Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
04-12-2022 12:46
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220901-en
General
-
Target
tmp.exe
-
Size
576KB
-
MD5
4218b9cf266916690af26776acf29627
-
SHA1
d69e2af929a0d406d7eea8316e9747db1d4a7ff0
-
SHA256
dcc8a16c411d371bf110f3d0bfe6a4224a53810844ef1bc02d3f89f2e02e7c0b
-
SHA512
fad04a07efa85b91c64022f0b9b1fefdc80a59cd9127e6c1d750f803e2377c71793f20add0532ab2ed595cc9a98a8c9d522c6c42bc6fc07cfdfd2eddf9954d05
-
SSDEEP
12288:xWO+lpbKbfO7FoxgcSkgyZyfOL5eJxnS4ta5NG3WlViKY:xWnbKzxgcSkgyZeO0TtWN+
Malware Config
Extracted
formbook
dcn0
ZVx68vDtAMBCwg==
oBMBvsNORkM/O/ox
Ff9pISWkm6eG4lByIspp
c2T42c6CIIF6B8xTxm9XzpVw
bvjhxRbnAC183w==
0lTttSNG4HUDNflyIspp
hPXFlstqiHA/O/ox
WLR+MeerxZ0cNn1ja+IQAYo=
IHRn4xXOVKi477zarG+ObSy7YJA=
Xhf3e+tdAC183w==
Xk0ZAezv2rWH
kngo+vBeSRN7AszNwam3Osmguuqc0MoC
a2Qp7a+E8fSw7LDjpnqEKjsRZA==
3zjy4E7+QM48wg==
YcCmqT3OUNAigVott2pBKiy7YJA=
4+SMeX1juat/5cZ1AZihcyy7YJA=
/+m7sro0OBTl3TMpCw==
i2ctEfe4//a64yklMsgS2J90
+loZ2QKGX0UWgpvErMs=
b9BNCnJWQJS8IfsR0uR3bCy7YJA=
9eiUYE0ynHE/O/ox
F2/75pOIYNg0hzOD99192J8=
Y1xOONdO105okfha33EZ2A==
qYZIIB+dfF0wp1nVWFz067hJ2/qoXEVeAA==
moQMzat7tfKyKPYs
aMZJI/NfUSSpPQUBJ8/11g==
QKMN15GjpHcpyA==
6+S1hTvphhFfoCdj6tw=
DPynhWcnZWho7a0p33EZ2A==
EXY//zDm7ej3Guwo
PSWxPYkk0SNioSdj6tw=
jv+tmhv1ySZloydj6tw=
P8GUV5BhNZflCCBBFg==
IQZ0PWog1lcVVkJYHg==
aOTCq/Cet6AdhSdj6tw=
OBzJrqYS+eac46nZo4aI84kWMEtH
kBzTkbI2LTo/O/ox
a8pwOrU/tyx93a/QrGBpXGQIfZI=
GWoC9K5Mx0GR34urFcDPyQ==
dGxKGM2FI4iAkTOD99192J8=
UqQv8Vkx7WzkCCBBFg==
NcBsPK+YmdZP0cyhY+Lrzw==
zcKbk5oK7NCgFOpa4tHv0g==
uIomFkUTzdWa
QkAF8NuWMZmnPjCFgJBa+Y1t
51w6Gw7c3NyY
IyDnsW89dXaMrAxotF8jGZc=
1s1RHCrCwI8PnVhMY+Lrzw==
zBnRazUUWCsrM5t0SEth
1z4R/XM98Wn3j1RMY+Lrzw==
h3b34yQL3cI8wg==
/+27PhUTzdWa
CO0jnOIoAC183w==
Cn8jz+pyZEfWCCBBFg==
jI4f4NnKFwoSUb4YbnkzePzLv+Sc0MoC
xZnrS1Y+5Sxv1g==
phjYsTTGW8zAMydj6tw=
v7JcJyW3x64phzOD99192J8=
tBJ+Uh3sJxYqbyvrfF6BKjsRZA==
xRTxyfuTgMhGxg==
6ceNTfir2qmQHtxWwqIrI8GQ7h/Te/A2CA==
00gVx7d5/U5soCdj6tw=
Jgvgt58H8MFLfBzTp1VZXCe2ZYg=
1NKRY1QTzdWa
ahmedo.ch
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
tmp.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\International\Geo\Nation tmp.exe -
Loads dropped DLL 1 IoCs
Processes:
colorcpl.exepid process 1756 colorcpl.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
tmp.exetmp.execolorcpl.exedescription pid process target process PID 2032 set thread context of 1628 2032 tmp.exe tmp.exe PID 1628 set thread context of 1368 1628 tmp.exe Explorer.EXE PID 1628 set thread context of 1368 1628 tmp.exe Explorer.EXE PID 1756 set thread context of 1368 1756 colorcpl.exe Explorer.EXE -
Processes:
colorcpl.exedescription ioc process Key created \Registry\User\S-1-5-21-4063495947-34355257-727531523-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 colorcpl.exe -
Suspicious behavior: EnumeratesProcesses 19 IoCs
Processes:
tmp.execolorcpl.exepid process 1628 tmp.exe 1628 tmp.exe 1628 tmp.exe 1628 tmp.exe 1628 tmp.exe 1756 colorcpl.exe 1756 colorcpl.exe 1756 colorcpl.exe 1756 colorcpl.exe 1756 colorcpl.exe 1756 colorcpl.exe 1756 colorcpl.exe 1756 colorcpl.exe 1756 colorcpl.exe 1756 colorcpl.exe 1756 colorcpl.exe 1756 colorcpl.exe 1756 colorcpl.exe 1756 colorcpl.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 1368 Explorer.EXE -
Suspicious behavior: MapViewOfSection 8 IoCs
Processes:
tmp.execolorcpl.exepid process 1628 tmp.exe 1628 tmp.exe 1628 tmp.exe 1628 tmp.exe 1756 colorcpl.exe 1756 colorcpl.exe 1756 colorcpl.exe 1756 colorcpl.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
tmp.execolorcpl.exedescription pid process Token: SeDebugPrivilege 1628 tmp.exe Token: SeDebugPrivilege 1756 colorcpl.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1368 Explorer.EXE 1368 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1368 Explorer.EXE 1368 Explorer.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
tmp.exeExplorer.EXEcolorcpl.exedescription pid process target process PID 2032 wrote to memory of 1628 2032 tmp.exe tmp.exe PID 2032 wrote to memory of 1628 2032 tmp.exe tmp.exe PID 2032 wrote to memory of 1628 2032 tmp.exe tmp.exe PID 2032 wrote to memory of 1628 2032 tmp.exe tmp.exe PID 2032 wrote to memory of 1628 2032 tmp.exe tmp.exe PID 2032 wrote to memory of 1628 2032 tmp.exe tmp.exe PID 2032 wrote to memory of 1628 2032 tmp.exe tmp.exe PID 1368 wrote to memory of 1756 1368 Explorer.EXE colorcpl.exe PID 1368 wrote to memory of 1756 1368 Explorer.EXE colorcpl.exe PID 1368 wrote to memory of 1756 1368 Explorer.EXE colorcpl.exe PID 1368 wrote to memory of 1756 1368 Explorer.EXE colorcpl.exe PID 1756 wrote to memory of 576 1756 colorcpl.exe Firefox.exe PID 1756 wrote to memory of 576 1756 colorcpl.exe Firefox.exe PID 1756 wrote to memory of 576 1756 colorcpl.exe Firefox.exe PID 1756 wrote to memory of 576 1756 colorcpl.exe Firefox.exe PID 1756 wrote to memory of 576 1756 colorcpl.exe Firefox.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"3⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1628
-
-
-
C:\Windows\SysWOW64\colorcpl.exe"C:\Windows\SysWOW64\colorcpl.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:576
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
888KB
MD59c73b282279e74e40435132e61fda001
SHA163c7248e91b68fbde4641e3c5e2dc3e9d38671fa
SHA2566710d91d77e1937dd5b46d96c0852042985dc78c4c51ce12d3e07a4cdb12c202
SHA51202f9a01a3a5f74ef994ebb9e5f24c6870e2d48c8b99c429a63e74dad73fb581f0b52b2a86d651cafa414675b70a0e85b2e08c843d07e080fe69ee835e3c91108