Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
12-12-2022 16:18
Static task
static1
Behavioral task
behavioral1
Sample
Signed PO801221651.exe
Resource
win7-20220812-en
General
-
Target
Signed PO801221651.exe
-
Size
225KB
-
MD5
44d628546ab1eff55064627d70a3cb27
-
SHA1
2605ad8396b5ea90c8a371fdb76c58b12931d66c
-
SHA256
e6c4c251d5481c065e23d202620aa2d2d0ebc7e4d159a70c6ac9e377804da5bf
-
SHA512
4a1123da0df51b8898d59e63613e741fc6746f1233ec97f2c93db77785f4deda06e50a226e2f06db1419a3780c171af71ebbe2c9dec1be8217d57b2866fd241e
-
SSDEEP
6144:QBn19gIhWchRDSM2RnW9hCcftsLzSjW3qoC6mD:gqPc7SMYnWTCUtTK3qoC9
Malware Config
Extracted
formbook
m5oe
HdR8hG6r12hBYuHY4zv6YeeFPQ==
tD1V9gswYvgQXEGd
1xKtJ1LdqRYMRMC84U1A
MbhjiWb7Lz8z7KIWl3UyUIJwA6Tb
joVB5Xggy2RtE+odsZg=
TrduAIay6Y3SvoIK20xI
pSna7LOsXXwXT/zz3Iow4g==
QnthmO4Qst5gC3sDoA==
eAirzOOgO7SOCenz3Iow4g==
xg0uSbfLTg==
YWQXwyGRzPEHzGrDFE8CBSE=
ujLnfuXoH9dbgHIK20xI
291v0XsGFrYQXEGd
MRvTd/qMuaHpjCM=
X131fLC6VWX4MsvCb2IPjIfq8wlksWfg
Y9Bur8DbgqFt/Yni86MMCCE=
q6RTBmJkmy5pWTmmCCrvmuCDPw==
mQS26DojT+EQXEGd
sjHQ+Kav2Wx9FeodsZg=
JA24UKnTA5re1LhcQaVo/w==
+nMYDuKNduLsjSE=
0Y9DVy/Tc9l+yjQ=
y7lwdkvTChreCREDpQ==
Ii3WdB9OaKHpjCM=
CMWQ4A8JKbwoNFp9nu7t6g==
gbV4IoyzQljj18uoLgjx6g==
6K5hYUwJtU5ySf92shofvBfYrldksWfg
HShGoi6WeQZh
+XRHCtltpLisZhq8oQP3tsIn
H92Mnqi1WFbtCREDpQ==
ScNmhoycwTWCnCciRLFr/A92fk4lLrXv
/mcDDzqp2eN+iqKcQzk8IFpI47Z1oDSkYg==
4Zw22mgivXjUVwsKrQ==
H6BuCCqWeQZh
AXgnNxLA5SJB/+odsZg=
ewIhwqy9EmQJYg==
r2QP0TaWeQZh
wH0tLEHAY/MrFNYtfK1ScJWi7cI=
CC3fiO5tJLm2VNIwxwNPYSP0u4nR
Fx7Zhw2aS6HpjCM=
IJxWlqZEdZpwDuodsZg=
yUjv9d2BuOS0KOodsZg=
3p9Rc2X7ORpG8LMaPbR8DkBwu0YHcGeudQ==
1HEaIfD3b79KiDEL3Iow4g==
wWMAE/eTvqHpjCM=
vLlwIqnDnTWyCREDpQ==
5Zw354BpX25V+MYFrJI=
bqtnHoun2nf7CREDpQ==
rWETGOZxl6iRGP8fuokZ/GMv
sn1e9rsTPWA=
nN+z3PKiu6HpjCM=
qifMPKbZgoXSZjD1FJA=
wJAvzTSWeQZh
XYVBzCOsTvAQXEGd
tCi/4MTHdZ9v9pT5FGwZ/GMv
uWdW5jhhSjC67o2V
IejMbKK5EmQJYg==
2ptC9k/Nex0+/uodsZg=
69+iVeaYNOokmEsorQ==
f4MkxCEdWBSt5WJD5cLF7EoRn8M=
d7dR4opPbeIZwWovuA==
4alR50ZbhAxOJfHUaVhA
g403rfwQH7w9ZvHron4xbLDfMg==
m9aSQLs51jmh18uoLgjx6g==
singglostudio.com
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
bunrjzni.exebunrjzni.exepid process 2008 bunrjzni.exe 1452 bunrjzni.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
bunrjzni.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Control Panel\International\Geo\Nation bunrjzni.exe -
Loads dropped DLL 3 IoCs
Processes:
Signed PO801221651.exebunrjzni.execmmon32.exepid process 1440 Signed PO801221651.exe 2008 bunrjzni.exe 1232 cmmon32.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
bunrjzni.exebunrjzni.execmmon32.exedescription pid process target process PID 2008 set thread context of 1452 2008 bunrjzni.exe bunrjzni.exe PID 1452 set thread context of 1244 1452 bunrjzni.exe Explorer.EXE PID 1232 set thread context of 1244 1232 cmmon32.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
cmmon32.exedescription ioc process Key created \Registry\User\S-1-5-21-2292972927-2705560509-2768824231-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 cmmon32.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
Processes:
bunrjzni.execmmon32.exepid process 1452 bunrjzni.exe 1452 bunrjzni.exe 1452 bunrjzni.exe 1452 bunrjzni.exe 1232 cmmon32.exe 1232 cmmon32.exe 1232 cmmon32.exe 1232 cmmon32.exe 1232 cmmon32.exe 1232 cmmon32.exe 1232 cmmon32.exe 1232 cmmon32.exe 1232 cmmon32.exe 1232 cmmon32.exe 1232 cmmon32.exe 1232 cmmon32.exe 1232 cmmon32.exe 1232 cmmon32.exe 1232 cmmon32.exe 1232 cmmon32.exe 1232 cmmon32.exe 1232 cmmon32.exe 1232 cmmon32.exe 1232 cmmon32.exe 1232 cmmon32.exe 1232 cmmon32.exe 1232 cmmon32.exe -
Suspicious behavior: MapViewOfSection 8 IoCs
Processes:
bunrjzni.exebunrjzni.execmmon32.exepid process 2008 bunrjzni.exe 1452 bunrjzni.exe 1452 bunrjzni.exe 1452 bunrjzni.exe 1232 cmmon32.exe 1232 cmmon32.exe 1232 cmmon32.exe 1232 cmmon32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
bunrjzni.execmmon32.exedescription pid process Token: SeDebugPrivilege 1452 bunrjzni.exe Token: SeDebugPrivilege 1232 cmmon32.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1244 Explorer.EXE 1244 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1244 Explorer.EXE 1244 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
Signed PO801221651.exebunrjzni.exeExplorer.EXEcmmon32.exedescription pid process target process PID 1440 wrote to memory of 2008 1440 Signed PO801221651.exe bunrjzni.exe PID 1440 wrote to memory of 2008 1440 Signed PO801221651.exe bunrjzni.exe PID 1440 wrote to memory of 2008 1440 Signed PO801221651.exe bunrjzni.exe PID 1440 wrote to memory of 2008 1440 Signed PO801221651.exe bunrjzni.exe PID 2008 wrote to memory of 1452 2008 bunrjzni.exe bunrjzni.exe PID 2008 wrote to memory of 1452 2008 bunrjzni.exe bunrjzni.exe PID 2008 wrote to memory of 1452 2008 bunrjzni.exe bunrjzni.exe PID 2008 wrote to memory of 1452 2008 bunrjzni.exe bunrjzni.exe PID 2008 wrote to memory of 1452 2008 bunrjzni.exe bunrjzni.exe PID 1244 wrote to memory of 1232 1244 Explorer.EXE cmmon32.exe PID 1244 wrote to memory of 1232 1244 Explorer.EXE cmmon32.exe PID 1244 wrote to memory of 1232 1244 Explorer.EXE cmmon32.exe PID 1244 wrote to memory of 1232 1244 Explorer.EXE cmmon32.exe PID 1232 wrote to memory of 1924 1232 cmmon32.exe Firefox.exe PID 1232 wrote to memory of 1924 1232 cmmon32.exe Firefox.exe PID 1232 wrote to memory of 1924 1232 cmmon32.exe Firefox.exe PID 1232 wrote to memory of 1924 1232 cmmon32.exe Firefox.exe PID 1232 wrote to memory of 1924 1232 cmmon32.exe Firefox.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Signed PO801221651.exe"C:\Users\Admin\AppData\Local\Temp\Signed PO801221651.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\bunrjzni.exe"C:\Users\Admin\AppData\Local\Temp\bunrjzni.exe" C:\Users\Admin\AppData\Local\Temp\wleqathvh.hy3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\bunrjzni.exe"C:\Users\Admin\AppData\Local\Temp\bunrjzni.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\bunrjzni.exeFilesize
11KB
MD5d521de81fab51fde9dba5153ae206e27
SHA18cb91b5b6d0eb823268ef46888faddd08f1dc47a
SHA2569bab738bb52c8e11e723842806cca00c889f14d3759f1f8b24b32778715a434b
SHA512f19b1b12eef5b46b72a6efc1261f0526f7d873a68c8d4b23bef04b47865d80c14387292a4a547ecbbdda02da2440fff5ff3b0cbeb7e082e62ba42ecd9ea95b50
-
C:\Users\Admin\AppData\Local\Temp\bunrjzni.exeFilesize
11KB
MD5d521de81fab51fde9dba5153ae206e27
SHA18cb91b5b6d0eb823268ef46888faddd08f1dc47a
SHA2569bab738bb52c8e11e723842806cca00c889f14d3759f1f8b24b32778715a434b
SHA512f19b1b12eef5b46b72a6efc1261f0526f7d873a68c8d4b23bef04b47865d80c14387292a4a547ecbbdda02da2440fff5ff3b0cbeb7e082e62ba42ecd9ea95b50
-
C:\Users\Admin\AppData\Local\Temp\bunrjzni.exeFilesize
11KB
MD5d521de81fab51fde9dba5153ae206e27
SHA18cb91b5b6d0eb823268ef46888faddd08f1dc47a
SHA2569bab738bb52c8e11e723842806cca00c889f14d3759f1f8b24b32778715a434b
SHA512f19b1b12eef5b46b72a6efc1261f0526f7d873a68c8d4b23bef04b47865d80c14387292a4a547ecbbdda02da2440fff5ff3b0cbeb7e082e62ba42ecd9ea95b50
-
C:\Users\Admin\AppData\Local\Temp\pfwqhrd.tzFilesize
185KB
MD58eeb36965e6b1e7bcfc2edb596e0670e
SHA14660789269f49b1ee51ca1a4e1a1f56331f0047a
SHA256b54a83eb327a776a5f4237094c41dac137745e301c5aed34f5263cb2cc66af7d
SHA512b79b5c304eeca1183ecd6dee8cdb323221118aecf4ab979f3a6c7ac7c3f0f45cb4a0f933ae9fb67a75286e397e117c4fd5d8e7ee9837f5b67486a4983a3bb942
-
C:\Users\Admin\AppData\Local\Temp\wleqathvh.hyFilesize
5KB
MD5784c7648266c20dee955060e01472ae6
SHA13513ff21fa67d5dc6e44b799b9f8a55c75f41554
SHA256103be9c12848d6f1fb6d136e0e02262d96c3212459440a9d866d7ea9da3590da
SHA51295421bb3bd0bfd14dff0ca621751d615954ef7ae7fddbde92f0f69c1165ebe477e51163ae75bc35ea5c816a123cf1127de589f73a647d5758457a605c436d1b5
-
\Users\Admin\AppData\Local\Temp\bunrjzni.exeFilesize
11KB
MD5d521de81fab51fde9dba5153ae206e27
SHA18cb91b5b6d0eb823268ef46888faddd08f1dc47a
SHA2569bab738bb52c8e11e723842806cca00c889f14d3759f1f8b24b32778715a434b
SHA512f19b1b12eef5b46b72a6efc1261f0526f7d873a68c8d4b23bef04b47865d80c14387292a4a547ecbbdda02da2440fff5ff3b0cbeb7e082e62ba42ecd9ea95b50
-
\Users\Admin\AppData\Local\Temp\bunrjzni.exeFilesize
11KB
MD5d521de81fab51fde9dba5153ae206e27
SHA18cb91b5b6d0eb823268ef46888faddd08f1dc47a
SHA2569bab738bb52c8e11e723842806cca00c889f14d3759f1f8b24b32778715a434b
SHA512f19b1b12eef5b46b72a6efc1261f0526f7d873a68c8d4b23bef04b47865d80c14387292a4a547ecbbdda02da2440fff5ff3b0cbeb7e082e62ba42ecd9ea95b50
-
\Users\Admin\AppData\Local\Temp\sqlite3.dllFilesize
832KB
MD507fb6d31f37fb1b4164bef301306c288
SHA14cb41af6d63a07324ef6b18b1a1f43ce94e25626
SHA25606ddf0a370af00d994824605a8e1307ba138f89b2d864539f0d19e8804edac02
SHA512cab4a7c5805b80851aba5f2c9b001fabc1416f6648d891f49eacc81fe79287c5baa01306a42298da722750b812a4ea85388ffae9200dcf656dd1d5b5b9323353
-
memory/1232-73-0x0000000002210000-0x0000000002513000-memory.dmpFilesize
3.0MB
-
memory/1232-71-0x0000000000E00000-0x0000000000E0D000-memory.dmpFilesize
52KB
-
memory/1232-76-0x0000000000080000-0x00000000000AD000-memory.dmpFilesize
180KB
-
memory/1232-74-0x0000000000910000-0x000000000099F000-memory.dmpFilesize
572KB
-
memory/1232-70-0x0000000000000000-mapping.dmp
-
memory/1232-72-0x0000000000080000-0x00000000000AD000-memory.dmpFilesize
180KB
-
memory/1244-78-0x0000000007100000-0x0000000007284000-memory.dmpFilesize
1.5MB
-
memory/1244-75-0x0000000007100000-0x0000000007284000-memory.dmpFilesize
1.5MB
-
memory/1244-69-0x0000000004D40000-0x0000000004E50000-memory.dmpFilesize
1.1MB
-
memory/1440-54-0x0000000076181000-0x0000000076183000-memory.dmpFilesize
8KB
-
memory/1452-63-0x00000000004012B0-mapping.dmp
-
memory/1452-68-0x00000000000C0000-0x00000000000D0000-memory.dmpFilesize
64KB
-
memory/1452-67-0x0000000000A00000-0x0000000000D03000-memory.dmpFilesize
3.0MB
-
memory/1452-66-0x0000000000401000-0x000000000042F000-memory.dmpFilesize
184KB
-
memory/1452-65-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/2008-56-0x0000000000000000-mapping.dmp