Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
08-12-2022 11:56
Static task
static1
Behavioral task
behavioral1
Sample
5b0ad70962c30c5d8121d9952c0115449253afc64eee634b73ef544692d1dddf.exe
Resource
win7-20220901-en
General
-
Target
5b0ad70962c30c5d8121d9952c0115449253afc64eee634b73ef544692d1dddf.exe
-
Size
344KB
-
MD5
4c81a87e0db78ea6a775bef1503d6ec0
-
SHA1
e11930e6e07c9c17aaa53512a28e63859545f486
-
SHA256
5b0ad70962c30c5d8121d9952c0115449253afc64eee634b73ef544692d1dddf
-
SHA512
66001fddb953d6bd178b780e23ccc0ac4f94b4c4157f028995d5b3e0c548982fcb285ec1968cb75a11d838494b34df431b6d7f9d63d7d50d17e42b40e85a184a
-
SSDEEP
6144:QBn1ARf0fEEreo2gSo66il6s6DZBvNhMwALYT5Eme/OqZbklOExYi6UZS/P:gAx4EECb3oCH6NBBoSA/OeQ/xK28P
Malware Config
Extracted
formbook
sdq4
M/NxSqNc5vEVvfXWWA==
X0Q2HDisLuzoYHfD/mIcqVDnOotmMQ==
rpEiJ3YmytzsKpdRm4BC7C+2Tw==
fm8cTFjP2FWL2pX5CMjb
5ZhWW5wmXtrmLgrzSjT6uhFBjJHnOQ==
x7J40079eC34LH47UXg5nQ==
ZP8X4tob2taHVprY6DY=
a1jaSE2/8CrzM/8SUXg5nQ==
f5NPHDH65GxGSnZkngvT
IgmQAMCztfqJvfXWWA==
g1+wuFVS/tReSfENUXg5nQ==
SivMIukaJaRo0q8C
LQ9gYduaQQzUE5rY6DY=
TwJTqpALLLkbSI8=
uGsh+xbSG/Cg0Eqd1i8=
p1gOxrnIf1QXDg==
6cuOoOaSRhDQEprY6DY=
nIVfX649g7xtvfXWWA==
RiWd3WQpq7DSGJrY6DY=
ESeuyPlUh40hEw==
gWUpBQqBujFIvfXWWA==
UDO4oex1P/cRGQ==
49VwWOLXgjrw7w+PFf7Oyas8
cSneThksw86WlCrX6D3hfO7OGVc=
E/l8ZqpdJ5rC
vJ4te0G/XCk=
4bc6zeJglCjoCZrY6DY=
39KR8H07xNKJffqwA9DXgO7OGVc=
TC3zbPK0akYGLH47UXg5nQ==
eGwYgjf801sBMYc=
MQe+r7zz9odKQJrY6DY=
Vk8TIdclSo9Cf6thv5q4lQ==
m41YuEg64fO3pxHjTvFN5xc=
uahz1FlJ4sqnHBpy9vFN5xc=
y+flUebqjmo7elz5CMjb
u2vRoO+mSwGHcWv5CMjb
STjDpOls7Lldjuhsjk1cDURyzNLmezM=
nYX5vfquVRbXFprY6DY=
JB+8vlpJ/BTNslBOyLv0ueHvkxjHn0EV
QR8SiwKA9r5VQJrY6DY=
NeFiR4xG6fIKciIoSgbOyas8
ZhmT3ZjKiYpKQOoChWj2pyavTQ==
7dDA43AuxLkbSI8=
dVtBMDV2oeyIvfXWWA==
KSQXAgI/XPMRgNcp6XwdAH4kzEA=
r2fhMtqlIitfoP7PeWKOgeS8aO89
bybcKKuZQlcfC5X5CMjb
+dnRN8zAu/iIvfXWWA==
YPoD49hhPM7f
UhO5tP+oQklLpihFb87M
WDCChA3IWQ228z24Oy5kRU49S84q
IgkM9OTjf1QXDg==
zmC4/jzH/4E4Ppg=
LOeRXGLdBpBLNE72MY471RQuTpPtby4=
RCm/HYYaS8/gGvAIoZLCgu7OGVc=
/uKnlIONmve35JX5CMjb
XwnoPsWpnuxo0q8C
AKCY8Hyr/PIdZJY=
y7Mmrr8ADppo0q8C
RRJkOm0Qq8KAvfXWWA==
WDvyO7afSlQPB4Q+UXg5nQ==
HcyC421c+8t4kCPiGtHXfu7OGVc=
4nTMDkDJAIE4Ppg=
OJKNMbHwdDQ=
yceiei.rest
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
dtdnnez.exedtdnnez.exepid process 1356 dtdnnez.exe 908 dtdnnez.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
dtdnnez.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\International\Geo\Nation dtdnnez.exe -
Loads dropped DLL 3 IoCs
Processes:
5b0ad70962c30c5d8121d9952c0115449253afc64eee634b73ef544692d1dddf.exedtdnnez.exesvchost.exepid process 1712 5b0ad70962c30c5d8121d9952c0115449253afc64eee634b73ef544692d1dddf.exe 1356 dtdnnez.exe 240 svchost.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
dtdnnez.exedtdnnez.exesvchost.exedescription pid process target process PID 1356 set thread context of 908 1356 dtdnnez.exe dtdnnez.exe PID 908 set thread context of 1224 908 dtdnnez.exe Explorer.EXE PID 240 set thread context of 1224 240 svchost.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
svchost.exedescription ioc process Key created \Registry\User\S-1-5-21-4063495947-34355257-727531523-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 svchost.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
Processes:
dtdnnez.exesvchost.exepid process 908 dtdnnez.exe 908 dtdnnez.exe 908 dtdnnez.exe 908 dtdnnez.exe 240 svchost.exe 240 svchost.exe 240 svchost.exe 240 svchost.exe 240 svchost.exe 240 svchost.exe 240 svchost.exe 240 svchost.exe 240 svchost.exe 240 svchost.exe 240 svchost.exe 240 svchost.exe 240 svchost.exe 240 svchost.exe 240 svchost.exe 240 svchost.exe 240 svchost.exe 240 svchost.exe 240 svchost.exe 240 svchost.exe 240 svchost.exe 240 svchost.exe 240 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 1224 Explorer.EXE -
Suspicious behavior: MapViewOfSection 8 IoCs
Processes:
dtdnnez.exedtdnnez.exesvchost.exepid process 1356 dtdnnez.exe 908 dtdnnez.exe 908 dtdnnez.exe 908 dtdnnez.exe 240 svchost.exe 240 svchost.exe 240 svchost.exe 240 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
dtdnnez.exesvchost.exedescription pid process Token: SeDebugPrivilege 908 dtdnnez.exe Token: SeDebugPrivilege 240 svchost.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1224 Explorer.EXE 1224 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1224 Explorer.EXE 1224 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
5b0ad70962c30c5d8121d9952c0115449253afc64eee634b73ef544692d1dddf.exedtdnnez.exeExplorer.EXEsvchost.exedescription pid process target process PID 1712 wrote to memory of 1356 1712 5b0ad70962c30c5d8121d9952c0115449253afc64eee634b73ef544692d1dddf.exe dtdnnez.exe PID 1712 wrote to memory of 1356 1712 5b0ad70962c30c5d8121d9952c0115449253afc64eee634b73ef544692d1dddf.exe dtdnnez.exe PID 1712 wrote to memory of 1356 1712 5b0ad70962c30c5d8121d9952c0115449253afc64eee634b73ef544692d1dddf.exe dtdnnez.exe PID 1712 wrote to memory of 1356 1712 5b0ad70962c30c5d8121d9952c0115449253afc64eee634b73ef544692d1dddf.exe dtdnnez.exe PID 1356 wrote to memory of 908 1356 dtdnnez.exe dtdnnez.exe PID 1356 wrote to memory of 908 1356 dtdnnez.exe dtdnnez.exe PID 1356 wrote to memory of 908 1356 dtdnnez.exe dtdnnez.exe PID 1356 wrote to memory of 908 1356 dtdnnez.exe dtdnnez.exe PID 1356 wrote to memory of 908 1356 dtdnnez.exe dtdnnez.exe PID 1224 wrote to memory of 240 1224 Explorer.EXE svchost.exe PID 1224 wrote to memory of 240 1224 Explorer.EXE svchost.exe PID 1224 wrote to memory of 240 1224 Explorer.EXE svchost.exe PID 1224 wrote to memory of 240 1224 Explorer.EXE svchost.exe PID 240 wrote to memory of 1964 240 svchost.exe Firefox.exe PID 240 wrote to memory of 1964 240 svchost.exe Firefox.exe PID 240 wrote to memory of 1964 240 svchost.exe Firefox.exe PID 240 wrote to memory of 1964 240 svchost.exe Firefox.exe PID 240 wrote to memory of 1964 240 svchost.exe Firefox.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\5b0ad70962c30c5d8121d9952c0115449253afc64eee634b73ef544692d1dddf.exe"C:\Users\Admin\AppData\Local\Temp\5b0ad70962c30c5d8121d9952c0115449253afc64eee634b73ef544692d1dddf.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\dtdnnez.exe"C:\Users\Admin\AppData\Local\Temp\dtdnnez.exe" C:\Users\Admin\AppData\Local\Temp\lavnpsy.jlm3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Users\Admin\AppData\Local\Temp\dtdnnez.exe"C:\Users\Admin\AppData\Local\Temp\dtdnnez.exe" C:\Users\Admin\AppData\Local\Temp\lavnpsy.jlm4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:908
-
-
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:240 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1964
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
333KB
MD5df64c464192269fbec746ebb9ef88ce9
SHA16dfdadb32ba293930ef6212364754e730267d96e
SHA256e51e409ff63f3e6f180763d52e535daf154abec7dafe6982c4d49d9e17f402d1
SHA51274dec99727610dfc7577d04c0e47e49f7b327698d4c79307745bceae643abe88a881bbd29c829d4e6dfb5652a589f46def9bad070e460eb3500faab427fb7246
-
Filesize
333KB
MD5df64c464192269fbec746ebb9ef88ce9
SHA16dfdadb32ba293930ef6212364754e730267d96e
SHA256e51e409ff63f3e6f180763d52e535daf154abec7dafe6982c4d49d9e17f402d1
SHA51274dec99727610dfc7577d04c0e47e49f7b327698d4c79307745bceae643abe88a881bbd29c829d4e6dfb5652a589f46def9bad070e460eb3500faab427fb7246
-
Filesize
333KB
MD5df64c464192269fbec746ebb9ef88ce9
SHA16dfdadb32ba293930ef6212364754e730267d96e
SHA256e51e409ff63f3e6f180763d52e535daf154abec7dafe6982c4d49d9e17f402d1
SHA51274dec99727610dfc7577d04c0e47e49f7b327698d4c79307745bceae643abe88a881bbd29c829d4e6dfb5652a589f46def9bad070e460eb3500faab427fb7246
-
Filesize
5KB
MD5e6228383b44bf8f604771c9f2d68f4ef
SHA15f9e76540ad0aae3b18cb75a11c8be337f839765
SHA256d9d9bb5fa96aaff11017e83c19fdbf375e9166dabef083ad2f7f0c83e0b68033
SHA5125e4293e9ca11189f3a420679c1b5756dab1a92d421c55d3e54c67af5d2286b5ce7e1f0a8f8a5946831c5dee3002e6e763b9372f60f8fda7d888ef378d02a5596
-
Filesize
185KB
MD52297b21230d08f23a727575368ae63f0
SHA1ca08ff1317dadd6f18fecd54b0fcf5a0bfa40526
SHA25658eff1e5eb40cc12791a15cfd868e155a38dd0e82d557201438476b3afb1592e
SHA51287dedff248109066975899d676f7c0a5ea2175199da18af9b13ffb4091ae3a5166e5713d200b83363762a6dd23e932d599ce1e988ae2623e08437be4c3fefe80
-
Filesize
333KB
MD5df64c464192269fbec746ebb9ef88ce9
SHA16dfdadb32ba293930ef6212364754e730267d96e
SHA256e51e409ff63f3e6f180763d52e535daf154abec7dafe6982c4d49d9e17f402d1
SHA51274dec99727610dfc7577d04c0e47e49f7b327698d4c79307745bceae643abe88a881bbd29c829d4e6dfb5652a589f46def9bad070e460eb3500faab427fb7246
-
Filesize
333KB
MD5df64c464192269fbec746ebb9ef88ce9
SHA16dfdadb32ba293930ef6212364754e730267d96e
SHA256e51e409ff63f3e6f180763d52e535daf154abec7dafe6982c4d49d9e17f402d1
SHA51274dec99727610dfc7577d04c0e47e49f7b327698d4c79307745bceae643abe88a881bbd29c829d4e6dfb5652a589f46def9bad070e460eb3500faab427fb7246
-
Filesize
810KB
MD5c6ec991471d42128268ea10236d9cdb8
SHA1d569350d02db6a118136220da8de40a9973084f1
SHA2561b755cc3093dd45a0df857854aedfeb3c8f3622cff5bc491f2d492ebfa3ef8e0
SHA512a67ed46547b9270c8a5a7a947b375cb6baf3211072f90170aae2bb6ce9c4fe9d7be3e9d782420dcfdbc19a1f232b3be561ca503b80e8dc3e036a62c54cad5b57