Analysis
-
max time kernel
187s -
max time network
194s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2022 07:37
Static task
static1
General
-
Target
22d3aa3de84b7d01eccdf2471c93da8cbdbf39afc3a1c149d2109f2f9644f5d7.exe
-
Size
225KB
-
MD5
f0a448d757645c4c8159d946be6cd741
-
SHA1
b91620ad9a0f0363bc2c1c853af4012966491706
-
SHA256
22d3aa3de84b7d01eccdf2471c93da8cbdbf39afc3a1c149d2109f2f9644f5d7
-
SHA512
0f02d99b5338c5869db540930f5b702a752ee7aa0ee3566f334c84783ce9bdd3c956f9f0073e4d11be7bd3e02c0b228c1761b9ee319f3739bcbdc8fd78d8163a
-
SSDEEP
3072:QEhKzShSycSMymlNbHD6OwfyAET17nwrmPRTFdyEOTwkBu8eg8HCRtFT+uwptnS2:QBn1yo5DXwfyA87nE04MEu6+uwXnp8Xm
Malware Config
Extracted
formbook
henz
IxWMb+jVsoinShuZJzk=
TPfKgQZ//oGnKr/J
EsK0WxD5kY65XOW1Td/5CxSUpCUytR7M
KebSmiCP9p8yUw==
HAt/ljkEuqMLHOLCi53Pv8MKX9qk
CY4ogZTwJc4vSw==
WWDIx5UYUDyepntE0YIAPca3/rI=
+Pkr01Lfb2rME7bL
S5nyK0p8jS2xdwQ=
W/oqvlO57LfkLcLHnQ==
zrrwtqkTLwxulm4l8FGopw==
AqucYext8bzFbOKthIm8E6gfVkUHxKY=
OfnjeDs78+RTcz4OHRl+
XKf1wwpZR5hLLjHgmUGOpQ==
JMyhSLoJPTCwn5o9zX2d8i1+
Wk54MBsDhWSVbnIRkQ==
7aaYR/tOhh9piTw5/KHSRwuK2iqgafw7pQ==
hH/EYxN+jC2xdwQ=
S0F4ORqDjS2xdwQ=
0o/UwXnuJ+sJp0cOHRl+
klE+E/jVelhT72wOHRl+
ZGvqyzaT9qfME7bL
czgajHaygm4=
KufYeyTiLhIGlzU6/38IM7IrqzhFa64=
oVNF+2VXWBL9jwGsK3Bw5TE=
iI3g6JaEalRvMDaz8AD4+vt0
nWtRAaSccRlLVg==
NtvDoS2UMcMRSA==
1t5MW/lEfjsUrFJeGXBw5TE=
UFixmi+P2cgqPRj09Sc=
MSuTonT5QhU11IGFYWKB6eJj
k4Lw3r+hTj9NF8+zgnu+Nsa3/rI=
NSN7fCqHln/S+RuZJzk=
dTUV1GY97NlVLsaSJXBw5TE=
8u5OLgNPRShyRRuZJzk=
BLTZ0G3iV0B5PvedL3Bw5TE=
ci8Y27nGCM69
JxF8W9/QoC2xdwQ=
KusZC8MsPClL1oMo8SA=
tW9XIP/VYTmVpWIDjIu1p5/ebhC9
pmc//mhFFgx3l1IOHRl+
MOsl9G5hQT6lhc0oLHWtrQ==
fXvSx46RRSiGjWphOnO0p8a3/rI=
D8Hx4JoDG+znbnIRkQ==
Dsfu2pqFJP0Kv0gX1CGX3Sw=
FcGnEr4fhW7ME7bL
hkc37Y3GF8gTMAw=
dnGZWjqPqYqgTxuZJzk=
iDEV43sIvE1j7psMiQ==
vb8qEoNQBus+mQXst1h2
46qCRt3j3cfneiudJjE=
8eoYvzW2PgDrffLWrav++Mf1TUUHxKY=
vqkFDa0HYztZ+G8ODZ7Qug==
+K/F0qEnTxACrzMR2OocXxecmq31afw7pQ==
Egwn/u1rq2uVbnIRkQ==
nFVH/3fvalaRbnIRkQ==
CvtveEUyyqUJLOiOKnBw5TE=
dmfN5LErTj9l/Icl8FGopw==
VAQtEMawYiNPaTxLIxdbpD9sZL0=
MBSMhSCOHdpCVQ==
jz95eCeaJc4vSw==
85N/Gcy+XicYq0cOHRl+
D/1B46soVTKObnIRkQ==
Hgytgwn25KqyVRuZJzk=
brennancorps.info
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
xdzkcooocd.exexdzkcooocd.exepid process 4692 xdzkcooocd.exe 4764 xdzkcooocd.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
xdzkcooocd.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation xdzkcooocd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
xdzkcooocd.exexdzkcooocd.exewlanext.exedescription pid process target process PID 4692 set thread context of 4764 4692 xdzkcooocd.exe xdzkcooocd.exe PID 4764 set thread context of 2348 4764 xdzkcooocd.exe Explorer.EXE PID 4556 set thread context of 2348 4556 wlanext.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
wlanext.exedescription ioc process Key created \Registry\User\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 wlanext.exe -
Suspicious behavior: EnumeratesProcesses 56 IoCs
Processes:
xdzkcooocd.exewlanext.exepid process 4764 xdzkcooocd.exe 4764 xdzkcooocd.exe 4764 xdzkcooocd.exe 4764 xdzkcooocd.exe 4764 xdzkcooocd.exe 4764 xdzkcooocd.exe 4764 xdzkcooocd.exe 4764 xdzkcooocd.exe 4556 wlanext.exe 4556 wlanext.exe 4556 wlanext.exe 4556 wlanext.exe 4556 wlanext.exe 4556 wlanext.exe 4556 wlanext.exe 4556 wlanext.exe 4556 wlanext.exe 4556 wlanext.exe 4556 wlanext.exe 4556 wlanext.exe 4556 wlanext.exe 4556 wlanext.exe 4556 wlanext.exe 4556 wlanext.exe 4556 wlanext.exe 4556 wlanext.exe 4556 wlanext.exe 4556 wlanext.exe 4556 wlanext.exe 4556 wlanext.exe 4556 wlanext.exe 4556 wlanext.exe 4556 wlanext.exe 4556 wlanext.exe 4556 wlanext.exe 4556 wlanext.exe 4556 wlanext.exe 4556 wlanext.exe 4556 wlanext.exe 4556 wlanext.exe 4556 wlanext.exe 4556 wlanext.exe 4556 wlanext.exe 4556 wlanext.exe 4556 wlanext.exe 4556 wlanext.exe 4556 wlanext.exe 4556 wlanext.exe 4556 wlanext.exe 4556 wlanext.exe 4556 wlanext.exe 4556 wlanext.exe 4556 wlanext.exe 4556 wlanext.exe 4556 wlanext.exe 4556 wlanext.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 2348 Explorer.EXE -
Suspicious behavior: MapViewOfSection 8 IoCs
Processes:
xdzkcooocd.exexdzkcooocd.exewlanext.exepid process 4692 xdzkcooocd.exe 4764 xdzkcooocd.exe 4764 xdzkcooocd.exe 4764 xdzkcooocd.exe 4556 wlanext.exe 4556 wlanext.exe 4556 wlanext.exe 4556 wlanext.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
xdzkcooocd.exewlanext.exedescription pid process Token: SeDebugPrivilege 4764 xdzkcooocd.exe Token: SeDebugPrivilege 4556 wlanext.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
22d3aa3de84b7d01eccdf2471c93da8cbdbf39afc3a1c149d2109f2f9644f5d7.exexdzkcooocd.exeExplorer.EXEwlanext.exedescription pid process target process PID 3260 wrote to memory of 4692 3260 22d3aa3de84b7d01eccdf2471c93da8cbdbf39afc3a1c149d2109f2f9644f5d7.exe xdzkcooocd.exe PID 3260 wrote to memory of 4692 3260 22d3aa3de84b7d01eccdf2471c93da8cbdbf39afc3a1c149d2109f2f9644f5d7.exe xdzkcooocd.exe PID 3260 wrote to memory of 4692 3260 22d3aa3de84b7d01eccdf2471c93da8cbdbf39afc3a1c149d2109f2f9644f5d7.exe xdzkcooocd.exe PID 4692 wrote to memory of 4764 4692 xdzkcooocd.exe xdzkcooocd.exe PID 4692 wrote to memory of 4764 4692 xdzkcooocd.exe xdzkcooocd.exe PID 4692 wrote to memory of 4764 4692 xdzkcooocd.exe xdzkcooocd.exe PID 4692 wrote to memory of 4764 4692 xdzkcooocd.exe xdzkcooocd.exe PID 2348 wrote to memory of 4556 2348 Explorer.EXE wlanext.exe PID 2348 wrote to memory of 4556 2348 Explorer.EXE wlanext.exe PID 2348 wrote to memory of 4556 2348 Explorer.EXE wlanext.exe PID 4556 wrote to memory of 4724 4556 wlanext.exe Firefox.exe PID 4556 wrote to memory of 4724 4556 wlanext.exe Firefox.exe PID 4556 wrote to memory of 4724 4556 wlanext.exe Firefox.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\22d3aa3de84b7d01eccdf2471c93da8cbdbf39afc3a1c149d2109f2f9644f5d7.exe"C:\Users\Admin\AppData\Local\Temp\22d3aa3de84b7d01eccdf2471c93da8cbdbf39afc3a1c149d2109f2f9644f5d7.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\xdzkcooocd.exe"C:\Users\Admin\AppData\Local\Temp\xdzkcooocd.exe" C:\Users\Admin\AppData\Local\Temp\ciejdgh.ks3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\xdzkcooocd.exe"C:\Users\Admin\AppData\Local\Temp\xdzkcooocd.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\ciejdgh.ksFilesize
5KB
MD595f94f6c0937426a27ffe4a6c0c1f1ac
SHA1c7e7e326ba7ce106921de134e87bf4b58251e763
SHA25645919c2c09661fb3b6ea8078c9e14dfb963fd5b4756508319b6914a4fbfc5169
SHA512f772938ab6c24a18e455a99296050193f717cf064738d595000f7204589a4a9280e96bb3b64017cd05e2d12e83404cb21da62090e46aefb7e227260c064948fb
-
C:\Users\Admin\AppData\Local\Temp\ljilba.izeFilesize
185KB
MD59e9e2574d508f0b065ce631116acb491
SHA1137d9d3b0ce32f643f8f3e9634d256d23d16e5cd
SHA256fd536d04e6b8da9b8b52e50efaefe6aa430ab65dfb44f33c12a7c4f4097af822
SHA5125bdcaedcb9681a910ef43cf2ba90f5322c2c5d81cd2f48b39d16206c171281267af2c180f0948ddcae5158cf00a3cb7f61badae8518ba4df61a8e48274f48f04
-
C:\Users\Admin\AppData\Local\Temp\xdzkcooocd.exeFilesize
11KB
MD5ff87e63143afb855a2adbb4928a63dd7
SHA10dc06e5c93a4c756c421a9933593d7447e32a57b
SHA25662cd6b74528739d323d14f14d31b142a6b1f7fc4540cfa3a9f387f84ee73b269
SHA5123dc235c2d23ad12cafeca9f0ee8da566a427775780d1e153d871c4d584871c9fa74b2779a52a36e6cd92bc3e7a538d7b93aa676aab09a7ac24e8958ab5378360
-
C:\Users\Admin\AppData\Local\Temp\xdzkcooocd.exeFilesize
11KB
MD5ff87e63143afb855a2adbb4928a63dd7
SHA10dc06e5c93a4c756c421a9933593d7447e32a57b
SHA25662cd6b74528739d323d14f14d31b142a6b1f7fc4540cfa3a9f387f84ee73b269
SHA5123dc235c2d23ad12cafeca9f0ee8da566a427775780d1e153d871c4d584871c9fa74b2779a52a36e6cd92bc3e7a538d7b93aa676aab09a7ac24e8958ab5378360
-
C:\Users\Admin\AppData\Local\Temp\xdzkcooocd.exeFilesize
11KB
MD5ff87e63143afb855a2adbb4928a63dd7
SHA10dc06e5c93a4c756c421a9933593d7447e32a57b
SHA25662cd6b74528739d323d14f14d31b142a6b1f7fc4540cfa3a9f387f84ee73b269
SHA5123dc235c2d23ad12cafeca9f0ee8da566a427775780d1e153d871c4d584871c9fa74b2779a52a36e6cd92bc3e7a538d7b93aa676aab09a7ac24e8958ab5378360
-
memory/2348-153-0x00000000088F0000-0x0000000008A0E000-memory.dmpFilesize
1.1MB
-
memory/2348-152-0x00000000088F0000-0x0000000008A0E000-memory.dmpFilesize
1.1MB
-
memory/2348-143-0x0000000008400000-0x0000000008518000-memory.dmpFilesize
1.1MB
-
memory/4556-147-0x0000000000AC0000-0x0000000000AD7000-memory.dmpFilesize
92KB
-
memory/4556-151-0x0000000000EB0000-0x0000000000F3F000-memory.dmpFilesize
572KB
-
memory/4556-150-0x0000000000780000-0x00000000007AD000-memory.dmpFilesize
180KB
-
memory/4556-149-0x0000000000780000-0x00000000007AD000-memory.dmpFilesize
180KB
-
memory/4556-148-0x0000000001110000-0x000000000145A000-memory.dmpFilesize
3.3MB
-
memory/4556-144-0x0000000000000000-mapping.dmp
-
memory/4692-132-0x0000000000000000-mapping.dmp
-
memory/4764-137-0x0000000000000000-mapping.dmp
-
memory/4764-146-0x0000000000401000-0x000000000042F000-memory.dmpFilesize
184KB
-
memory/4764-145-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/4764-142-0x0000000001020000-0x0000000001030000-memory.dmpFilesize
64KB
-
memory/4764-141-0x0000000001630000-0x000000000197A000-memory.dmpFilesize
3.3MB
-
memory/4764-140-0x0000000000401000-0x000000000042F000-memory.dmpFilesize
184KB
-
memory/4764-139-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB