Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
06-12-2022 06:24
Static task
static1
General
-
Target
14afee34b6a36a32b34c61556e46fef92e6a2d9066c758308bb9caea4a94ae2a.exe
-
Size
343KB
-
MD5
0870a4727fcd6ce557f017f0fed61f51
-
SHA1
6ad1abe4d5d4f44ea753fb10df927adb1f139f2e
-
SHA256
14afee34b6a36a32b34c61556e46fef92e6a2d9066c758308bb9caea4a94ae2a
-
SHA512
7a97ad7ab0f0f23883ca3ee33fdf5ecca2ee3d28df3295ba3b1f1a04b71c62c7dbb7c3bc41d13ac7a84e286b41d130ef4e07a9ad79e7146e9f44baca513a03c5
-
SSDEEP
6144:ZBnbr9ZL8bM0rCfO4AFSnQNYnx3b+/wmsqplIQ037:HfL8bM9fz8SnQyRWwmxsQg
Malware Config
Extracted
formbook
f4ca
omFHB5ajfJi1UEIEV9XcoRw=
UBjJkmQPyprdhcFF/bdCWQ==
evGKkBUj1je+otcfpw==
KgvGVeOATSt3nug0BIOm2JvOQycB
Lv6o3K0r9aSjI0lr9fg1txw=
LH1jJb/HieQpsEdqWCQTvX2PmsDVIeg=
99dte0XauJfk6Xv+uQxJFgA1gMktBA==
21FkkGB9gMniDQw2ffu6
r4lKBM/q6TZwVZfS
F+14qHeVWi56KdQ=
BgWXRsVoICMvvQ==
I+EozFl0Uy56KdQ=
xoXCgEllKEbWfjFCCLo=
qo9G1lXvvGt5GkxrLQWw
ORNlYic0PJ2ip4geEFSv
Yj+GFpvFxy0uVYx1fLI/XQ==
XL+veIKPjOTe4fjvFs+n
D2JKVAfuakXCAyoEvw==
voWJU81tH56wvt/vImbCcgVd
dVEcwFrmb8bZ4vXvFs+n
CMlcaOUF6cB+8Bnm2Kc=
NpYV3moXNE+ZQ4f9nVGCSA==
/GRkjGd1acLHyeLvImbCcgVd
R52MlF+Ag+LtFr1QKa7Zf/5a
kVD/mSO1YK75pA==
5q3IANfo/JHiDww2ffu6
4i8RFOH2ACRdhzja
VLWOSRe00XX6sNsijPzqiiWfFgf1J+g=
qnsgRFL46lWG
xo1QHOyKS9rj4fjvFs+n
mIHZlAqzS6ymmpMCU1uyZgE=
WCtjiGCFl/4JTiJ0R60=
c0vpAtZ3fY7TeLfdcnASQg==
Y87Xlic9/1+q3g/pUArVoB4=
kKOsRsf05wBOd67a
dDmgYgOZZ0aCMVwgDha4bgc=
ieXCbvcCyja+otcfpw==
Fd0XQwkTHHaBmNDvImbCcgVd
PK/M6eM8xOwqvw==
Pf0q8MdfICMvvQ==
EO8aPQwf7z2Du+XvImbCcgVd
BeUisSg/Ql6uJcg=
ay2v2pz4gomTESLosQ==
AGjX3ak2B+FyQ9ZKrQ==
Du0y0UXomyoxT4/arA8Du3FvpwE=
xhV7OrDTdonq4fjvFs+n
9+s2xTlaW66p2IAAnVkDQA==
AuS2UeN4Nsvl5vo8J67Zf/5a
B1vK2590RiUuuw==
/709BIUfMCIln8sus2u2aAM=
BMpYckjp699wVZfS
Pf2AqIscEhlpHlnV18IvVQk=
RKUTxUbz/zFroN/LLq+kIdZM
IuuiQ9pj7ZzciLVPiks4Rxc=
0KBn8XAV7NNm2xPxuA==
nv7yBtDj4UNE/ju8er1EZSanBXfyLv4=
sBgf41X1vKTwUspTsg==
5bk4+oQWD+X01tBEqQ==
c08KjxWnau8DDSsESMKNI+P5G/6/sYjU6g==
RJiyeEVj/N3rhNAW3qU=
v6O7hhQxA//+Oyq2ms9DWQ==
7MdHCYCb4OT5pg==
Je0NLgIfKIeFuyjxYD+i
68P+tIkhBdlwVZfS
inthecryptolane.com
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
vjfiz.exevjfiz.exepid process 3480 vjfiz.exe 1308 vjfiz.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
vjfiz.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Control Panel\International\Geo\Nation vjfiz.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
vjfiz.exevjfiz.exechkdsk.exedescription pid process target process PID 3480 set thread context of 1308 3480 vjfiz.exe vjfiz.exe PID 1308 set thread context of 3044 1308 vjfiz.exe Explorer.EXE PID 516 set thread context of 3044 516 chkdsk.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
chkdsk.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe -
Processes:
chkdsk.exedescription ioc process Key created \Registry\User\S-1-5-21-2368682536-4045190062-1465778271-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 chkdsk.exe -
Suspicious behavior: EnumeratesProcesses 60 IoCs
Processes:
vjfiz.exechkdsk.exepid process 1308 vjfiz.exe 1308 vjfiz.exe 1308 vjfiz.exe 1308 vjfiz.exe 1308 vjfiz.exe 1308 vjfiz.exe 1308 vjfiz.exe 1308 vjfiz.exe 516 chkdsk.exe 516 chkdsk.exe 516 chkdsk.exe 516 chkdsk.exe 516 chkdsk.exe 516 chkdsk.exe 516 chkdsk.exe 516 chkdsk.exe 516 chkdsk.exe 516 chkdsk.exe 516 chkdsk.exe 516 chkdsk.exe 516 chkdsk.exe 516 chkdsk.exe 516 chkdsk.exe 516 chkdsk.exe 516 chkdsk.exe 516 chkdsk.exe 516 chkdsk.exe 516 chkdsk.exe 516 chkdsk.exe 516 chkdsk.exe 516 chkdsk.exe 516 chkdsk.exe 516 chkdsk.exe 516 chkdsk.exe 516 chkdsk.exe 516 chkdsk.exe 516 chkdsk.exe 516 chkdsk.exe 516 chkdsk.exe 516 chkdsk.exe 516 chkdsk.exe 516 chkdsk.exe 516 chkdsk.exe 516 chkdsk.exe 516 chkdsk.exe 516 chkdsk.exe 516 chkdsk.exe 516 chkdsk.exe 516 chkdsk.exe 516 chkdsk.exe 516 chkdsk.exe 516 chkdsk.exe 516 chkdsk.exe 516 chkdsk.exe 516 chkdsk.exe 516 chkdsk.exe 516 chkdsk.exe 516 chkdsk.exe 516 chkdsk.exe 516 chkdsk.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3044 Explorer.EXE -
Suspicious behavior: MapViewOfSection 9 IoCs
Processes:
vjfiz.exevjfiz.exechkdsk.exepid process 3480 vjfiz.exe 3480 vjfiz.exe 1308 vjfiz.exe 1308 vjfiz.exe 1308 vjfiz.exe 516 chkdsk.exe 516 chkdsk.exe 516 chkdsk.exe 516 chkdsk.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
vjfiz.exechkdsk.exedescription pid process Token: SeDebugPrivilege 1308 vjfiz.exe Token: SeDebugPrivilege 516 chkdsk.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
14afee34b6a36a32b34c61556e46fef92e6a2d9066c758308bb9caea4a94ae2a.exevjfiz.exeExplorer.EXEchkdsk.exedescription pid process target process PID 2696 wrote to memory of 3480 2696 14afee34b6a36a32b34c61556e46fef92e6a2d9066c758308bb9caea4a94ae2a.exe vjfiz.exe PID 2696 wrote to memory of 3480 2696 14afee34b6a36a32b34c61556e46fef92e6a2d9066c758308bb9caea4a94ae2a.exe vjfiz.exe PID 2696 wrote to memory of 3480 2696 14afee34b6a36a32b34c61556e46fef92e6a2d9066c758308bb9caea4a94ae2a.exe vjfiz.exe PID 3480 wrote to memory of 1308 3480 vjfiz.exe vjfiz.exe PID 3480 wrote to memory of 1308 3480 vjfiz.exe vjfiz.exe PID 3480 wrote to memory of 1308 3480 vjfiz.exe vjfiz.exe PID 3480 wrote to memory of 1308 3480 vjfiz.exe vjfiz.exe PID 3044 wrote to memory of 516 3044 Explorer.EXE chkdsk.exe PID 3044 wrote to memory of 516 3044 Explorer.EXE chkdsk.exe PID 3044 wrote to memory of 516 3044 Explorer.EXE chkdsk.exe PID 516 wrote to memory of 4724 516 chkdsk.exe Firefox.exe PID 516 wrote to memory of 4724 516 chkdsk.exe Firefox.exe PID 516 wrote to memory of 4724 516 chkdsk.exe Firefox.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\14afee34b6a36a32b34c61556e46fef92e6a2d9066c758308bb9caea4a94ae2a.exe"C:\Users\Admin\AppData\Local\Temp\14afee34b6a36a32b34c61556e46fef92e6a2d9066c758308bb9caea4a94ae2a.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\vjfiz.exe"C:\Users\Admin\AppData\Local\Temp\vjfiz.exe" C:\Users\Admin\AppData\Local\Temp\tysrzemvxjx.lq3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\vjfiz.exe"C:\Users\Admin\AppData\Local\Temp\vjfiz.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Suspicious use of SetThreadContext
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\dvicdpxumc.gshFilesize
185KB
MD56bff3f9f5f10ca6c482120d288b62b08
SHA1e6e72efca642290d5daaf4c8b2fe5a759e1eadd7
SHA256499c77843bfd10fce945eab5d76cd783cd1f21aba38a1f36f854825d1f2083da
SHA512ba7dd6f593bca04792711c46f22137841efc1663aee27c8bc1fe99bc057b5475ef9240880e2a391eed5e99f59142fb49d3d35d8fc558e096127c601ece4f1d2a
-
C:\Users\Admin\AppData\Local\Temp\tysrzemvxjx.lqFilesize
5KB
MD536cf5f2a5ec6b153ee2c785c517153fa
SHA121fb70c9c27ea827abd77d7adfef003acc7b1b03
SHA25684a0d75969da88bc18370ded6588bca0d05525a24bc472c1c84bade9fc1c0479
SHA512d80a2cd1c4d0f86c64e06b728f99a8dee2239f2f0652cc88b0cd02ee28fda16309b3b7cb70b5254821fcec4b6bee640a431f08986faae8f8173b09cee3c09521
-
C:\Users\Admin\AppData\Local\Temp\vjfiz.exeFilesize
12KB
MD55d2a199396a0bd5027f1d471210eb446
SHA13237dea6926772be66227d29a9b361305734af5a
SHA256ad6a085a27238c1122dfeead4feb7085a04da98ff6805dda8a816d099e46ae97
SHA512899bc54811858e79d64b1146f37208eee74455fa976e65f83c131ed65eb71a609f32fbeccc2de21328dbbcc100f7749520464b550ce65d278254ff6446b37e73
-
C:\Users\Admin\AppData\Local\Temp\vjfiz.exeFilesize
12KB
MD55d2a199396a0bd5027f1d471210eb446
SHA13237dea6926772be66227d29a9b361305734af5a
SHA256ad6a085a27238c1122dfeead4feb7085a04da98ff6805dda8a816d099e46ae97
SHA512899bc54811858e79d64b1146f37208eee74455fa976e65f83c131ed65eb71a609f32fbeccc2de21328dbbcc100f7749520464b550ce65d278254ff6446b37e73
-
C:\Users\Admin\AppData\Local\Temp\vjfiz.exeFilesize
12KB
MD55d2a199396a0bd5027f1d471210eb446
SHA13237dea6926772be66227d29a9b361305734af5a
SHA256ad6a085a27238c1122dfeead4feb7085a04da98ff6805dda8a816d099e46ae97
SHA512899bc54811858e79d64b1146f37208eee74455fa976e65f83c131ed65eb71a609f32fbeccc2de21328dbbcc100f7749520464b550ce65d278254ff6446b37e73
-
memory/516-250-0x0000000004EF0000-0x0000000004F1D000-memory.dmpFilesize
180KB
-
memory/516-255-0x0000000004EF0000-0x0000000004F1D000-memory.dmpFilesize
180KB
-
memory/516-251-0x00000000050A0000-0x00000000053C0000-memory.dmpFilesize
3.1MB
-
memory/516-263-0x0000000005480000-0x000000000550F000-memory.dmpFilesize
572KB
-
memory/516-249-0x0000000000970000-0x000000000097A000-memory.dmpFilesize
40KB
-
memory/516-231-0x0000000000000000-mapping.dmp
-
memory/1308-233-0x0000000000540000-0x000000000056F000-memory.dmpFilesize
188KB
-
memory/1308-229-0x0000000000A10000-0x0000000000BAE000-memory.dmpFilesize
1.6MB
-
memory/1308-220-0x0000000000E30000-0x0000000001150000-memory.dmpFilesize
3.1MB
-
memory/1308-219-0x0000000000540000-0x000000000056F000-memory.dmpFilesize
188KB
-
memory/1308-206-0x00000000005412B0-mapping.dmp
-
memory/2696-157-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB
-
memory/2696-152-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB
-
memory/2696-133-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB
-
memory/2696-134-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB
-
memory/2696-135-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB
-
memory/2696-137-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB
-
memory/2696-136-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB
-
memory/2696-139-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB
-
memory/2696-140-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB
-
memory/2696-138-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB
-
memory/2696-141-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB
-
memory/2696-143-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB
-
memory/2696-142-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB
-
memory/2696-144-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB
-
memory/2696-145-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB
-
memory/2696-146-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB
-
memory/2696-147-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB
-
memory/2696-148-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB
-
memory/2696-149-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB
-
memory/2696-150-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB
-
memory/2696-151-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB
-
memory/2696-130-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB
-
memory/2696-153-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB
-
memory/2696-154-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB
-
memory/2696-156-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB
-
memory/2696-155-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB
-
memory/2696-131-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB
-
memory/2696-158-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB
-
memory/2696-159-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB
-
memory/2696-160-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB
-
memory/2696-129-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB
-
memory/2696-120-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB
-
memory/2696-128-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB
-
memory/2696-132-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB
-
memory/2696-121-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB
-
memory/2696-122-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB
-
memory/2696-123-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB
-
memory/2696-124-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB
-
memory/2696-126-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB
-
memory/2696-125-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB
-
memory/2696-127-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB
-
memory/3044-230-0x0000000003010000-0x0000000003128000-memory.dmpFilesize
1.1MB
-
memory/3044-264-0x0000000006840000-0x00000000069AA000-memory.dmpFilesize
1.4MB
-
memory/3044-265-0x0000000006840000-0x00000000069AA000-memory.dmpFilesize
1.4MB
-
memory/3480-166-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB
-
memory/3480-178-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB
-
memory/3480-180-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB
-
memory/3480-183-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB
-
memory/3480-185-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB
-
memory/3480-186-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB
-
memory/3480-184-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB
-
memory/3480-161-0x0000000000000000-mapping.dmp
-
memory/3480-165-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB
-
memory/3480-171-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB
-
memory/3480-175-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB
-
memory/3480-177-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB
-
memory/3480-176-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB
-
memory/3480-173-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB
-
memory/3480-174-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB
-
memory/3480-172-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB
-
memory/3480-170-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB
-
memory/3480-168-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB
-
memory/3480-167-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB
-
memory/3480-164-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB
-
memory/3480-163-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB
-
memory/3480-182-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB
-
memory/3480-181-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB
-
memory/3480-179-0x0000000077890000-0x0000000077A1E000-memory.dmpFilesize
1.6MB