Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
09-12-2022 14:02
Static task
static1
Behavioral task
behavioral1
Sample
61805394.exe
Resource
win7-20220812-en
General
-
Target
61805394.exe
-
Size
602KB
-
MD5
8ee0d0f481f51693fa69d72953f4e23c
-
SHA1
dfc133a85bab835ea1dc541874e6517b7dfd2811
-
SHA256
06724c588f5b9381effa96ca72ae6c136b6ec64ae1e898942d34142e40078bab
-
SHA512
49c3dcabc703083500df5852594ddd62d877cbd3149a81e58512e323a720b4b29f39b237d3247e39bb732622e7d7e1d5c4f6d15b55c737b9ca2a5461bbf70683
-
SSDEEP
12288:GlVzqun0gtXT7WoabwmXJ2XbsE1NVcNLIFSzRd2fTV9Rf:GLLtnWZHXJX+Ns2LV9Rf
Malware Config
Extracted
formbook
yurm
X06d1tis1GUX/R0g87Ud
BKiZ33D1P766GVXO1ZwV
lAFdjB7CSxGX8Trz
Gc7dWizTVxWX8Trz
tDkr9JAfi1OHAW1PGOageIp4
bCpMtHKU3mVp8BY5sQ==
7WKpsMWt8nsrhJClJeOZNg==
0A9KTlETQ86Cmd8k0o5NP5RwCg==
aJ61paNJztSp42c=
CrgoA8ySIOsytCbO1ZwV
i46SnHYDD9tTIHI=
XFRCRCjtFZeU3x4Rn3xfD5BnPz+RDA==
c4CZghuHvzW9A31gEz0d
QAjzz9qyRRWBNYseAI4M
Jpbmu4A1YvBvN3ruZgiRmJA5BCFd
PfoFXGNFhhuX8Trz
bqCfk0m8ApAl+Tm1Ms5Tb23IT7tS
z7INff7HNALxc5HWq2/ftrVR6A7R1zvTUQ==
m7IShV4LSFxbqxhrVsZ1Ig==
BHRp7q0gtoRuqBRnVsZ1Ig==
SnqEhE/pEKitAVYv+MtfgDwL1EuxZyihRg==
1xpDKRHJ7K/tqQzEfaJvDIeRWI5DZyihRg==
tAQpBfGi8mppxC4LbDQNI945BCFd
nk5kz8aKDecavxHOYeugeIp4
wPYvLS3zK8FvdJFbQVY=
WAATk07VS0xU9Dvx
KdwXaxSYC9G8DG2tUOBR/X3wtEM=
EPQVcwx5eXw9i/E3B9tpP5RwCg==
MN0FmlPPDZiu5zVpA58wA0Q/5F4=
797QsL+c/saMxtZeQFQ=
TISijiWfydvQFQ==
ama7D8Ntnxsr9Gg=
PcnRSFMPjGFm8BY5sQ==
npSIXvRrsj25h91pUHZGbX3wtEM=
0CAJglT6dkKyhZFbQVY=
kL69pLud0pT4Am0=
sG1JDgXWXydt/VHO1ZwV
zxVdYWYhqoHvrt5W2G7a5PL71zEyHIIx
i0Zm9MhPh/vvI3ycVsZ1Ig==
kjRJqKB3nRgihH2kM0E=
/s4LgD5dmCtOBCkprA==
I278sNm5/o/FX2dZBAKYKg==
eP/5flDtVw2X8Trz
Ik9oUEj8hFO6eeK1gJg/xkILDkwPAw==
QIS5jUjlUhtr/VHO1ZwV
RcC5QQyGv0mFC2BnT3igeIp4
NL7LMCoKT93dJWVTHJgywToxAg==
yzhyPgzSYDGthZFbQVY=
PqmV5ObKBpvKUJZYcGg05HtiCA==
/W9bsq7IsDuC
T8LMKrI2jA8BQ4yQVsZ1Ig==
eHof90VMPMXQDQ==
8TSLglnyajdx/VDO1ZwV
ZQYihA2I+rn4g7eQVsZ1Ig==
JCmxphUQ06is5Gc=
H2C6sYYiZPAxoxNnVsZ1Ig==
5NxIrpR6DM2Jd5FbQVY=
vDCXqaJj6Pw2EXA=
CBI+Gdh67Pw2EXA=
zxoDhkPEDpTET7a6Os0tj1BpDBfmYgo=
neEtD8Y0YN7fMV7O1ZwV
W+BPJ/S6QhmScpFbQVY=
iAZaRHA3ZgUpsQvRiZ5XP5RwCg==
CQtXS8LIsDuC
absbox.org
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
shwqxoomjp.exeshwqxoomjp.exepid process 2060 shwqxoomjp.exe 1420 shwqxoomjp.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
shwqxoomjp.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation shwqxoomjp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
shwqxoomjp.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kwqkusi = "C:\\Users\\Admin\\AppData\\Roaming\\jimxttidlplacq\\pbqj.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\shwqxoomjp.exe\" \"C:\\Users\\Admin\\AppData\\" shwqxoomjp.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
shwqxoomjp.exeshwqxoomjp.exeNETSTAT.EXEdescription pid process target process PID 2060 set thread context of 1420 2060 shwqxoomjp.exe shwqxoomjp.exe PID 1420 set thread context of 3064 1420 shwqxoomjp.exe Explorer.EXE PID 1420 set thread context of 3064 1420 shwqxoomjp.exe Explorer.EXE PID 1032 set thread context of 3064 1032 NETSTAT.EXE Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
NETSTAT.EXEpid process 1032 NETSTAT.EXE -
Processes:
NETSTAT.EXEdescription ioc process Key created \Registry\User\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 NETSTAT.EXE -
Suspicious behavior: EnumeratesProcesses 60 IoCs
Processes:
shwqxoomjp.exeNETSTAT.EXEpid process 1420 shwqxoomjp.exe 1420 shwqxoomjp.exe 1420 shwqxoomjp.exe 1420 shwqxoomjp.exe 1420 shwqxoomjp.exe 1420 shwqxoomjp.exe 1420 shwqxoomjp.exe 1420 shwqxoomjp.exe 1420 shwqxoomjp.exe 1420 shwqxoomjp.exe 1032 NETSTAT.EXE 1032 NETSTAT.EXE 1032 NETSTAT.EXE 1032 NETSTAT.EXE 1032 NETSTAT.EXE 1032 NETSTAT.EXE 1032 NETSTAT.EXE 1032 NETSTAT.EXE 1032 NETSTAT.EXE 1032 NETSTAT.EXE 1032 NETSTAT.EXE 1032 NETSTAT.EXE 1032 NETSTAT.EXE 1032 NETSTAT.EXE 1032 NETSTAT.EXE 1032 NETSTAT.EXE 1032 NETSTAT.EXE 1032 NETSTAT.EXE 1032 NETSTAT.EXE 1032 NETSTAT.EXE 1032 NETSTAT.EXE 1032 NETSTAT.EXE 1032 NETSTAT.EXE 1032 NETSTAT.EXE 1032 NETSTAT.EXE 1032 NETSTAT.EXE 1032 NETSTAT.EXE 1032 NETSTAT.EXE 1032 NETSTAT.EXE 1032 NETSTAT.EXE 1032 NETSTAT.EXE 1032 NETSTAT.EXE 1032 NETSTAT.EXE 1032 NETSTAT.EXE 1032 NETSTAT.EXE 1032 NETSTAT.EXE 1032 NETSTAT.EXE 1032 NETSTAT.EXE 1032 NETSTAT.EXE 1032 NETSTAT.EXE 1032 NETSTAT.EXE 1032 NETSTAT.EXE 1032 NETSTAT.EXE 1032 NETSTAT.EXE 1032 NETSTAT.EXE 1032 NETSTAT.EXE 1032 NETSTAT.EXE 1032 NETSTAT.EXE 1032 NETSTAT.EXE 1032 NETSTAT.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3064 Explorer.EXE -
Suspicious behavior: MapViewOfSection 9 IoCs
Processes:
shwqxoomjp.exeshwqxoomjp.exeNETSTAT.EXEpid process 2060 shwqxoomjp.exe 1420 shwqxoomjp.exe 1420 shwqxoomjp.exe 1420 shwqxoomjp.exe 1420 shwqxoomjp.exe 1032 NETSTAT.EXE 1032 NETSTAT.EXE 1032 NETSTAT.EXE 1032 NETSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
shwqxoomjp.exeNETSTAT.EXEdescription pid process Token: SeDebugPrivilege 1420 shwqxoomjp.exe Token: SeDebugPrivilege 1032 NETSTAT.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
shwqxoomjp.exepid process 2060 shwqxoomjp.exe 2060 shwqxoomjp.exe -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
shwqxoomjp.exepid process 2060 shwqxoomjp.exe 2060 shwqxoomjp.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
61805394.exeshwqxoomjp.exeExplorer.EXENETSTAT.EXEdescription pid process target process PID 4972 wrote to memory of 2060 4972 61805394.exe shwqxoomjp.exe PID 4972 wrote to memory of 2060 4972 61805394.exe shwqxoomjp.exe PID 4972 wrote to memory of 2060 4972 61805394.exe shwqxoomjp.exe PID 2060 wrote to memory of 1420 2060 shwqxoomjp.exe shwqxoomjp.exe PID 2060 wrote to memory of 1420 2060 shwqxoomjp.exe shwqxoomjp.exe PID 2060 wrote to memory of 1420 2060 shwqxoomjp.exe shwqxoomjp.exe PID 2060 wrote to memory of 1420 2060 shwqxoomjp.exe shwqxoomjp.exe PID 3064 wrote to memory of 1032 3064 Explorer.EXE NETSTAT.EXE PID 3064 wrote to memory of 1032 3064 Explorer.EXE NETSTAT.EXE PID 3064 wrote to memory of 1032 3064 Explorer.EXE NETSTAT.EXE PID 1032 wrote to memory of 3780 1032 NETSTAT.EXE Firefox.exe PID 1032 wrote to memory of 3780 1032 NETSTAT.EXE Firefox.exe PID 1032 wrote to memory of 3780 1032 NETSTAT.EXE Firefox.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\61805394.exe"C:\Users\Admin\AppData\Local\Temp\61805394.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Users\Admin\AppData\Local\Temp\shwqxoomjp.exe"C:\Users\Admin\AppData\Local\Temp\shwqxoomjp.exe" "C:\Users\Admin\AppData\Local\Temp\stfcqudn.au3"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\shwqxoomjp.exe"C:\Users\Admin\AppData\Local\Temp\shwqxoomjp.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1420 -
C:\Windows\SysWOW64\NETSTAT.EXE"C:\Windows\SysWOW64\NETSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- Gathers network information
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:3780
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\auevr.ovFilesize
185KB
MD59db57de86ecc5747c77d88f1f104113b
SHA12d416ddfc9dd593545d5914af7a9ec4eb7151a75
SHA256ad404543e1c9c291f92b07f4406148bb09d7c7f66dff8ac5bbecd49816f56351
SHA5125759a2e0176ad3682922716d1f042955d702c12185dc579d419523e698c8f513e1d295d4cb3c7b6e92c0a8da86936abadda68755a717815991573476e0e12629
-
C:\Users\Admin\AppData\Local\Temp\shwqxoomjp.exeFilesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
C:\Users\Admin\AppData\Local\Temp\shwqxoomjp.exeFilesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
C:\Users\Admin\AppData\Local\Temp\shwqxoomjp.exeFilesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
C:\Users\Admin\AppData\Local\Temp\stfcqudn.au3Filesize
5KB
MD59107842e92542383cb40845c12ba4818
SHA14d4539c0cd38abcf371f98a2c5ffdb56a3928b6a
SHA25640cf08fdceb894418843844143e928f763aa0b8ca7ff46b6f8c714c4b77a32a7
SHA512dd14f81bc38f4a48c3512d638a181936201c5ec3c5baa923418e7836ae4b3d836f4180348a05b7638954059ab16d7d43740955ae1ca40ba74acd5f2c696efd11
-
C:\Users\Admin\AppData\Local\Temp\uyjhldcta.gFilesize
70KB
MD5660714f5e078d4db25f0453b146ea203
SHA1b7022965ce621efa6fe828e220300857a097043b
SHA256bd8bfbbcba56fe92726930e939d9a814be7005efd878158b7bf9bae274a82d7d
SHA51244637fc06f57f10a7817178956b258b00b12e7727b39ae4a3f3b419927d37fbd0a04d7c413b1a9e57cfd780845c77ab0460784c875a7a17744d7f1c04d25ce65
-
memory/1032-147-0x0000000000000000-mapping.dmp
-
memory/1032-155-0x0000000000800000-0x000000000082D000-memory.dmpFilesize
180KB
-
memory/1032-153-0x0000000000E20000-0x0000000000EAF000-memory.dmpFilesize
572KB
-
memory/1032-152-0x0000000000EB0000-0x00000000011FA000-memory.dmpFilesize
3.3MB
-
memory/1032-151-0x0000000000800000-0x000000000082D000-memory.dmpFilesize
180KB
-
memory/1032-150-0x00000000005A0000-0x00000000005AB000-memory.dmpFilesize
44KB
-
memory/1420-138-0x0000000000000000-mapping.dmp
-
memory/1420-145-0x00000000012C0000-0x00000000012D0000-memory.dmpFilesize
64KB
-
memory/1420-148-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1420-149-0x0000000000401000-0x000000000042F000-memory.dmpFilesize
184KB
-
memory/1420-143-0x0000000000CF0000-0x0000000000D00000-memory.dmpFilesize
64KB
-
memory/1420-142-0x0000000001360000-0x00000000016AA000-memory.dmpFilesize
3.3MB
-
memory/1420-140-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1420-141-0x0000000000401000-0x000000000042F000-memory.dmpFilesize
184KB
-
memory/2060-132-0x0000000000000000-mapping.dmp
-
memory/3064-146-0x0000000008280000-0x00000000083EB000-memory.dmpFilesize
1.4MB
-
memory/3064-144-0x00000000078E0000-0x0000000007A43000-memory.dmpFilesize
1.4MB
-
memory/3064-154-0x0000000008570000-0x00000000086DA000-memory.dmpFilesize
1.4MB
-
memory/3064-156-0x0000000008570000-0x00000000086DA000-memory.dmpFilesize
1.4MB