Analysis
-
max time kernel
153s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 07:06
Static task
static1
Behavioral task
behavioral1
Sample
0870a4727fcd6ce557f017f0fed61f51.exe
Resource
win7-20220901-en
General
-
Target
0870a4727fcd6ce557f017f0fed61f51.exe
-
Size
343KB
-
MD5
0870a4727fcd6ce557f017f0fed61f51
-
SHA1
6ad1abe4d5d4f44ea753fb10df927adb1f139f2e
-
SHA256
14afee34b6a36a32b34c61556e46fef92e6a2d9066c758308bb9caea4a94ae2a
-
SHA512
7a97ad7ab0f0f23883ca3ee33fdf5ecca2ee3d28df3295ba3b1f1a04b71c62c7dbb7c3bc41d13ac7a84e286b41d130ef4e07a9ad79e7146e9f44baca513a03c5
-
SSDEEP
6144:ZBnbr9ZL8bM0rCfO4AFSnQNYnx3b+/wmsqplIQ037:HfL8bM9fz8SnQyRWwmxsQg
Malware Config
Extracted
formbook
f4ca
omFHB5ajfJi1UEIEV9XcoRw=
UBjJkmQPyprdhcFF/bdCWQ==
evGKkBUj1je+otcfpw==
KgvGVeOATSt3nug0BIOm2JvOQycB
Lv6o3K0r9aSjI0lr9fg1txw=
LH1jJb/HieQpsEdqWCQTvX2PmsDVIeg=
99dte0XauJfk6Xv+uQxJFgA1gMktBA==
21FkkGB9gMniDQw2ffu6
r4lKBM/q6TZwVZfS
F+14qHeVWi56KdQ=
BgWXRsVoICMvvQ==
I+EozFl0Uy56KdQ=
xoXCgEllKEbWfjFCCLo=
qo9G1lXvvGt5GkxrLQWw
ORNlYic0PJ2ip4geEFSv
Yj+GFpvFxy0uVYx1fLI/XQ==
XL+veIKPjOTe4fjvFs+n
D2JKVAfuakXCAyoEvw==
voWJU81tH56wvt/vImbCcgVd
dVEcwFrmb8bZ4vXvFs+n
CMlcaOUF6cB+8Bnm2Kc=
NpYV3moXNE+ZQ4f9nVGCSA==
/GRkjGd1acLHyeLvImbCcgVd
R52MlF+Ag+LtFr1QKa7Zf/5a
kVD/mSO1YK75pA==
5q3IANfo/JHiDww2ffu6
4i8RFOH2ACRdhzja
VLWOSRe00XX6sNsijPzqiiWfFgf1J+g=
qnsgRFL46lWG
xo1QHOyKS9rj4fjvFs+n
mIHZlAqzS6ymmpMCU1uyZgE=
WCtjiGCFl/4JTiJ0R60=
c0vpAtZ3fY7TeLfdcnASQg==
Y87Xlic9/1+q3g/pUArVoB4=
kKOsRsf05wBOd67a
dDmgYgOZZ0aCMVwgDha4bgc=
ieXCbvcCyja+otcfpw==
Fd0XQwkTHHaBmNDvImbCcgVd
PK/M6eM8xOwqvw==
Pf0q8MdfICMvvQ==
EO8aPQwf7z2Du+XvImbCcgVd
BeUisSg/Ql6uJcg=
ay2v2pz4gomTESLosQ==
AGjX3ak2B+FyQ9ZKrQ==
Du0y0UXomyoxT4/arA8Du3FvpwE=
xhV7OrDTdonq4fjvFs+n
9+s2xTlaW66p2IAAnVkDQA==
AuS2UeN4Nsvl5vo8J67Zf/5a
B1vK2590RiUuuw==
/709BIUfMCIln8sus2u2aAM=
BMpYckjp699wVZfS
Pf2AqIscEhlpHlnV18IvVQk=
RKUTxUbz/zFroN/LLq+kIdZM
IuuiQ9pj7ZzciLVPiks4Rxc=
0KBn8XAV7NNm2xPxuA==
nv7yBtDj4UNE/ju8er1EZSanBXfyLv4=
sBgf41X1vKTwUspTsg==
5bk4+oQWD+X01tBEqQ==
c08KjxWnau8DDSsESMKNI+P5G/6/sYjU6g==
RJiyeEVj/N3rhNAW3qU=
v6O7hhQxA//+Oyq2ms9DWQ==
7MdHCYCb4OT5pg==
Je0NLgIfKIeFuyjxYD+i
68P+tIkhBdlwVZfS
inthecryptolane.com
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4992 vjfiz.exe 4932 vjfiz.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation vjfiz.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4992 set thread context of 4932 4992 vjfiz.exe 81 PID 4932 set thread context of 2864 4932 vjfiz.exe 54 PID 2116 set thread context of 2864 2116 cmstp.exe 54 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \Registry\User\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 cmstp.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 4932 vjfiz.exe 4932 vjfiz.exe 4932 vjfiz.exe 4932 vjfiz.exe 4932 vjfiz.exe 4932 vjfiz.exe 4932 vjfiz.exe 4932 vjfiz.exe 2116 cmstp.exe 2116 cmstp.exe 2116 cmstp.exe 2116 cmstp.exe 2116 cmstp.exe 2116 cmstp.exe 2116 cmstp.exe 2116 cmstp.exe 2116 cmstp.exe 2116 cmstp.exe 2116 cmstp.exe 2116 cmstp.exe 2116 cmstp.exe 2116 cmstp.exe 2116 cmstp.exe 2116 cmstp.exe 2116 cmstp.exe 2116 cmstp.exe 2116 cmstp.exe 2116 cmstp.exe 2116 cmstp.exe 2116 cmstp.exe 2116 cmstp.exe 2116 cmstp.exe 2116 cmstp.exe 2116 cmstp.exe 2116 cmstp.exe 2116 cmstp.exe 2116 cmstp.exe 2116 cmstp.exe 2116 cmstp.exe 2116 cmstp.exe 2116 cmstp.exe 2116 cmstp.exe 2116 cmstp.exe 2116 cmstp.exe 2116 cmstp.exe 2116 cmstp.exe 2116 cmstp.exe 2116 cmstp.exe 2116 cmstp.exe 2116 cmstp.exe 2116 cmstp.exe 2116 cmstp.exe 2116 cmstp.exe 2116 cmstp.exe 2116 cmstp.exe 2116 cmstp.exe 2116 cmstp.exe 2116 cmstp.exe 2116 cmstp.exe 2116 cmstp.exe 2116 cmstp.exe 2116 cmstp.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2864 Explorer.EXE -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 4992 vjfiz.exe 4932 vjfiz.exe 4932 vjfiz.exe 4932 vjfiz.exe 2116 cmstp.exe 2116 cmstp.exe 2116 cmstp.exe 2116 cmstp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4932 vjfiz.exe Token: SeDebugPrivilege 2116 cmstp.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 5076 wrote to memory of 4992 5076 0870a4727fcd6ce557f017f0fed61f51.exe 80 PID 5076 wrote to memory of 4992 5076 0870a4727fcd6ce557f017f0fed61f51.exe 80 PID 5076 wrote to memory of 4992 5076 0870a4727fcd6ce557f017f0fed61f51.exe 80 PID 4992 wrote to memory of 4932 4992 vjfiz.exe 81 PID 4992 wrote to memory of 4932 4992 vjfiz.exe 81 PID 4992 wrote to memory of 4932 4992 vjfiz.exe 81 PID 4992 wrote to memory of 4932 4992 vjfiz.exe 81 PID 2864 wrote to memory of 2116 2864 Explorer.EXE 82 PID 2864 wrote to memory of 2116 2864 Explorer.EXE 82 PID 2864 wrote to memory of 2116 2864 Explorer.EXE 82 PID 2116 wrote to memory of 756 2116 cmstp.exe 90 PID 2116 wrote to memory of 756 2116 cmstp.exe 90 PID 2116 wrote to memory of 756 2116 cmstp.exe 90
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\0870a4727fcd6ce557f017f0fed61f51.exe"C:\Users\Admin\AppData\Local\Temp\0870a4727fcd6ce557f017f0fed61f51.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Users\Admin\AppData\Local\Temp\vjfiz.exe"C:\Users\Admin\AppData\Local\Temp\vjfiz.exe" C:\Users\Admin\AppData\Local\Temp\tysrzemvxjx.lq3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Users\Admin\AppData\Local\Temp\vjfiz.exe"C:\Users\Admin\AppData\Local\Temp\vjfiz.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4932
-
-
-
-
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:756
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
185KB
MD56bff3f9f5f10ca6c482120d288b62b08
SHA1e6e72efca642290d5daaf4c8b2fe5a759e1eadd7
SHA256499c77843bfd10fce945eab5d76cd783cd1f21aba38a1f36f854825d1f2083da
SHA512ba7dd6f593bca04792711c46f22137841efc1663aee27c8bc1fe99bc057b5475ef9240880e2a391eed5e99f59142fb49d3d35d8fc558e096127c601ece4f1d2a
-
Filesize
5KB
MD536cf5f2a5ec6b153ee2c785c517153fa
SHA121fb70c9c27ea827abd77d7adfef003acc7b1b03
SHA25684a0d75969da88bc18370ded6588bca0d05525a24bc472c1c84bade9fc1c0479
SHA512d80a2cd1c4d0f86c64e06b728f99a8dee2239f2f0652cc88b0cd02ee28fda16309b3b7cb70b5254821fcec4b6bee640a431f08986faae8f8173b09cee3c09521
-
Filesize
12KB
MD55d2a199396a0bd5027f1d471210eb446
SHA13237dea6926772be66227d29a9b361305734af5a
SHA256ad6a085a27238c1122dfeead4feb7085a04da98ff6805dda8a816d099e46ae97
SHA512899bc54811858e79d64b1146f37208eee74455fa976e65f83c131ed65eb71a609f32fbeccc2de21328dbbcc100f7749520464b550ce65d278254ff6446b37e73
-
Filesize
12KB
MD55d2a199396a0bd5027f1d471210eb446
SHA13237dea6926772be66227d29a9b361305734af5a
SHA256ad6a085a27238c1122dfeead4feb7085a04da98ff6805dda8a816d099e46ae97
SHA512899bc54811858e79d64b1146f37208eee74455fa976e65f83c131ed65eb71a609f32fbeccc2de21328dbbcc100f7749520464b550ce65d278254ff6446b37e73
-
Filesize
12KB
MD55d2a199396a0bd5027f1d471210eb446
SHA13237dea6926772be66227d29a9b361305734af5a
SHA256ad6a085a27238c1122dfeead4feb7085a04da98ff6805dda8a816d099e46ae97
SHA512899bc54811858e79d64b1146f37208eee74455fa976e65f83c131ed65eb71a609f32fbeccc2de21328dbbcc100f7749520464b550ce65d278254ff6446b37e73