Analysis
-
max time kernel
155s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2022 18:02
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220812-en
General
-
Target
tmp.exe
-
Size
576KB
-
MD5
4218b9cf266916690af26776acf29627
-
SHA1
d69e2af929a0d406d7eea8316e9747db1d4a7ff0
-
SHA256
dcc8a16c411d371bf110f3d0bfe6a4224a53810844ef1bc02d3f89f2e02e7c0b
-
SHA512
fad04a07efa85b91c64022f0b9b1fefdc80a59cd9127e6c1d750f803e2377c71793f20add0532ab2ed595cc9a98a8c9d522c6c42bc6fc07cfdfd2eddf9954d05
-
SSDEEP
12288:xWO+lpbKbfO7FoxgcSkgyZyfOL5eJxnS4ta5NG3WlViKY:xWnbKzxgcSkgyZeO0TtWN+
Malware Config
Extracted
formbook
dcn0
ZVx68vDtAMBCwg==
oBMBvsNORkM/O/ox
Ff9pISWkm6eG4lByIspp
c2T42c6CIIF6B8xTxm9XzpVw
bvjhxRbnAC183w==
0lTttSNG4HUDNflyIspp
hPXFlstqiHA/O/ox
WLR+MeerxZ0cNn1ja+IQAYo=
IHRn4xXOVKi477zarG+ObSy7YJA=
Xhf3e+tdAC183w==
Xk0ZAezv2rWH
kngo+vBeSRN7AszNwam3Osmguuqc0MoC
a2Qp7a+E8fSw7LDjpnqEKjsRZA==
3zjy4E7+QM48wg==
YcCmqT3OUNAigVott2pBKiy7YJA=
4+SMeX1juat/5cZ1AZihcyy7YJA=
/+m7sro0OBTl3TMpCw==
i2ctEfe4//a64yklMsgS2J90
+loZ2QKGX0UWgpvErMs=
b9BNCnJWQJS8IfsR0uR3bCy7YJA=
9eiUYE0ynHE/O/ox
F2/75pOIYNg0hzOD99192J8=
Y1xOONdO105okfha33EZ2A==
qYZIIB+dfF0wp1nVWFz067hJ2/qoXEVeAA==
moQMzat7tfKyKPYs
aMZJI/NfUSSpPQUBJ8/11g==
QKMN15GjpHcpyA==
6+S1hTvphhFfoCdj6tw=
DPynhWcnZWho7a0p33EZ2A==
EXY//zDm7ej3Guwo
PSWxPYkk0SNioSdj6tw=
jv+tmhv1ySZloydj6tw=
P8GUV5BhNZflCCBBFg==
IQZ0PWog1lcVVkJYHg==
aOTCq/Cet6AdhSdj6tw=
OBzJrqYS+eac46nZo4aI84kWMEtH
kBzTkbI2LTo/O/ox
a8pwOrU/tyx93a/QrGBpXGQIfZI=
GWoC9K5Mx0GR34urFcDPyQ==
dGxKGM2FI4iAkTOD99192J8=
UqQv8Vkx7WzkCCBBFg==
NcBsPK+YmdZP0cyhY+Lrzw==
zcKbk5oK7NCgFOpa4tHv0g==
uIomFkUTzdWa
QkAF8NuWMZmnPjCFgJBa+Y1t
51w6Gw7c3NyY
IyDnsW89dXaMrAxotF8jGZc=
1s1RHCrCwI8PnVhMY+Lrzw==
zBnRazUUWCsrM5t0SEth
1z4R/XM98Wn3j1RMY+Lrzw==
h3b34yQL3cI8wg==
/+27PhUTzdWa
CO0jnOIoAC183w==
Cn8jz+pyZEfWCCBBFg==
jI4f4NnKFwoSUb4YbnkzePzLv+Sc0MoC
xZnrS1Y+5Sxv1g==
phjYsTTGW8zAMydj6tw=
v7JcJyW3x64phzOD99192J8=
tBJ+Uh3sJxYqbyvrfF6BKjsRZA==
xRTxyfuTgMhGxg==
6ceNTfir2qmQHtxWwqIrI8GQ7h/Te/A2CA==
00gVx7d5/U5soCdj6tw=
Jgvgt58H8MFLfBzTp1VZXCe2ZYg=
1NKRY1QTzdWa
ahmedo.ch
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
tmp.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
tmp.exetmp.execolorcpl.exedescription pid process target process PID 3720 set thread context of 3228 3720 tmp.exe tmp.exe PID 3228 set thread context of 676 3228 tmp.exe Explorer.EXE PID 3428 set thread context of 676 3428 colorcpl.exe Explorer.EXE -
Processes:
colorcpl.exedescription ioc process Key created \Registry\User\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 colorcpl.exe -
Suspicious behavior: EnumeratesProcesses 38 IoCs
Processes:
tmp.exetmp.execolorcpl.exepid process 3720 tmp.exe 3720 tmp.exe 3228 tmp.exe 3228 tmp.exe 3228 tmp.exe 3228 tmp.exe 3228 tmp.exe 3228 tmp.exe 3228 tmp.exe 3228 tmp.exe 3428 colorcpl.exe 3428 colorcpl.exe 3428 colorcpl.exe 3428 colorcpl.exe 3428 colorcpl.exe 3428 colorcpl.exe 3428 colorcpl.exe 3428 colorcpl.exe 3428 colorcpl.exe 3428 colorcpl.exe 3428 colorcpl.exe 3428 colorcpl.exe 3428 colorcpl.exe 3428 colorcpl.exe 3428 colorcpl.exe 3428 colorcpl.exe 3428 colorcpl.exe 3428 colorcpl.exe 3428 colorcpl.exe 3428 colorcpl.exe 3428 colorcpl.exe 3428 colorcpl.exe 3428 colorcpl.exe 3428 colorcpl.exe 3428 colorcpl.exe 3428 colorcpl.exe 3428 colorcpl.exe 3428 colorcpl.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 676 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
tmp.execolorcpl.exepid process 3228 tmp.exe 3228 tmp.exe 3228 tmp.exe 3428 colorcpl.exe 3428 colorcpl.exe 3428 colorcpl.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
tmp.exetmp.execolorcpl.exedescription pid process Token: SeDebugPrivilege 3720 tmp.exe Token: SeDebugPrivilege 3228 tmp.exe Token: SeDebugPrivilege 3428 colorcpl.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
tmp.exeExplorer.EXEcolorcpl.exedescription pid process target process PID 3720 wrote to memory of 1288 3720 tmp.exe tmp.exe PID 3720 wrote to memory of 1288 3720 tmp.exe tmp.exe PID 3720 wrote to memory of 1288 3720 tmp.exe tmp.exe PID 3720 wrote to memory of 3228 3720 tmp.exe tmp.exe PID 3720 wrote to memory of 3228 3720 tmp.exe tmp.exe PID 3720 wrote to memory of 3228 3720 tmp.exe tmp.exe PID 3720 wrote to memory of 3228 3720 tmp.exe tmp.exe PID 3720 wrote to memory of 3228 3720 tmp.exe tmp.exe PID 3720 wrote to memory of 3228 3720 tmp.exe tmp.exe PID 676 wrote to memory of 3428 676 Explorer.EXE colorcpl.exe PID 676 wrote to memory of 3428 676 Explorer.EXE colorcpl.exe PID 676 wrote to memory of 3428 676 Explorer.EXE colorcpl.exe PID 3428 wrote to memory of 4476 3428 colorcpl.exe Firefox.exe PID 3428 wrote to memory of 4476 3428 colorcpl.exe Firefox.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"3⤵PID:1288
-
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"3⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3228
-
-
-
C:\Windows\SysWOW64\colorcpl.exe"C:\Windows\SysWOW64\colorcpl.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:4476
-
-