Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-01-2023 16:10

General

  • Target

    CMA_CGM_FRIGHT_INVOICE.exe

  • Size

    451KB

  • MD5

    fed72359bb77169840555a508913b4bc

  • SHA1

    d94292cf1e41f55441381a15ae3d4525d1d1fa29

  • SHA256

    bd03ffb758b3a8283f18c63ab82fb33b10f7ef7cf2e5972ea4a8c6677f0cbea3

  • SHA512

    56c13682bebd6e39c867cee583d922b71ffca0090bb9cde5e43e6d2d0905f4e124dee3b41472907c86d30c9e1b37c973fb7d8410237daeed8edd2b3b4ae7b8ff

  • SSDEEP

    6144:gYa61jW0ERkSuFLaiBi78+kOL1dF4Em5TgR8VnYTalg40aQ91hOuz0lDi/JuxuJM:gYjzEUF+i0jkOL55qXWz91hOFDixZM

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:380
    • C:\Users\Admin\AppData\Local\Temp\CMA_CGM_FRIGHT_INVOICE.exe
      "C:\Users\Admin\AppData\Local\Temp\CMA_CGM_FRIGHT_INVOICE.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4900
      • C:\Users\Admin\AppData\Local\Temp\vobwj.exe
        "C:\Users\Admin\AppData\Local\Temp\vobwj.exe" C:\Users\Admin\AppData\Local\Temp\facebarozn.q
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:4060
        • C:\Users\Admin\AppData\Local\Temp\vobwj.exe
          "C:\Users\Admin\AppData\Local\Temp\vobwj.exe"
          4⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:740
    • C:\Windows\SysWOW64\cmmon32.exe
      "C:\Windows\SysWOW64\cmmon32.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1608
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:4056
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -u -p 4056 -s 116
            4⤵
            • Program crash
            PID:728
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -pss -s 428 -p 4056 -ip 4056
      1⤵
        PID:5032

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\facebarozn.q

        Filesize

        5KB

        MD5

        7a07e275c51ba71ec2e2b08258d18811

        SHA1

        ee22039afc8dd2cc4a71e3ef4f9c9f516ec4a8cc

        SHA256

        8e2d031c4e31906d7a89b2877d3b671a8d5ff8150c1e26a953b0e31ef0c220eb

        SHA512

        bab125fe5cc235f9e4e8e56268c99b659de58ca58d3880d1f4707ff45a48452b372603578a4e3600829ca3d6d4b0bf90716350657be856f937b1407cc637daa7

      • C:\Users\Admin\AppData\Local\Temp\vciwbkeuj.ua

        Filesize

        205KB

        MD5

        89df5af5cb3fc4f687b4cc799a73a6cb

        SHA1

        21551e8c1afada77bfb474f6dcd82e87511c7876

        SHA256

        b2ca356184518add86e3f80162af1c3d901cfb4a8ecbf2994f4e7b2f5e2f3e84

        SHA512

        28d055a3887cc023aaeb54bc538c116a3fa20fff9fada63b5bc573df40fa392aea304c504f2b43632e3bd6b6fe3830354386c4a54dfb0ec6f8aeda48ce03ae8a

      • C:\Users\Admin\AppData\Local\Temp\vobwj.exe

        Filesize

        86KB

        MD5

        49602251b767b189ea0849a34c255553

        SHA1

        003fd44edc22bee93e2dc6e83d446e9f80585064

        SHA256

        92c163f73ec7ea1897dbbf44c3c85cd8e39bc6d95c3b42c0d5b18d96bbf2ef51

        SHA512

        d7a015a6a0e59e6b71af4fbde050a0febd6482da1365f22a73e5eee70f702813addcd8959087bdaf464ef055e8871f00383e518b55e223c2fd2f96dbffd371a9

      • C:\Users\Admin\AppData\Local\Temp\vobwj.exe

        Filesize

        86KB

        MD5

        49602251b767b189ea0849a34c255553

        SHA1

        003fd44edc22bee93e2dc6e83d446e9f80585064

        SHA256

        92c163f73ec7ea1897dbbf44c3c85cd8e39bc6d95c3b42c0d5b18d96bbf2ef51

        SHA512

        d7a015a6a0e59e6b71af4fbde050a0febd6482da1365f22a73e5eee70f702813addcd8959087bdaf464ef055e8871f00383e518b55e223c2fd2f96dbffd371a9

      • C:\Users\Admin\AppData\Local\Temp\vobwj.exe

        Filesize

        86KB

        MD5

        49602251b767b189ea0849a34c255553

        SHA1

        003fd44edc22bee93e2dc6e83d446e9f80585064

        SHA256

        92c163f73ec7ea1897dbbf44c3c85cd8e39bc6d95c3b42c0d5b18d96bbf2ef51

        SHA512

        d7a015a6a0e59e6b71af4fbde050a0febd6482da1365f22a73e5eee70f702813addcd8959087bdaf464ef055e8871f00383e518b55e223c2fd2f96dbffd371a9

      • memory/380-142-0x00000000082E0000-0x00000000083ED000-memory.dmp

        Filesize

        1.1MB

      • memory/380-150-0x0000000005110000-0x0000000005203000-memory.dmp

        Filesize

        972KB

      • memory/380-149-0x0000000005110000-0x0000000005203000-memory.dmp

        Filesize

        972KB

      • memory/740-140-0x0000000000A00000-0x0000000000D4A000-memory.dmp

        Filesize

        3.3MB

      • memory/740-141-0x00000000009B0000-0x00000000009C0000-memory.dmp

        Filesize

        64KB

      • memory/740-144-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/740-139-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/740-137-0x0000000000000000-mapping.dmp

      • memory/1608-143-0x0000000000000000-mapping.dmp

      • memory/1608-145-0x0000000000310000-0x000000000031C000-memory.dmp

        Filesize

        48KB

      • memory/1608-146-0x0000000000D60000-0x0000000000D8D000-memory.dmp

        Filesize

        180KB

      • memory/1608-147-0x0000000002EF0000-0x000000000323A000-memory.dmp

        Filesize

        3.3MB

      • memory/1608-148-0x0000000002C80000-0x0000000002D0F000-memory.dmp

        Filesize

        572KB

      • memory/4060-132-0x0000000000000000-mapping.dmp