Analysis

  • max time kernel
    149s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    04/01/2023, 16:10

General

  • Target

    CMA_CGM_FRIGHT_INVOICE.exe

  • Size

    451KB

  • MD5

    fed72359bb77169840555a508913b4bc

  • SHA1

    d94292cf1e41f55441381a15ae3d4525d1d1fa29

  • SHA256

    bd03ffb758b3a8283f18c63ab82fb33b10f7ef7cf2e5972ea4a8c6677f0cbea3

  • SHA512

    56c13682bebd6e39c867cee583d922b71ffca0090bb9cde5e43e6d2d0905f4e124dee3b41472907c86d30c9e1b37c973fb7d8410237daeed8edd2b3b4ae7b8ff

  • SSDEEP

    6144:gYa61jW0ERkSuFLaiBi78+kOL1dF4Em5TgR8VnYTalg40aQ91hOuz0lDi/JuxuJM:gYjzEUF+i0jkOL55qXWz91hOFDixZM

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1252
    • C:\Users\Admin\AppData\Local\Temp\CMA_CGM_FRIGHT_INVOICE.exe
      "C:\Users\Admin\AppData\Local\Temp\CMA_CGM_FRIGHT_INVOICE.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1380
      • C:\Users\Admin\AppData\Local\Temp\vobwj.exe
        "C:\Users\Admin\AppData\Local\Temp\vobwj.exe" C:\Users\Admin\AppData\Local\Temp\facebarozn.q
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:1780
        • C:\Users\Admin\AppData\Local\Temp\vobwj.exe
          "C:\Users\Admin\AppData\Local\Temp\vobwj.exe"
          4⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:860
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\SysWOW64\rundll32.exe"
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:796
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:1796

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\facebarozn.q

      Filesize

      5KB

      MD5

      7a07e275c51ba71ec2e2b08258d18811

      SHA1

      ee22039afc8dd2cc4a71e3ef4f9c9f516ec4a8cc

      SHA256

      8e2d031c4e31906d7a89b2877d3b671a8d5ff8150c1e26a953b0e31ef0c220eb

      SHA512

      bab125fe5cc235f9e4e8e56268c99b659de58ca58d3880d1f4707ff45a48452b372603578a4e3600829ca3d6d4b0bf90716350657be856f937b1407cc637daa7

    • C:\Users\Admin\AppData\Local\Temp\vciwbkeuj.ua

      Filesize

      205KB

      MD5

      89df5af5cb3fc4f687b4cc799a73a6cb

      SHA1

      21551e8c1afada77bfb474f6dcd82e87511c7876

      SHA256

      b2ca356184518add86e3f80162af1c3d901cfb4a8ecbf2994f4e7b2f5e2f3e84

      SHA512

      28d055a3887cc023aaeb54bc538c116a3fa20fff9fada63b5bc573df40fa392aea304c504f2b43632e3bd6b6fe3830354386c4a54dfb0ec6f8aeda48ce03ae8a

    • C:\Users\Admin\AppData\Local\Temp\vobwj.exe

      Filesize

      86KB

      MD5

      49602251b767b189ea0849a34c255553

      SHA1

      003fd44edc22bee93e2dc6e83d446e9f80585064

      SHA256

      92c163f73ec7ea1897dbbf44c3c85cd8e39bc6d95c3b42c0d5b18d96bbf2ef51

      SHA512

      d7a015a6a0e59e6b71af4fbde050a0febd6482da1365f22a73e5eee70f702813addcd8959087bdaf464ef055e8871f00383e518b55e223c2fd2f96dbffd371a9

    • C:\Users\Admin\AppData\Local\Temp\vobwj.exe

      Filesize

      86KB

      MD5

      49602251b767b189ea0849a34c255553

      SHA1

      003fd44edc22bee93e2dc6e83d446e9f80585064

      SHA256

      92c163f73ec7ea1897dbbf44c3c85cd8e39bc6d95c3b42c0d5b18d96bbf2ef51

      SHA512

      d7a015a6a0e59e6b71af4fbde050a0febd6482da1365f22a73e5eee70f702813addcd8959087bdaf464ef055e8871f00383e518b55e223c2fd2f96dbffd371a9

    • C:\Users\Admin\AppData\Local\Temp\vobwj.exe

      Filesize

      86KB

      MD5

      49602251b767b189ea0849a34c255553

      SHA1

      003fd44edc22bee93e2dc6e83d446e9f80585064

      SHA256

      92c163f73ec7ea1897dbbf44c3c85cd8e39bc6d95c3b42c0d5b18d96bbf2ef51

      SHA512

      d7a015a6a0e59e6b71af4fbde050a0febd6482da1365f22a73e5eee70f702813addcd8959087bdaf464ef055e8871f00383e518b55e223c2fd2f96dbffd371a9

    • \Users\Admin\AppData\Local\Temp\sqlite3.dll

      Filesize

      841KB

      MD5

      5fc6cd5d5ca1489d2a3c361717359a95

      SHA1

      5c630e232cd5761e7a611e41515be4afa3e7a141

      SHA256

      85c8b8a648c56cf5f063912e0e26ecebb90e0caf2f442fd5cdd8287301fe7e81

      SHA512

      5f9124a721f6b463d4f980920e87925098aa753b0fa2a59a3ff48b48d2b1a45d760fd46445414d84fb66321181cd2c82a4194361811114c15e35b42f838ab792

    • \Users\Admin\AppData\Local\Temp\vobwj.exe

      Filesize

      86KB

      MD5

      49602251b767b189ea0849a34c255553

      SHA1

      003fd44edc22bee93e2dc6e83d446e9f80585064

      SHA256

      92c163f73ec7ea1897dbbf44c3c85cd8e39bc6d95c3b42c0d5b18d96bbf2ef51

      SHA512

      d7a015a6a0e59e6b71af4fbde050a0febd6482da1365f22a73e5eee70f702813addcd8959087bdaf464ef055e8871f00383e518b55e223c2fd2f96dbffd371a9

    • \Users\Admin\AppData\Local\Temp\vobwj.exe

      Filesize

      86KB

      MD5

      49602251b767b189ea0849a34c255553

      SHA1

      003fd44edc22bee93e2dc6e83d446e9f80585064

      SHA256

      92c163f73ec7ea1897dbbf44c3c85cd8e39bc6d95c3b42c0d5b18d96bbf2ef51

      SHA512

      d7a015a6a0e59e6b71af4fbde050a0febd6482da1365f22a73e5eee70f702813addcd8959087bdaf464ef055e8871f00383e518b55e223c2fd2f96dbffd371a9

    • \Users\Admin\AppData\Local\Temp\vobwj.exe

      Filesize

      86KB

      MD5

      49602251b767b189ea0849a34c255553

      SHA1

      003fd44edc22bee93e2dc6e83d446e9f80585064

      SHA256

      92c163f73ec7ea1897dbbf44c3c85cd8e39bc6d95c3b42c0d5b18d96bbf2ef51

      SHA512

      d7a015a6a0e59e6b71af4fbde050a0febd6482da1365f22a73e5eee70f702813addcd8959087bdaf464ef055e8871f00383e518b55e223c2fd2f96dbffd371a9

    • memory/796-73-0x00000000020A0000-0x00000000023A3000-memory.dmp

      Filesize

      3.0MB

    • memory/796-74-0x0000000000800000-0x000000000088F000-memory.dmp

      Filesize

      572KB

    • memory/796-71-0x0000000000120000-0x000000000012E000-memory.dmp

      Filesize

      56KB

    • memory/796-72-0x00000000000D0000-0x00000000000FD000-memory.dmp

      Filesize

      180KB

    • memory/796-76-0x00000000000D0000-0x00000000000FD000-memory.dmp

      Filesize

      180KB

    • memory/860-65-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/860-66-0x0000000000930000-0x0000000000C33000-memory.dmp

      Filesize

      3.0MB

    • memory/860-67-0x0000000000290000-0x00000000002A0000-memory.dmp

      Filesize

      64KB

    • memory/1252-77-0x0000000004C70000-0x0000000004D4E000-memory.dmp

      Filesize

      888KB

    • memory/1252-75-0x0000000004C70000-0x0000000004D4E000-memory.dmp

      Filesize

      888KB

    • memory/1252-68-0x0000000004B70000-0x0000000004C69000-memory.dmp

      Filesize

      996KB

    • memory/1252-78-0x000007FEF6230000-0x000007FEF6373000-memory.dmp

      Filesize

      1.3MB

    • memory/1252-79-0x000007FEED160000-0x000007FEED16A000-memory.dmp

      Filesize

      40KB

    • memory/1380-54-0x0000000074F01000-0x0000000074F03000-memory.dmp

      Filesize

      8KB