Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
11/01/2023, 09:19
Static task
static1
Behavioral task
behavioral1
Sample
Invoice NO 22073895.exe
Resource
win7-20221111-en
General
-
Target
Invoice NO 22073895.exe
-
Size
422KB
-
MD5
dee7396305b42cf03353059427ef8338
-
SHA1
656b2744eed942b4a4659d73813e3bebe704eb5a
-
SHA256
f5ae9ee403c63e78514c23cdb6297c09a5367c241f6151def5fe1fc096946de4
-
SHA512
d7b0a4e2f1478272dad605f92137e6cc649d3ffbee6e27710d290c4983a22d3e7bf8f3117c3e3b76c9044cc00e0503f9061454a2faa3d2651fb56323330f4159
-
SSDEEP
6144:oYa63qgvG1/xZGA3iCc34BJ8/BL7jYaMRHajFvC/H2wGy1JBq6Ou:oYNnvKHyx2J8xQvVa4/HBGy1Xr
Malware Config
Extracted
formbook
poub
WY0eksfISzRg4O6c+opnGL6gaw==
moRjn9ExtYi8UmUo+Tya
2vME+GedoxzFnuLXesUoVj4=
EvW4JWJ1NQ8nN3tA3SM=
2mK9efMZMgN1VOs=
8d0jua5b0J6AQEW7
/2cyThOd37DSTYMASDye4Q0t/Vs=
ral+tbIh2KKAQEW7
YLY9jsPtYB/FRmMo+Tya
R1WcElWAMtFxFrVqtZT2ZpIS9xRZNho=
KFXGg/T1pCC9GjrxUPTcjw==
8mMlK5nDwjjPFTP5jMtAtQ0t/Vs=
c7am8nhhlCo=
UW91trZj6dENxuRdpxOvW1Cf
sjOMUcvq6lYJCZEfV4euFzY=
62nBgPjdmWQkmWElww==
64E8JqA1aruSUvw=
NqI1reXpcR+REye0
8+y1oOsbjgSyEhjXUPTcjw==
Rx9by8gNBwN1VOs=
Muif0yE4CQN1VOs=
VEt6//SsIukFo46EOTs=
Z8su52MYL67C
usDwuHRs8/KlWg==
idmltXXu7XAgHLE/UPTcjw==
QPrxO2shWNiGexGboHDSRqBQ1TBd
hq9rqBND8/KlWg==
QS9iHFx08/KlWg==
v1soVFoThEdt/B/dK0v4+6Wb
7rqJytN13KKAQEW7
OWbeN2SDJwonsI6EOTs=
aqQrrKZDm16GMlAtvxavW1Cf
imnEZWIEbC4M8Q+i
Bry3oQg5+6ZaUNxzwg==
B3vYmyxPQS5XYvmCsqQXX8X948Zf
KbGBmwwCyKTKsUcRUNN6CD61aw==
2WpDae4P+W4cdqc8kPBcjqg0wS1X
MvkZLPRY25jI
Alr0VZGxYxG3dR/zSNjBhQ==
ZJkdjczlrF+8l0Os
dcmMkFm+QhFD4OM=
fMdUrd4J1n4mmWElww==
Gat+k1fHg11vTQ==
sn+7Q4uxaAu9FyGv7k24F1DWaBEvmRI=
CjvGRTnXOhtN6QSNxhmvW1Cf
CpHvP2VSxaKAQEW7
qQWkEUJYFKhPttOZ4MarX8KKLl+/Jg==
GNVP4yIy8/KlWg==
pqfVAERhYxN7YPM=
9nS5b/AGCpZNAfZj1A==
a3GcpSND8/KlWg==
fin6NmQXayreIOrzPyw=
EjdROfeTsDPVH+rzPyw=
DO4xD8nURBwM8Q+i
+p/LQHFh0KOAQEW7
iNos10QpwjvjvFrXJYtYFiuHdA==
SX//aFP4Yi5T6NbcKQr07J6e
2NKh0dNr52sTdH4OSNjBhQ==
ZMSJmgsxFrlp5fnecrgeVYcP4xRZNho=
oXmlavAJ+3IbFbl3Gm4H+iKG
ijjWRYCaXiTcigreSNjBhQ==
ZqpH49I4XPu1k+rzPyw=
ZZUh+4FrrBbKukgJWoeuFzY=
lLnTxHn7rq/W9G8rzjsgCnyBYw==
drzjup.space
Signatures
-
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/1324-66-0x0000000000400000-0x000000000042C000-memory.dmp xloader behavioral1/memory/564-72-0x0000000000080000-0x00000000000AC000-memory.dmp xloader behavioral1/memory/564-77-0x0000000000080000-0x00000000000AC000-memory.dmp xloader -
Executes dropped EXE 3 IoCs
pid Process 1956 yuzvbe.exe 1324 yuzvbe.exe 1644 vgazhg4mxxx.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\International\Geo\Nation yuzvbe.exe -
Loads dropped DLL 7 IoCs
pid Process 1720 Invoice NO 22073895.exe 1720 Invoice NO 22073895.exe 1956 yuzvbe.exe 1472 WerFault.exe 1472 WerFault.exe 1472 WerFault.exe 1472 WerFault.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \Registry\Machine\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run systray.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\J0A4ANSH7V = "C:\\Program Files (x86)\\O0fdx\\vgazhg4mxxx.exe" systray.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1956 set thread context of 1324 1956 yuzvbe.exe 29 PID 1324 set thread context of 1248 1324 yuzvbe.exe 15 PID 564 set thread context of 1248 564 systray.exe 15 -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\O0fdx\vgazhg4mxxx.exe systray.exe File created C:\Program Files (x86)\O0fdx\vgazhg4mxxx.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1472 1644 WerFault.exe 36 -
description ioc Process Key created \Registry\User\S-1-5-21-3406023954-474543476-3319432036-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 systray.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 1324 yuzvbe.exe 1324 yuzvbe.exe 564 systray.exe 564 systray.exe 564 systray.exe 564 systray.exe 564 systray.exe 564 systray.exe 564 systray.exe 564 systray.exe 564 systray.exe 564 systray.exe 564 systray.exe 564 systray.exe 564 systray.exe 564 systray.exe 564 systray.exe 564 systray.exe 564 systray.exe 564 systray.exe 564 systray.exe 564 systray.exe 564 systray.exe 564 systray.exe 564 systray.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1248 Explorer.EXE -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 1956 yuzvbe.exe 1324 yuzvbe.exe 1324 yuzvbe.exe 1324 yuzvbe.exe 564 systray.exe 564 systray.exe 564 systray.exe 564 systray.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1324 yuzvbe.exe Token: SeDebugPrivilege 564 systray.exe Token: SeShutdownPrivilege 1248 Explorer.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1248 Explorer.EXE 1248 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1248 Explorer.EXE 1248 Explorer.EXE -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1720 wrote to memory of 1956 1720 Invoice NO 22073895.exe 28 PID 1720 wrote to memory of 1956 1720 Invoice NO 22073895.exe 28 PID 1720 wrote to memory of 1956 1720 Invoice NO 22073895.exe 28 PID 1720 wrote to memory of 1956 1720 Invoice NO 22073895.exe 28 PID 1956 wrote to memory of 1324 1956 yuzvbe.exe 29 PID 1956 wrote to memory of 1324 1956 yuzvbe.exe 29 PID 1956 wrote to memory of 1324 1956 yuzvbe.exe 29 PID 1956 wrote to memory of 1324 1956 yuzvbe.exe 29 PID 1956 wrote to memory of 1324 1956 yuzvbe.exe 29 PID 1248 wrote to memory of 564 1248 Explorer.EXE 30 PID 1248 wrote to memory of 564 1248 Explorer.EXE 30 PID 1248 wrote to memory of 564 1248 Explorer.EXE 30 PID 1248 wrote to memory of 564 1248 Explorer.EXE 30 PID 564 wrote to memory of 1412 564 systray.exe 31 PID 564 wrote to memory of 1412 564 systray.exe 31 PID 564 wrote to memory of 1412 564 systray.exe 31 PID 564 wrote to memory of 1412 564 systray.exe 31 PID 564 wrote to memory of 1476 564 systray.exe 34 PID 564 wrote to memory of 1476 564 systray.exe 34 PID 564 wrote to memory of 1476 564 systray.exe 34 PID 564 wrote to memory of 1476 564 systray.exe 34 PID 564 wrote to memory of 1476 564 systray.exe 34 PID 1248 wrote to memory of 1644 1248 Explorer.EXE 36 PID 1248 wrote to memory of 1644 1248 Explorer.EXE 36 PID 1248 wrote to memory of 1644 1248 Explorer.EXE 36 PID 1248 wrote to memory of 1644 1248 Explorer.EXE 36 PID 1644 wrote to memory of 1472 1644 vgazhg4mxxx.exe 37 PID 1644 wrote to memory of 1472 1644 vgazhg4mxxx.exe 37 PID 1644 wrote to memory of 1472 1644 vgazhg4mxxx.exe 37 PID 1644 wrote to memory of 1472 1644 vgazhg4mxxx.exe 37
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Drops file in Program Files directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\Invoice NO 22073895.exe"C:\Users\Admin\AppData\Local\Temp\Invoice NO 22073895.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\yuzvbe.exe"C:\Users\Admin\AppData\Local\Temp\yuzvbe.exe" C:\Users\Admin\AppData\Local\Temp\oiudcvk.naz3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\yuzvbe.exe"C:\Users\Admin\AppData\Local\Temp\yuzvbe.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1324
-
-
-
-
C:\Windows\SysWOW64\systray.exe"C:\Windows\SysWOW64\systray.exe"2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\yuzvbe.exe"3⤵PID:1412
-
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1476
-
-
-
C:\Program Files (x86)\O0fdx\vgazhg4mxxx.exe"C:\Program Files (x86)\O0fdx\vgazhg4mxxx.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1644 -s 1883⤵
- Loads dropped DLL
- Program crash
PID:1472
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD5bb7ce9d5bf22e0feaaa9edf66bf01316
SHA1e9ff3c8b46963f58b74ea69b293530ebe691d188
SHA256a1dc5eb9fc043bb98f9cd8feaeec06d32eb3ba8e0a5a3ba26de41b8e728c6f51
SHA512ca7910b68f486b619883855e6f4cd90334346bf887f7e2c9c24377b6780f2ef63bec95581cf892cdde26e718edf89cf229ccf36e9c3632ba0c82dbfb2fbb1703
-
Filesize
84KB
MD5bb7ce9d5bf22e0feaaa9edf66bf01316
SHA1e9ff3c8b46963f58b74ea69b293530ebe691d188
SHA256a1dc5eb9fc043bb98f9cd8feaeec06d32eb3ba8e0a5a3ba26de41b8e728c6f51
SHA512ca7910b68f486b619883855e6f4cd90334346bf887f7e2c9c24377b6780f2ef63bec95581cf892cdde26e718edf89cf229ccf36e9c3632ba0c82dbfb2fbb1703
-
Filesize
196KB
MD5c72cb34300327e99eb492e77f72bd939
SHA16d1e70b919f8d28dfafff422bf3ca812d095bbea
SHA2561626ef2488418b4956a5b2d973d03c6ff2c61892b2aafa5ff252048a32383923
SHA512fc1c116065c03600d687375008ab90eeebbcf678db469549877d70a254fc491d383d01280756777ab35fd7c024b674d0f637ecaf9da95c21b7f6087b5d67e561
-
Filesize
5KB
MD584246e403c2b874c2bf654d2b6257b1b
SHA1de9d51e2deed96c0e4d6a442605214019d0d318f
SHA25600e6e836f3118ae645edc02d49a29d96dca6691853ef158217f78b523a92a64e
SHA5125a92e73c89e48d9d44653e15eb055741f5d2c266783e6faf9742220d7e6959c8196e6a5bbd647f62170995f45f03a23d537800439d1aac7ddb69b226ded02d0d
-
Filesize
84KB
MD5bb7ce9d5bf22e0feaaa9edf66bf01316
SHA1e9ff3c8b46963f58b74ea69b293530ebe691d188
SHA256a1dc5eb9fc043bb98f9cd8feaeec06d32eb3ba8e0a5a3ba26de41b8e728c6f51
SHA512ca7910b68f486b619883855e6f4cd90334346bf887f7e2c9c24377b6780f2ef63bec95581cf892cdde26e718edf89cf229ccf36e9c3632ba0c82dbfb2fbb1703
-
Filesize
84KB
MD5bb7ce9d5bf22e0feaaa9edf66bf01316
SHA1e9ff3c8b46963f58b74ea69b293530ebe691d188
SHA256a1dc5eb9fc043bb98f9cd8feaeec06d32eb3ba8e0a5a3ba26de41b8e728c6f51
SHA512ca7910b68f486b619883855e6f4cd90334346bf887f7e2c9c24377b6780f2ef63bec95581cf892cdde26e718edf89cf229ccf36e9c3632ba0c82dbfb2fbb1703
-
Filesize
84KB
MD5bb7ce9d5bf22e0feaaa9edf66bf01316
SHA1e9ff3c8b46963f58b74ea69b293530ebe691d188
SHA256a1dc5eb9fc043bb98f9cd8feaeec06d32eb3ba8e0a5a3ba26de41b8e728c6f51
SHA512ca7910b68f486b619883855e6f4cd90334346bf887f7e2c9c24377b6780f2ef63bec95581cf892cdde26e718edf89cf229ccf36e9c3632ba0c82dbfb2fbb1703
-
Filesize
84KB
MD5bb7ce9d5bf22e0feaaa9edf66bf01316
SHA1e9ff3c8b46963f58b74ea69b293530ebe691d188
SHA256a1dc5eb9fc043bb98f9cd8feaeec06d32eb3ba8e0a5a3ba26de41b8e728c6f51
SHA512ca7910b68f486b619883855e6f4cd90334346bf887f7e2c9c24377b6780f2ef63bec95581cf892cdde26e718edf89cf229ccf36e9c3632ba0c82dbfb2fbb1703
-
Filesize
84KB
MD5bb7ce9d5bf22e0feaaa9edf66bf01316
SHA1e9ff3c8b46963f58b74ea69b293530ebe691d188
SHA256a1dc5eb9fc043bb98f9cd8feaeec06d32eb3ba8e0a5a3ba26de41b8e728c6f51
SHA512ca7910b68f486b619883855e6f4cd90334346bf887f7e2c9c24377b6780f2ef63bec95581cf892cdde26e718edf89cf229ccf36e9c3632ba0c82dbfb2fbb1703
-
Filesize
84KB
MD5bb7ce9d5bf22e0feaaa9edf66bf01316
SHA1e9ff3c8b46963f58b74ea69b293530ebe691d188
SHA256a1dc5eb9fc043bb98f9cd8feaeec06d32eb3ba8e0a5a3ba26de41b8e728c6f51
SHA512ca7910b68f486b619883855e6f4cd90334346bf887f7e2c9c24377b6780f2ef63bec95581cf892cdde26e718edf89cf229ccf36e9c3632ba0c82dbfb2fbb1703
-
Filesize
84KB
MD5bb7ce9d5bf22e0feaaa9edf66bf01316
SHA1e9ff3c8b46963f58b74ea69b293530ebe691d188
SHA256a1dc5eb9fc043bb98f9cd8feaeec06d32eb3ba8e0a5a3ba26de41b8e728c6f51
SHA512ca7910b68f486b619883855e6f4cd90334346bf887f7e2c9c24377b6780f2ef63bec95581cf892cdde26e718edf89cf229ccf36e9c3632ba0c82dbfb2fbb1703
-
Filesize
84KB
MD5bb7ce9d5bf22e0feaaa9edf66bf01316
SHA1e9ff3c8b46963f58b74ea69b293530ebe691d188
SHA256a1dc5eb9fc043bb98f9cd8feaeec06d32eb3ba8e0a5a3ba26de41b8e728c6f51
SHA512ca7910b68f486b619883855e6f4cd90334346bf887f7e2c9c24377b6780f2ef63bec95581cf892cdde26e718edf89cf229ccf36e9c3632ba0c82dbfb2fbb1703
-
Filesize
84KB
MD5bb7ce9d5bf22e0feaaa9edf66bf01316
SHA1e9ff3c8b46963f58b74ea69b293530ebe691d188
SHA256a1dc5eb9fc043bb98f9cd8feaeec06d32eb3ba8e0a5a3ba26de41b8e728c6f51
SHA512ca7910b68f486b619883855e6f4cd90334346bf887f7e2c9c24377b6780f2ef63bec95581cf892cdde26e718edf89cf229ccf36e9c3632ba0c82dbfb2fbb1703
-
Filesize
84KB
MD5bb7ce9d5bf22e0feaaa9edf66bf01316
SHA1e9ff3c8b46963f58b74ea69b293530ebe691d188
SHA256a1dc5eb9fc043bb98f9cd8feaeec06d32eb3ba8e0a5a3ba26de41b8e728c6f51
SHA512ca7910b68f486b619883855e6f4cd90334346bf887f7e2c9c24377b6780f2ef63bec95581cf892cdde26e718edf89cf229ccf36e9c3632ba0c82dbfb2fbb1703