Analysis
-
max time kernel
152s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
09-12-2022 13:39
Static task
static1
Behavioral task
behavioral1
Sample
103.133.110.147_-_OneDrive_-_csrss.exe___4c7135b466d0d97fe0dce29650ed97f2.exe
Resource
win7-20221111-en
General
-
Target
103.133.110.147_-_OneDrive_-_csrss.exe___4c7135b466d0d97fe0dce29650ed97f2.exe
-
Size
333KB
-
MD5
4c7135b466d0d97fe0dce29650ed97f2
-
SHA1
fde47b76280185cd1d39e9d22aed3d8e0047814f
-
SHA256
81276296b6d3afcded72b489d0d5b9c7e6e7a13569e3868f6c063489318d2a9c
-
SHA512
bb0820a6ee336942a3a06da0cc2bdc49ea870cde63ff0972ce1559531e473c256590826bd6b4ac5afe913748a4b07d2a7a4be0b4b1d047a7ba5d416329aaa91b
-
SSDEEP
6144:9kw5wnBY2pNRJapeMSZE2dcEtJI5WwYFJ0oPsMf48ZKXQm1s:YBfpf+eMSZ37keP0m1KX8
Malware Config
Extracted
formbook
f4ca
omFHB5ajfJi1UEIEV9XcoRw=
UBjJkmQPyprdhcFF/bdCWQ==
evGKkBUj1je+otcfpw==
KgvGVeOATSt3nug0BIOm2JvOQycB
Lv6o3K0r9aSjI0lr9fg1txw=
LH1jJb/HieQpsEdqWCQTvX2PmsDVIeg=
99dte0XauJfk6Xv+uQxJFgA1gMktBA==
21FkkGB9gMniDQw2ffu6
r4lKBM/q6TZwVZfS
F+14qHeVWi56KdQ=
BgWXRsVoICMvvQ==
I+EozFl0Uy56KdQ=
xoXCgEllKEbWfjFCCLo=
qo9G1lXvvGt5GkxrLQWw
ORNlYic0PJ2ip4geEFSv
Yj+GFpvFxy0uVYx1fLI/XQ==
XL+veIKPjOTe4fjvFs+n
D2JKVAfuakXCAyoEvw==
voWJU81tH56wvt/vImbCcgVd
dVEcwFrmb8bZ4vXvFs+n
CMlcaOUF6cB+8Bnm2Kc=
NpYV3moXNE+ZQ4f9nVGCSA==
/GRkjGd1acLHyeLvImbCcgVd
R52MlF+Ag+LtFr1QKa7Zf/5a
kVD/mSO1YK75pA==
5q3IANfo/JHiDww2ffu6
4i8RFOH2ACRdhzja
VLWOSRe00XX6sNsijPzqiiWfFgf1J+g=
qnsgRFL46lWG
xo1QHOyKS9rj4fjvFs+n
mIHZlAqzS6ymmpMCU1uyZgE=
WCtjiGCFl/4JTiJ0R60=
c0vpAtZ3fY7TeLfdcnASQg==
Y87Xlic9/1+q3g/pUArVoB4=
kKOsRsf05wBOd67a
dDmgYgOZZ0aCMVwgDha4bgc=
ieXCbvcCyja+otcfpw==
Fd0XQwkTHHaBmNDvImbCcgVd
PK/M6eM8xOwqvw==
Pf0q8MdfICMvvQ==
EO8aPQwf7z2Du+XvImbCcgVd
BeUisSg/Ql6uJcg=
ay2v2pz4gomTESLosQ==
AGjX3ak2B+FyQ9ZKrQ==
Du0y0UXomyoxT4/arA8Du3FvpwE=
xhV7OrDTdonq4fjvFs+n
9+s2xTlaW66p2IAAnVkDQA==
AuS2UeN4Nsvl5vo8J67Zf/5a
B1vK2590RiUuuw==
/709BIUfMCIln8sus2u2aAM=
BMpYckjp699wVZfS
Pf2AqIscEhlpHlnV18IvVQk=
RKUTxUbz/zFroN/LLq+kIdZM
IuuiQ9pj7ZzciLVPiks4Rxc=
0KBn8XAV7NNm2xPxuA==
nv7yBtDj4UNE/ju8er1EZSanBXfyLv4=
sBgf41X1vKTwUspTsg==
5bk4+oQWD+X01tBEqQ==
c08KjxWnau8DDSsESMKNI+P5G/6/sYjU6g==
RJiyeEVj/N3rhNAW3qU=
v6O7hhQxA//+Oyq2ms9DWQ==
7MdHCYCb4OT5pg==
Je0NLgIfKIeFuyjxYD+i
68P+tIkhBdlwVZfS
inthecryptolane.com
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
kqegg.exekqegg.exepid process 1952 kqegg.exe 2696 kqegg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
kqegg.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation kqegg.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
kqegg.exekqegg.exenetsh.exedescription pid process target process PID 1952 set thread context of 2696 1952 kqegg.exe kqegg.exe PID 2696 set thread context of 2016 2696 kqegg.exe Explorer.EXE PID 2696 set thread context of 2016 2696 kqegg.exe Explorer.EXE PID 4548 set thread context of 2016 4548 netsh.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
netsh.exedescription ioc process Key created \Registry\User\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 netsh.exe -
Suspicious behavior: EnumeratesProcesses 40 IoCs
Processes:
kqegg.exenetsh.exepid process 2696 kqegg.exe 2696 kqegg.exe 2696 kqegg.exe 2696 kqegg.exe 2696 kqegg.exe 2696 kqegg.exe 2696 kqegg.exe 2696 kqegg.exe 2696 kqegg.exe 2696 kqegg.exe 4548 netsh.exe 4548 netsh.exe 4548 netsh.exe 4548 netsh.exe 4548 netsh.exe 4548 netsh.exe 4548 netsh.exe 4548 netsh.exe 4548 netsh.exe 4548 netsh.exe 4548 netsh.exe 4548 netsh.exe 4548 netsh.exe 4548 netsh.exe 4548 netsh.exe 4548 netsh.exe 4548 netsh.exe 4548 netsh.exe 4548 netsh.exe 4548 netsh.exe 4548 netsh.exe 4548 netsh.exe 4548 netsh.exe 4548 netsh.exe 4548 netsh.exe 4548 netsh.exe 4548 netsh.exe 4548 netsh.exe 4548 netsh.exe 4548 netsh.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 2016 Explorer.EXE -
Suspicious behavior: MapViewOfSection 9 IoCs
Processes:
kqegg.exekqegg.exenetsh.exepid process 1952 kqegg.exe 2696 kqegg.exe 2696 kqegg.exe 2696 kqegg.exe 2696 kqegg.exe 4548 netsh.exe 4548 netsh.exe 4548 netsh.exe 4548 netsh.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
kqegg.exenetsh.exedescription pid process Token: SeDebugPrivilege 2696 kqegg.exe Token: SeDebugPrivilege 4548 netsh.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
103.133.110.147_-_OneDrive_-_csrss.exe___4c7135b466d0d97fe0dce29650ed97f2.exekqegg.exeExplorer.EXEnetsh.exedescription pid process target process PID 1912 wrote to memory of 1952 1912 103.133.110.147_-_OneDrive_-_csrss.exe___4c7135b466d0d97fe0dce29650ed97f2.exe kqegg.exe PID 1912 wrote to memory of 1952 1912 103.133.110.147_-_OneDrive_-_csrss.exe___4c7135b466d0d97fe0dce29650ed97f2.exe kqegg.exe PID 1912 wrote to memory of 1952 1912 103.133.110.147_-_OneDrive_-_csrss.exe___4c7135b466d0d97fe0dce29650ed97f2.exe kqegg.exe PID 1952 wrote to memory of 2696 1952 kqegg.exe kqegg.exe PID 1952 wrote to memory of 2696 1952 kqegg.exe kqegg.exe PID 1952 wrote to memory of 2696 1952 kqegg.exe kqegg.exe PID 1952 wrote to memory of 2696 1952 kqegg.exe kqegg.exe PID 2016 wrote to memory of 4548 2016 Explorer.EXE netsh.exe PID 2016 wrote to memory of 4548 2016 Explorer.EXE netsh.exe PID 2016 wrote to memory of 4548 2016 Explorer.EXE netsh.exe PID 2016 wrote to memory of 2460 2016 Explorer.EXE control.exe PID 2016 wrote to memory of 2460 2016 Explorer.EXE control.exe PID 2016 wrote to memory of 2460 2016 Explorer.EXE control.exe PID 4548 wrote to memory of 3780 4548 netsh.exe Firefox.exe PID 4548 wrote to memory of 3780 4548 netsh.exe Firefox.exe PID 4548 wrote to memory of 3780 4548 netsh.exe Firefox.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\103.133.110.147_-_OneDrive_-_csrss.exe___4c7135b466d0d97fe0dce29650ed97f2.exe"C:\Users\Admin\AppData\Local\Temp\103.133.110.147_-_OneDrive_-_csrss.exe___4c7135b466d0d97fe0dce29650ed97f2.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\kqegg.exe"C:\Users\Admin\AppData\Local\Temp\kqegg.exe" C:\Users\Admin\AppData\Local\Temp\wvdthhroe.qae3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\kqegg.exe"C:\Users\Admin\AppData\Local\Temp\kqegg.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\control.exe"C:\Windows\SysWOW64\control.exe"2⤵
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\SysWOW64\netsh.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\dvnlw.sqFilesize
185KB
MD596d4bdf2e55c695f32c41a6f33a7a98c
SHA123a374f703723ef2ebfe7f6d8338a705d7c8a6b4
SHA2569c000d4b6530199eca0fe0a900c5db8807e4e13b740619e25b622694a629b5a1
SHA51259475292a1ad844126099e713f31d61ae756f7c0e50e95be3cf1dbf9841995a254b6d1cb00fa1ba783cf2043713c46e6c40fe0ecad45c504ac0c82ed42970170
-
C:\Users\Admin\AppData\Local\Temp\kqegg.exeFilesize
276KB
MD5b7b47839865c6fc7a47965cb0a15ede7
SHA104cbdc9da3b625484f3276762abf9516f1797197
SHA256ff9c7f0f6b66da24407bfc7861618fdc4c0932c00165389ccf218c3cf385641c
SHA512d6a83edfdea850c53500f0c3a8857d01cd018a31dc719577fce908ee84de2d61a5a762485b7aa6db12e82da92e38a803dfb06c45ddaa629a10dbf91538e83c1c
-
C:\Users\Admin\AppData\Local\Temp\kqegg.exeFilesize
276KB
MD5b7b47839865c6fc7a47965cb0a15ede7
SHA104cbdc9da3b625484f3276762abf9516f1797197
SHA256ff9c7f0f6b66da24407bfc7861618fdc4c0932c00165389ccf218c3cf385641c
SHA512d6a83edfdea850c53500f0c3a8857d01cd018a31dc719577fce908ee84de2d61a5a762485b7aa6db12e82da92e38a803dfb06c45ddaa629a10dbf91538e83c1c
-
C:\Users\Admin\AppData\Local\Temp\kqegg.exeFilesize
276KB
MD5b7b47839865c6fc7a47965cb0a15ede7
SHA104cbdc9da3b625484f3276762abf9516f1797197
SHA256ff9c7f0f6b66da24407bfc7861618fdc4c0932c00165389ccf218c3cf385641c
SHA512d6a83edfdea850c53500f0c3a8857d01cd018a31dc719577fce908ee84de2d61a5a762485b7aa6db12e82da92e38a803dfb06c45ddaa629a10dbf91538e83c1c
-
C:\Users\Admin\AppData\Local\Temp\wvdthhroe.qaeFilesize
5KB
MD5c7765f682b89ddbbc6a38ca8847d987c
SHA1e9f8f90ac19b207a702321f10f136b96d7984bf6
SHA256d0963fe8c05f93ce2ab565cac70972e0c64bd746b640c1cb19221e60a6298363
SHA512b5c90356b83baa78d60d4316bdb03d9bfd91730c033d6108617aa3133da9a96dae37177241bb5d13c1379adfbb979d5391f70d177f05f69068c37c9779f24a0c
-
memory/1952-132-0x0000000000000000-mapping.dmp
-
memory/2016-143-0x0000000002790000-0x0000000002857000-memory.dmpFilesize
796KB
-
memory/2016-155-0x0000000002860000-0x0000000002948000-memory.dmpFilesize
928KB
-
memory/2016-153-0x0000000002860000-0x0000000002948000-memory.dmpFilesize
928KB
-
memory/2016-147-0x0000000002790000-0x0000000002857000-memory.dmpFilesize
796KB
-
memory/2016-146-0x0000000007070000-0x00000000071C3000-memory.dmpFilesize
1.3MB
-
memory/2696-144-0x0000000000AE0000-0x0000000000AF0000-memory.dmpFilesize
64KB
-
memory/2696-142-0x0000000000590000-0x00000000005A0000-memory.dmpFilesize
64KB
-
memory/2696-145-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/2696-141-0x0000000000B20000-0x0000000000E6A000-memory.dmpFilesize
3.3MB
-
memory/2696-140-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/2696-139-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/2696-137-0x0000000000000000-mapping.dmp
-
memory/4548-148-0x0000000000000000-mapping.dmp
-
memory/4548-149-0x0000000000890000-0x00000000008AE000-memory.dmpFilesize
120KB
-
memory/4548-150-0x0000000000FC0000-0x0000000000FED000-memory.dmpFilesize
180KB
-
memory/4548-151-0x0000000001890000-0x0000000001BDA000-memory.dmpFilesize
3.3MB
-
memory/4548-152-0x00000000016B0000-0x000000000173F000-memory.dmpFilesize
572KB
-
memory/4548-154-0x0000000000FC0000-0x0000000000FED000-memory.dmpFilesize
180KB