynlrafu.exe" C:\Users\Admin\AppData\Local\Temp\gmqmvhirk.scu3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\vynlrafu.exe"C:\Users\Admin\AppData\Local\Temp\vynlrafu.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1424 -
C:\Windows\SysWOW64\raserver.exe"C:\Windows\SysWOW64\raserver.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:2144
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\gmqmvhirk.scuFilesize
5KB
MD5ceb2a424550ffe45f0df57f51816bb3f
SHA1b323f0167b310b55571dbd3bdf4b72269891dbb6
SHA25696f74554c362e8267c1ce06da0f0a9048d16ad0a6ebaac6109327b0a94e2ff9c
SHA51253d3839181c0438b9006572bc581faf592fe35729bf31318816e47504b0c698e8e395ff708b893f8e15c0a2cfbb61dde6eb6dbe5353ca9be9cbe28c5a82fed43
-
C:\Users\Admin\AppData\Local\Temp\ofnacjjcgr.qjFilesize
185KB
MD5723c3f7e57771c4a878680d082509ff0
SHA14ddc6be498b71669d9d273cc4eb997b3abf60132
SHA2566a4615cfb82812ea5b53525e0a7a6dd083ed6268e35e4b7b7038fdc154f472e3
SHA512631b86cd51af3dcabe1075006b1e40bb10298128d16e1d56bbd613e32baedc7212d87acf1b42839d83d28a334a169f8d1d956fb6b7b8d375f338d817fbb61256
-
C:\Users\Admin\AppData\Local\Temp\vynlrafu.exeFilesize
37KB
MD556b0afc73d669c9f01d559f5e5020c4a
SHA1ef30befa63ad63cfd0cb92fa6dd8198181cdb7b6
SHA2568e3a42a6113bc57ea15981b9f66ae4f0f4718e029ae5fb82ff6fc1db352e821d
SHA51251f02610e82fb74b5934f4ee6a3c0712823c028ed914ab71291aa4bbd256fb6e3e4d8c334691830e2ea168e4e992ee7029805532929c70c706350e97f0c50c14
-
C:\Users\Admin\AppData\Local\Temp\vynlrafu.exeFilesize
37KB
MD556b0afc73d669c9f01d559f5e5020c4a
SHA1ef30befa63ad63cfd0cb92fa6dd8198181cdb7b6
SHA2568e3a42a6113bc57ea15981b9f66ae4f0f4718e029ae5fb82ff6fc1db352e821d
SHA51251f02610e82fb74b5934f4ee6a3c0712823c028ed914ab71291aa4bbd256fb6e3e4d8c334691830e2ea168e4e992ee7029805532929c70c706350e97f0c50c14
-
C:\Users\Admin\AppData\Local\Temp\vynlrafu.exeFilesize
37KB
MD556b0afc73d669c9f01d559f5e5020c4a
SHA1ef30befa63ad63cfd0cb92fa6dd8198181cdb7b6
SHA2568e3a42a6113bc57ea15981b9f66ae4f0f4718e029ae5fb82ff6fc1db352e821d
SHA51251f02610e82fb74b5934f4ee6a3c0712823c028ed914ab71291aa4bbd256fb6e3e4d8c334691830e2ea168e4e992ee7029805532929c70c706350e97f0c50c14
-
memory/1424-142-0x0000000000422000-0x0000000000424000-memory.dmpFilesize
8KB
-
memory/1424-139-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1424-140-0x0000000000401000-0x000000000042F000-memory.dmpFilesize
184KB
-
memory/1424-141-0x0000000001420000-0x000000000176A000-memory.dmpFilesize
3.3MB
-
memory/1424-137-0x0000000000000000-mapping.dmp
-
memory/1424-143-0x0000000000B70000-0x0000000000B80000-memory.dmpFilesize
64KB
-
memory/1424-145-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1424-146-0x0000000000401000-0x000000000042F000-memory.dmpFilesize
184KB
-
memory/2720-152-0x0000000008B00000-0x0000000008C13000-memory.dmpFilesize
1.1MB
-
memory/2720-144-0x0000000002FE0000-0x0000000003149000-memory.dmpFilesize
1.4MB
-
memory/2720-154-0x0000000008B00000-0x0000000008C13000-memory.dmpFilesize
1.1MB
-
memory/2832-132-0x0000000000000000-mapping.dmp
-
memory/3476-149-0x0000000000C00000-0x0000000000C2D000-memory.dmpFilesize
180KB
-
memory/3476-150-0x0000000002B20000-0x0000000002E6A000-memory.dmpFilesize
3.3MB
-
memory/3476-148-0x0000000000010000-0x000000000002F000-memory.dmpFilesize
124KB
-
memory/3476-151-0x0000000002950000-0x00000000029DF000-memory.dmpFilesize
572KB
-
memory/3476-153-0x0000000000C00000-0x0000000000C2D000-memory.dmpFilesize
180KB
-
memory/3476-147-0x0000000000000000-mapping.dmp