Analysis
-
max time kernel
185s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2022 13:33
Static task
static1
Behavioral task
behavioral1
Sample
PRODUCTS LIST INQUIRY.exe
Resource
win7-20221111-en
General
-
Target
PRODUCTS LIST INQUIRY.exe
-
Size
833KB
-
MD5
62dbf29de2b765943525b45e080c168a
-
SHA1
cd40c7a3ae6d2c6e2c7436eb5da2407d84f6cc7b
-
SHA256
52b739a0edc9a1a008131eedb6b9385e6aa99ea46e15ab65fa7e1045ec6908e2
-
SHA512
4059ebb5665670ba140a14aad5996407fe843bb19491b9f10a00e423c5e1332a8a325dd8fa4e438418d5ef1a451d749b19506c18cae4218161b140346d780a54
-
SSDEEP
12288:IckyiUw4N8guVN4P9OCEqrK40DafmmiVR2mqrYy6FjmaZgKZ/nXt7virmWhlGLak:bkyiN4GPVN4P9OFqu40DRRmY
Malware Config
Extracted
formbook
0vh9
kT0Usm0+fHGF7CkiArMh/tpf8d/XmQE=
0fmX7QILD44W+4BvafbZzOs=
cu0K8dW1ampaxA==
mMUbaeih2AfncJFGQQ==
hbUGHyjFfvGHWhfdzKFAKACZFug=
yjwyDLSAuuQScZpTEt/p0g==
QVOuL9rCqaSZBDn18NM=
80J9zt627lL0
dRXhSLjVSYyE2g==
QuSd7Qu7JmkOkqOTf9gC4P5d322R+Ak=
TGmyjSzk7VR50A==
Per96I1KSYyE2g==
smg9xW2N/NH8O5xPQw==
epfEwPC7ggR37cX39cc=
s2tPNeqhoGyRpCQevaVh
0HJrO9mYxtjW0m+nEfbZzOs=
9ppmyuPh6JiKX+17X/bZzOs=
wrxE0u6FSNp5RtFYT83Yj+s2sz4kyg==
y4FnMsyMjUo7DqoovqLXyw==
tWNC35fFQyZe1Mt7fAQyHuycNOs=
LkPEYuLzgcxDq6xSEt/p0g==
tEDkQVEFc0g1O5xPQw==
vlt3HHDbR5p0YdGSWw==
K+UO41DfEQ0uiXOxBijXTeM=
s2E+EhJEePRzYuXWlqNKnEBD
vz9jPdr4zPvSuGvl
NqVtAraE0NHCu2TYDqrjzw==
VfTgwXZASYyE2g==
HjRiL86Mm9LzeZZOSw==
rssRFz8DZJ8MW1+gX2jvYO0=
0I6jmUt8MjYyncmDfgExHQCZFug=
rcXrnEZ6KTBh3MX39cc=
fUttTKBXziC5iiEevaVh
TxIQwdTsqDNFpOU=
dNXmsxuuoGQTMrDt
/rvUu2QjXV1Svfi2efbZzOs=
9xE76Fj8OyhSyMiGZ9ANAtpf8d/XmQE=
RD/CYgjEB+7nDXo4MMHo2g==
koCfhYxWFHNi4vI=
xJJsA69spND5SF4LA6HRpb8ldXT782mUnA==
0HeKeChZ4cn9O5xPQw==
Nq28w6+v8d7RICXs6aQvIQCZFug=
B3M0y2l579uD0Os=
yYNnTAKs49b9O5xPQw==
5xVy2f2HQtR3R+wevaVh
msCc7w95hfVgAO4tl7AZtkXCd4i4AB95
Hbpe75G5NWsTlbix/PWUCpIcVmPP
ncD1rI16DFM=
mC5kGMz7fHNi4vI=
1PWl+Q04QKlQOu1hx6hvG3Jhew==
Rv80QxE+tumULFtRPYt28IBrbH64AB95
Aquuv19j7dYAyHp8D0ZKskRD
GAUzAzL7RWVeMddgEt/p0g==
7Q91FGcibh8F0HHl
M6Nu7VXxLC2IgMX39cc=
p77o5UiO2RTj
sdRCmQIh2hJBm7RxXPbZzOs=
rgCmKFcTOlqTIEIE2YwqIgCZFug=
+zfRX4EZymzuUX160sso2W9S
kZLyfPyR0QArO5xPQw==
cB05Gb3UXFB23tkXCM0=
aMRW3f8KDLabWpZUSw==
hCQoN85YnJuUj/ohm6ph7z8zYg==
U2jgS3eeWUtkxw==
8499162.xyz
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
PRODUCTS LIST INQUIRY.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation PRODUCTS LIST INQUIRY.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
PRODUCTS LIST INQUIRY.exePRODUCTS LIST INQUIRY.execolorcpl.exedescription pid process target process PID 2024 set thread context of 3828 2024 PRODUCTS LIST INQUIRY.exe PRODUCTS LIST INQUIRY.exe PID 3828 set thread context of 2644 3828 PRODUCTS LIST INQUIRY.exe Explorer.EXE PID 4924 set thread context of 2644 4924 colorcpl.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
PRODUCTS LIST INQUIRY.exePRODUCTS LIST INQUIRY.execolorcpl.exepid process 2024 PRODUCTS LIST INQUIRY.exe 2024 PRODUCTS LIST INQUIRY.exe 2024 PRODUCTS LIST INQUIRY.exe 2024 PRODUCTS LIST INQUIRY.exe 2024 PRODUCTS LIST INQUIRY.exe 2024 PRODUCTS LIST INQUIRY.exe 3828 PRODUCTS LIST INQUIRY.exe 3828 PRODUCTS LIST INQUIRY.exe 3828 PRODUCTS LIST INQUIRY.exe 3828 PRODUCTS LIST INQUIRY.exe 3828 PRODUCTS LIST INQUIRY.exe 3828 PRODUCTS LIST INQUIRY.exe 3828 PRODUCTS LIST INQUIRY.exe 3828 PRODUCTS LIST INQUIRY.exe 4924 colorcpl.exe 4924 colorcpl.exe 4924 colorcpl.exe 4924 colorcpl.exe 4924 colorcpl.exe 4924 colorcpl.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
PRODUCTS LIST INQUIRY.execolorcpl.exepid process 3828 PRODUCTS LIST INQUIRY.exe 3828 PRODUCTS LIST INQUIRY.exe 3828 PRODUCTS LIST INQUIRY.exe 4924 colorcpl.exe 4924 colorcpl.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
PRODUCTS LIST INQUIRY.exePRODUCTS LIST INQUIRY.execolorcpl.exedescription pid process Token: SeDebugPrivilege 2024 PRODUCTS LIST INQUIRY.exe Token: SeDebugPrivilege 3828 PRODUCTS LIST INQUIRY.exe Token: SeDebugPrivilege 4924 colorcpl.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
PRODUCTS LIST INQUIRY.exeExplorer.EXEdescription pid process target process PID 2024 wrote to memory of 2708 2024 PRODUCTS LIST INQUIRY.exe PRODUCTS LIST INQUIRY.exe PID 2024 wrote to memory of 2708 2024 PRODUCTS LIST INQUIRY.exe PRODUCTS LIST INQUIRY.exe PID 2024 wrote to memory of 2708 2024 PRODUCTS LIST INQUIRY.exe PRODUCTS LIST INQUIRY.exe PID 2024 wrote to memory of 3476 2024 PRODUCTS LIST INQUIRY.exe PRODUCTS LIST INQUIRY.exe PID 2024 wrote to memory of 3476 2024 PRODUCTS LIST INQUIRY.exe PRODUCTS LIST INQUIRY.exe PID 2024 wrote to memory of 3476 2024 PRODUCTS LIST INQUIRY.exe PRODUCTS LIST INQUIRY.exe PID 2024 wrote to memory of 1668 2024 PRODUCTS LIST INQUIRY.exe PRODUCTS LIST INQUIRY.exe PID 2024 wrote to memory of 1668 2024 PRODUCTS LIST INQUIRY.exe PRODUCTS LIST INQUIRY.exe PID 2024 wrote to memory of 1668 2024 PRODUCTS LIST INQUIRY.exe PRODUCTS LIST INQUIRY.exe PID 2024 wrote to memory of 3828 2024 PRODUCTS LIST INQUIRY.exe PRODUCTS LIST INQUIRY.exe PID 2024 wrote to memory of 3828 2024 PRODUCTS LIST INQUIRY.exe PRODUCTS LIST INQUIRY.exe PID 2024 wrote to memory of 3828 2024 PRODUCTS LIST INQUIRY.exe PRODUCTS LIST INQUIRY.exe PID 2024 wrote to memory of 3828 2024 PRODUCTS LIST INQUIRY.exe PRODUCTS LIST INQUIRY.exe PID 2024 wrote to memory of 3828 2024 PRODUCTS LIST INQUIRY.exe PRODUCTS LIST INQUIRY.exe PID 2024 wrote to memory of 3828 2024 PRODUCTS LIST INQUIRY.exe PRODUCTS LIST INQUIRY.exe PID 2644 wrote to memory of 4924 2644 Explorer.EXE colorcpl.exe PID 2644 wrote to memory of 4924 2644 Explorer.EXE colorcpl.exe PID 2644 wrote to memory of 4924 2644 Explorer.EXE colorcpl.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\PRODUCTS LIST INQUIRY.exe"C:\Users\Admin\AppData\Local\Temp\PRODUCTS LIST INQUIRY.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\PRODUCTS LIST INQUIRY.exe"C:\Users\Admin\AppData\Local\Temp\PRODUCTS LIST INQUIRY.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\PRODUCTS LIST INQUIRY.exe"C:\Users\Admin\AppData\Local\Temp\PRODUCTS LIST INQUIRY.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\PRODUCTS LIST INQUIRY.exe"C:\Users\Admin\AppData\Local\Temp\PRODUCTS LIST INQUIRY.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\PRODUCTS LIST INQUIRY.exe"C:\Users\Admin\AppData\Local\Temp\PRODUCTS LIST INQUIRY.exe"3⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\colorcpl.exe"C:\Windows\SysWOW64\colorcpl.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1668-139-0x0000000000000000-mapping.dmp
-
memory/2024-132-0x0000000000A70000-0x0000000000B46000-memory.dmpFilesize
856KB
-
memory/2024-133-0x00000000059E0000-0x0000000005F84000-memory.dmpFilesize
5.6MB
-
memory/2024-134-0x0000000005430000-0x00000000054C2000-memory.dmpFilesize
584KB
-
memory/2024-135-0x0000000005390000-0x000000000539A000-memory.dmpFilesize
40KB
-
memory/2024-136-0x0000000007750000-0x00000000077EC000-memory.dmpFilesize
624KB
-
memory/2644-158-0x00000000033A0000-0x00000000034B0000-memory.dmpFilesize
1.1MB
-
memory/2644-155-0x0000000008660000-0x00000000087A5000-memory.dmpFilesize
1.3MB
-
memory/2644-148-0x0000000008660000-0x00000000087A5000-memory.dmpFilesize
1.3MB
-
memory/2708-137-0x0000000000000000-mapping.dmp
-
memory/3476-138-0x0000000000000000-mapping.dmp
-
memory/3828-145-0x00000000015D0000-0x000000000191A000-memory.dmpFilesize
3.3MB
-
memory/3828-141-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/3828-147-0x0000000001070000-0x0000000001080000-memory.dmpFilesize
64KB
-
memory/3828-143-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/3828-149-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/3828-150-0x0000000000401000-0x000000000042F000-memory.dmpFilesize
184KB
-
memory/3828-140-0x0000000000000000-mapping.dmp
-
memory/3828-144-0x0000000000401000-0x000000000042F000-memory.dmpFilesize
184KB
-
memory/4924-153-0x0000000000C80000-0x0000000000CAD000-memory.dmpFilesize
180KB
-
memory/4924-154-0x0000000002C00000-0x0000000002F4A000-memory.dmpFilesize
3.3MB
-
memory/4924-152-0x0000000000650000-0x0000000000669000-memory.dmpFilesize
100KB
-
memory/4924-156-0x0000000000C80000-0x0000000000CAD000-memory.dmpFilesize
180KB
-
memory/4924-157-0x0000000002B30000-0x0000000002BBF000-memory.dmpFilesize
572KB
-
memory/4924-151-0x0000000000000000-mapping.dmp