Analysis
-
max time kernel
216s -
max time network
274s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
09-12-2022 13:39
Static task
static1
Behavioral task
behavioral1
Sample
103.133.110.147_-_OneDrive_-_csrss.exe___4c7135b466d0d97fe0dce29650ed97f2.exe
Resource
win7-20221111-en
General
-
Target
103.133.110.147_-_OneDrive_-_csrss.exe___4c7135b466d0d97fe0dce29650ed97f2.exe
-
Size
333KB
-
MD5
4c7135b466d0d97fe0dce29650ed97f2
-
SHA1
fde47b76280185cd1d39e9d22aed3d8e0047814f
-
SHA256
81276296b6d3afcded72b489d0d5b9c7e6e7a13569e3868f6c063489318d2a9c
-
SHA512
bb0820a6ee336942a3a06da0cc2bdc49ea870cde63ff0972ce1559531e473c256590826bd6b4ac5afe913748a4b07d2a7a4be0b4b1d047a7ba5d416329aaa91b
-
SSDEEP
6144:9kw5wnBY2pNRJapeMSZE2dcEtJI5WwYFJ0oPsMf48ZKXQm1s:YBfpf+eMSZ37keP0m1KX8
Malware Config
Extracted
formbook
f4ca
omFHB5ajfJi1UEIEV9XcoRw=
UBjJkmQPyprdhcFF/bdCWQ==
evGKkBUj1je+otcfpw==
KgvGVeOATSt3nug0BIOm2JvOQycB
Lv6o3K0r9aSjI0lr9fg1txw=
LH1jJb/HieQpsEdqWCQTvX2PmsDVIeg=
99dte0XauJfk6Xv+uQxJFgA1gMktBA==
21FkkGB9gMniDQw2ffu6
r4lKBM/q6TZwVZfS
F+14qHeVWi56KdQ=
BgWXRsVoICMvvQ==
I+EozFl0Uy56KdQ=
xoXCgEllKEbWfjFCCLo=
qo9G1lXvvGt5GkxrLQWw
ORNlYic0PJ2ip4geEFSv
Yj+GFpvFxy0uVYx1fLI/XQ==
XL+veIKPjOTe4fjvFs+n
D2JKVAfuakXCAyoEvw==
voWJU81tH56wvt/vImbCcgVd
dVEcwFrmb8bZ4vXvFs+n
CMlcaOUF6cB+8Bnm2Kc=
NpYV3moXNE+ZQ4f9nVGCSA==
/GRkjGd1acLHyeLvImbCcgVd
R52MlF+Ag+LtFr1QKa7Zf/5a
kVD/mSO1YK75pA==
5q3IANfo/JHiDww2ffu6
4i8RFOH2ACRdhzja
VLWOSRe00XX6sNsijPzqiiWfFgf1J+g=
qnsgRFL46lWG
xo1QHOyKS9rj4fjvFs+n
mIHZlAqzS6ymmpMCU1uyZgE=
WCtjiGCFl/4JTiJ0R60=
c0vpAtZ3fY7TeLfdcnASQg==
Y87Xlic9/1+q3g/pUArVoB4=
kKOsRsf05wBOd67a
dDmgYgOZZ0aCMVwgDha4bgc=
ieXCbvcCyja+otcfpw==
Fd0XQwkTHHaBmNDvImbCcgVd
PK/M6eM8xOwqvw==
Pf0q8MdfICMvvQ==
EO8aPQwf7z2Du+XvImbCcgVd
BeUisSg/Ql6uJcg=
ay2v2pz4gomTESLosQ==
AGjX3ak2B+FyQ9ZKrQ==
Du0y0UXomyoxT4/arA8Du3FvpwE=
xhV7OrDTdonq4fjvFs+n
9+s2xTlaW66p2IAAnVkDQA==
AuS2UeN4Nsvl5vo8J67Zf/5a
B1vK2590RiUuuw==
/709BIUfMCIln8sus2u2aAM=
BMpYckjp699wVZfS
Pf2AqIscEhlpHlnV18IvVQk=
RKUTxUbz/zFroN/LLq+kIdZM
IuuiQ9pj7ZzciLVPiks4Rxc=
0KBn8XAV7NNm2xPxuA==
nv7yBtDj4UNE/ju8er1EZSanBXfyLv4=
sBgf41X1vKTwUspTsg==
5bk4+oQWD+X01tBEqQ==
c08KjxWnau8DDSsESMKNI+P5G/6/sYjU6g==
RJiyeEVj/N3rhNAW3qU=
v6O7hhQxA//+Oyq2ms9DWQ==
7MdHCYCb4OT5pg==
Je0NLgIfKIeFuyjxYD+i
68P+tIkhBdlwVZfS
inthecryptolane.com
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
kqegg.exekqegg.exepid process 560 kqegg.exe 1104 kqegg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
kqegg.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Control Panel\International\Geo\Nation kqegg.exe -
Loads dropped DLL 3 IoCs
Processes:
103.133.110.147_-_OneDrive_-_csrss.exe___4c7135b466d0d97fe0dce29650ed97f2.exekqegg.exepid process 1448 103.133.110.147_-_OneDrive_-_csrss.exe___4c7135b466d0d97fe0dce29650ed97f2.exe 1448 103.133.110.147_-_OneDrive_-_csrss.exe___4c7135b466d0d97fe0dce29650ed97f2.exe 560 kqegg.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
kqegg.exekqegg.exechkdsk.exedescription pid process target process PID 560 set thread context of 1104 560 kqegg.exe kqegg.exe PID 1104 set thread context of 1232 1104 kqegg.exe Explorer.EXE PID 1104 set thread context of 1232 1104 kqegg.exe Explorer.EXE PID 940 set thread context of 1232 940 chkdsk.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
chkdsk.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe -
Processes:
chkdsk.exedescription ioc process Key created \Registry\User\S-1-5-21-1214520366-621468234-4062160515-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 chkdsk.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
kqegg.exechkdsk.exepid process 1104 kqegg.exe 1104 kqegg.exe 1104 kqegg.exe 1104 kqegg.exe 1104 kqegg.exe 940 chkdsk.exe 940 chkdsk.exe 940 chkdsk.exe 940 chkdsk.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 1232 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
Processes:
kqegg.exekqegg.exechkdsk.exepid process 560 kqegg.exe 1104 kqegg.exe 1104 kqegg.exe 1104 kqegg.exe 1104 kqegg.exe 940 chkdsk.exe 940 chkdsk.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
kqegg.exechkdsk.exedescription pid process Token: SeDebugPrivilege 1104 kqegg.exe Token: SeDebugPrivilege 940 chkdsk.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1232 Explorer.EXE 1232 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1232 Explorer.EXE 1232 Explorer.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
103.133.110.147_-_OneDrive_-_csrss.exe___4c7135b466d0d97fe0dce29650ed97f2.exekqegg.exeExplorer.EXEdescription pid process target process PID 1448 wrote to memory of 560 1448 103.133.110.147_-_OneDrive_-_csrss.exe___4c7135b466d0d97fe0dce29650ed97f2.exe kqegg.exe PID 1448 wrote to memory of 560 1448 103.133.110.147_-_OneDrive_-_csrss.exe___4c7135b466d0d97fe0dce29650ed97f2.exe kqegg.exe PID 1448 wrote to memory of 560 1448 103.133.110.147_-_OneDrive_-_csrss.exe___4c7135b466d0d97fe0dce29650ed97f2.exe kqegg.exe PID 1448 wrote to memory of 560 1448 103.133.110.147_-_OneDrive_-_csrss.exe___4c7135b466d0d97fe0dce29650ed97f2.exe kqegg.exe PID 560 wrote to memory of 1104 560 kqegg.exe kqegg.exe PID 560 wrote to memory of 1104 560 kqegg.exe kqegg.exe PID 560 wrote to memory of 1104 560 kqegg.exe kqegg.exe PID 560 wrote to memory of 1104 560 kqegg.exe kqegg.exe PID 560 wrote to memory of 1104 560 kqegg.exe kqegg.exe PID 1232 wrote to memory of 940 1232 Explorer.EXE chkdsk.exe PID 1232 wrote to memory of 940 1232 Explorer.EXE chkdsk.exe PID 1232 wrote to memory of 940 1232 Explorer.EXE chkdsk.exe PID 1232 wrote to memory of 940 1232 Explorer.EXE chkdsk.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\103.133.110.147_-_OneDrive_-_csrss.exe___4c7135b466d0d97fe0dce29650ed97f2.exe"C:\Users\Admin\AppData\Local\Temp\103.133.110.147_-_OneDrive_-_csrss.exe___4c7135b466d0d97fe0dce29650ed97f2.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\kqegg.exe"C:\Users\Admin\AppData\Local\Temp\kqegg.exe" C:\Users\Admin\AppData\Local\Temp\wvdthhroe.qae3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\kqegg.exe"C:\Users\Admin\AppData\Local\Temp\kqegg.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Suspicious use of SetThreadContext
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\dvnlw.sqFilesize
185KB
MD596d4bdf2e55c695f32c41a6f33a7a98c
SHA123a374f703723ef2ebfe7f6d8338a705d7c8a6b4
SHA2569c000d4b6530199eca0fe0a900c5db8807e4e13b740619e25b622694a629b5a1
SHA51259475292a1ad844126099e713f31d61ae756f7c0e50e95be3cf1dbf9841995a254b6d1cb00fa1ba783cf2043713c46e6c40fe0ecad45c504ac0c82ed42970170
-
C:\Users\Admin\AppData\Local\Temp\kqegg.exeFilesize
276KB
MD5b7b47839865c6fc7a47965cb0a15ede7
SHA104cbdc9da3b625484f3276762abf9516f1797197
SHA256ff9c7f0f6b66da24407bfc7861618fdc4c0932c00165389ccf218c3cf385641c
SHA512d6a83edfdea850c53500f0c3a8857d01cd018a31dc719577fce908ee84de2d61a5a762485b7aa6db12e82da92e38a803dfb06c45ddaa629a10dbf91538e83c1c
-
C:\Users\Admin\AppData\Local\Temp\kqegg.exeFilesize
276KB
MD5b7b47839865c6fc7a47965cb0a15ede7
SHA104cbdc9da3b625484f3276762abf9516f1797197
SHA256ff9c7f0f6b66da24407bfc7861618fdc4c0932c00165389ccf218c3cf385641c
SHA512d6a83edfdea850c53500f0c3a8857d01cd018a31dc719577fce908ee84de2d61a5a762485b7aa6db12e82da92e38a803dfb06c45ddaa629a10dbf91538e83c1c
-
C:\Users\Admin\AppData\Local\Temp\kqegg.exeFilesize
276KB
MD5b7b47839865c6fc7a47965cb0a15ede7
SHA104cbdc9da3b625484f3276762abf9516f1797197
SHA256ff9c7f0f6b66da24407bfc7861618fdc4c0932c00165389ccf218c3cf385641c
SHA512d6a83edfdea850c53500f0c3a8857d01cd018a31dc719577fce908ee84de2d61a5a762485b7aa6db12e82da92e38a803dfb06c45ddaa629a10dbf91538e83c1c
-
C:\Users\Admin\AppData\Local\Temp\wvdthhroe.qaeFilesize
5KB
MD5c7765f682b89ddbbc6a38ca8847d987c
SHA1e9f8f90ac19b207a702321f10f136b96d7984bf6
SHA256d0963fe8c05f93ce2ab565cac70972e0c64bd746b640c1cb19221e60a6298363
SHA512b5c90356b83baa78d60d4316bdb03d9bfd91730c033d6108617aa3133da9a96dae37177241bb5d13c1379adfbb979d5391f70d177f05f69068c37c9779f24a0c
-
\Users\Admin\AppData\Local\Temp\kqegg.exeFilesize
276KB
MD5b7b47839865c6fc7a47965cb0a15ede7
SHA104cbdc9da3b625484f3276762abf9516f1797197
SHA256ff9c7f0f6b66da24407bfc7861618fdc4c0932c00165389ccf218c3cf385641c
SHA512d6a83edfdea850c53500f0c3a8857d01cd018a31dc719577fce908ee84de2d61a5a762485b7aa6db12e82da92e38a803dfb06c45ddaa629a10dbf91538e83c1c
-
\Users\Admin\AppData\Local\Temp\kqegg.exeFilesize
276KB
MD5b7b47839865c6fc7a47965cb0a15ede7
SHA104cbdc9da3b625484f3276762abf9516f1797197
SHA256ff9c7f0f6b66da24407bfc7861618fdc4c0932c00165389ccf218c3cf385641c
SHA512d6a83edfdea850c53500f0c3a8857d01cd018a31dc719577fce908ee84de2d61a5a762485b7aa6db12e82da92e38a803dfb06c45ddaa629a10dbf91538e83c1c
-
\Users\Admin\AppData\Local\Temp\kqegg.exeFilesize
276KB
MD5b7b47839865c6fc7a47965cb0a15ede7
SHA104cbdc9da3b625484f3276762abf9516f1797197
SHA256ff9c7f0f6b66da24407bfc7861618fdc4c0932c00165389ccf218c3cf385641c
SHA512d6a83edfdea850c53500f0c3a8857d01cd018a31dc719577fce908ee84de2d61a5a762485b7aa6db12e82da92e38a803dfb06c45ddaa629a10dbf91538e83c1c
-
memory/560-57-0x0000000000000000-mapping.dmp
-
memory/940-75-0x00000000000C0000-0x00000000000ED000-memory.dmpFilesize
180KB
-
memory/940-76-0x0000000001F70000-0x0000000002273000-memory.dmpFilesize
3.0MB
-
memory/940-80-0x00000000000C0000-0x00000000000ED000-memory.dmpFilesize
180KB
-
memory/940-78-0x0000000000940000-0x00000000009CF000-memory.dmpFilesize
572KB
-
memory/940-74-0x0000000000B60000-0x0000000000B67000-memory.dmpFilesize
28KB
-
memory/940-72-0x0000000000000000-mapping.dmp
-
memory/1104-66-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1104-70-0x0000000000490000-0x00000000004A0000-memory.dmpFilesize
64KB
-
memory/1104-68-0x0000000000230000-0x0000000000240000-memory.dmpFilesize
64KB
-
memory/1104-73-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1104-67-0x0000000000750000-0x0000000000A53000-memory.dmpFilesize
3.0MB
-
memory/1104-65-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1104-63-0x00000000004012B0-mapping.dmp
-
memory/1232-71-0x0000000006420000-0x000000000656E000-memory.dmpFilesize
1.3MB
-
memory/1232-77-0x0000000006420000-0x000000000656E000-memory.dmpFilesize
1.3MB
-
memory/1232-69-0x0000000005EC0000-0x0000000006013000-memory.dmpFilesize
1.3MB
-
memory/1232-79-0x0000000004100000-0x0000000004244000-memory.dmpFilesize
1.3MB
-
memory/1232-81-0x0000000004100000-0x0000000004244000-memory.dmpFilesize
1.3MB
-
memory/1448-54-0x0000000075441000-0x0000000075443000-memory.dmpFilesize
8KB