Analysis
-
max time kernel
304s -
max time network
328s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2022 15:10
Static task
static1
Behavioral task
behavioral1
Sample
VESSEL_S_SPEC-BBN_SUPRA.exe
Resource
win7-20220901-en
General
-
Target
VESSEL_S_SPEC-BBN_SUPRA.exe
-
Size
351KB
-
MD5
359048b5dc3e27a1d81172b25d93d6b2
-
SHA1
9efff8dfb886f8bf8fac3d354f674f92e80aa8fe
-
SHA256
b48e1af2b9c183088065530dad02ce3b2d2a333e899017a34c1a817ed892eb73
-
SHA512
0d80c670f0734ac145b1499900e7d03946cb69901499a51ae1db9397d5dbae17ffa9c5e4150a35fe40d37edb5b8b2cc910e63f252c2d9f5bc2e95572b0d8d192
-
SSDEEP
6144:sh0f3Yw7yGailqh/WqbYjzA2MVu+ocixl5MgphAcy67gtgz4o2+2iOFn0pcccccI:Ss3Yw7yGJqYzAlVL8lnjPrgtg8ojF
Malware Config
Extracted
formbook
ermr
ErOK6LFCgNIAlQmH54oaYOL/CN29Z78=
qNSdDhu/PT/1fgafDagiCSZH1SY=
wLpPOAkYS8EABl3pHGc4hNT/Q1sHBrU=
jSxRvptHkeTGl7PT0SEmaZmjqzanuA==
b91oL+2wCcpyhnd6yvF6Pg==
mr81yp1/qqZX
hy7Xsz/PU/LWHMcGL4UYJx9n3A==
KlwrHt1gouPaXaWhoQ==
ng8M320IRJL9Ptw=
8GQbOXuaWxvKnNM=
XndOL7E5sNpVUNty4d/a
rryPBBC8PybYb+2h2MF3FHGL
kEoeyERSVCYO0g==
5/P+SBDby5hO
1fYXc30/h9W7iO17
34X+YKR+wRFE
8ir/X2MlVByh5lQ1ow8=
u9ikm2UMZ7J7hpCYow==
FLI+c3clp1BNDjVAfvC2Dnw=
t21Erq8/r09wAzAJTAH3Ng==
VAg3gU1KH9uW3YIPAgc=
Gjlc09d6qurdLePSLZktDmGA1A==
MMraOD3ve5odaf+03cB3FHGL
mLRTTAycMcrHgomShQHVwfFKkGQaehvF
fpab65mlchvKnNM=
M6jUQU0omipqaUNXyvF6Pg==
S/XrNQGVvwUsSnKFyvF6Pg==
LeC0GeF2zvCosNtMx5RltjCD
Y+IGYC/XHS63wIus5n08ADN2qzanuA==
3tJus7Rc6OtWnx9y4d/a
4uSOYiXhGxumZcTLuA==
5PyP2thOiIucXaWhoQ==
6978Rw3FNTibYVQ1ow8=
3Ah90lcSVCYO0g==
V/UQWRsOOQjDye9m0cLQ
yRXcMfySzTmEhddhqljeGH8=
vWuKFZKZ48E=
8+UEda631IpZ
LUofBqVNdT/v+MXiEWm90Ape3g==
NCi29RHdDYd7hso=
i36jBdNko/HyUKg1eWYgJx9n3A==
vdblMhHYSkgDmBly4d/a
oQmZH6K31IpZ
fCBHqaFGx9OUMMuBr5GWDXXY5DAT
FDXweHcHVCYO0g==
qSQd9bd7BQavQ9NbcUT+O6e4OGsaehvF
vN98englU4HHzqi36ju/91SJ
prTUIBi6MhiXZFQ1ow8=
w008jVXdCYd7hso=
p1kghFnjD9iADog5cVDmvrDiTjk=
xLjHJFYDQL+ysdk=
6tiR9MZa9xSMXVQ1ow8=
WMzXJPGcyIrP2g==
SeI4PsQ+N/O0iMs=
+4o0lKRDsz+RUqpoBvt3FHGL
AHQG4ZsybzCo8ZlBs1jeGH8=
kIgR46ls4wiGUJZLtFjeGH8=
b/fmPTHIRhvKnNM=
lTL5XnA4eKLb4snpHXt2s/MaSVsHBrU=
psOQcAKjHxyFw0vIwrZ3FHGL
F806xNnby5hO
7t72ZXkhmSAc8xLYD4J2XXc=
Ihmk3OR96/2HSbdi
ea/NKy3VVcx7hpCYow==
ifair.ltd
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
VESSEL_S_SPEC-BBN_SUPRA.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation VESSEL_S_SPEC-BBN_SUPRA.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
VESSEL_S_SPEC-BBN_SUPRA.exeVESSEL_S_SPEC-BBN_SUPRA.exedescription pid process target process PID 3172 set thread context of 4468 3172 VESSEL_S_SPEC-BBN_SUPRA.exe VESSEL_S_SPEC-BBN_SUPRA.exe PID 4468 set thread context of 2420 4468 VESSEL_S_SPEC-BBN_SUPRA.exe Explorer.EXE PID 4468 set thread context of 2420 4468 VESSEL_S_SPEC-BBN_SUPRA.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
VESSEL_S_SPEC-BBN_SUPRA.exepid process 4468 VESSEL_S_SPEC-BBN_SUPRA.exe 4468 VESSEL_S_SPEC-BBN_SUPRA.exe 4468 VESSEL_S_SPEC-BBN_SUPRA.exe 4468 VESSEL_S_SPEC-BBN_SUPRA.exe 4468 VESSEL_S_SPEC-BBN_SUPRA.exe 4468 VESSEL_S_SPEC-BBN_SUPRA.exe 4468 VESSEL_S_SPEC-BBN_SUPRA.exe 4468 VESSEL_S_SPEC-BBN_SUPRA.exe 4468 VESSEL_S_SPEC-BBN_SUPRA.exe 4468 VESSEL_S_SPEC-BBN_SUPRA.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
VESSEL_S_SPEC-BBN_SUPRA.exepid process 4468 VESSEL_S_SPEC-BBN_SUPRA.exe 4468 VESSEL_S_SPEC-BBN_SUPRA.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
VESSEL_S_SPEC-BBN_SUPRA.exedescription pid process Token: SeDebugPrivilege 4468 VESSEL_S_SPEC-BBN_SUPRA.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
VESSEL_S_SPEC-BBN_SUPRA.exedescription pid process target process PID 3172 wrote to memory of 4468 3172 VESSEL_S_SPEC-BBN_SUPRA.exe VESSEL_S_SPEC-BBN_SUPRA.exe PID 3172 wrote to memory of 4468 3172 VESSEL_S_SPEC-BBN_SUPRA.exe VESSEL_S_SPEC-BBN_SUPRA.exe PID 3172 wrote to memory of 4468 3172 VESSEL_S_SPEC-BBN_SUPRA.exe VESSEL_S_SPEC-BBN_SUPRA.exe PID 3172 wrote to memory of 4468 3172 VESSEL_S_SPEC-BBN_SUPRA.exe VESSEL_S_SPEC-BBN_SUPRA.exe PID 3172 wrote to memory of 4468 3172 VESSEL_S_SPEC-BBN_SUPRA.exe VESSEL_S_SPEC-BBN_SUPRA.exe PID 3172 wrote to memory of 4468 3172 VESSEL_S_SPEC-BBN_SUPRA.exe VESSEL_S_SPEC-BBN_SUPRA.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\VESSEL_S_SPEC-BBN_SUPRA.exe"C:\Users\Admin\AppData\Local\Temp\VESSEL_S_SPEC-BBN_SUPRA.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Users\Admin\AppData\Local\Temp\VESSEL_S_SPEC-BBN_SUPRA.exe"C:\Users\Admin\AppData\Local\Temp\VESSEL_S_SPEC-BBN_SUPRA.exe"3⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4468
-
-