Analysis
-
max time kernel
153s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
16-01-2023 20:16
Static task
static1
Behavioral task
behavioral1
Sample
ab70079bd5d9f38db26ee66651c5eb37fa85fb7d42461cde2fc84bdb8df15e41.exe
Resource
win7-20220812-en
General
-
Target
ab70079bd5d9f38db26ee66651c5eb37fa85fb7d42461cde2fc84bdb8df15e41.exe
-
Size
248KB
-
MD5
50ac8fd3c79049dc16386fe5cba4f734
-
SHA1
7400121311b7280b4030c96cfbb1dcc46a0c7963
-
SHA256
ab70079bd5d9f38db26ee66651c5eb37fa85fb7d42461cde2fc84bdb8df15e41
-
SHA512
69ff72c8ac037b470d5789db2c738f9aea82b7e263763f59e85da591ff8795a6bffb16329a69b361998964343b7102f42d389feb12aa3a4fcfddb08f1f4242cd
-
SSDEEP
6144:Lkw+cH+ONtOz2xxtnwWsJZCnTK6uQQS5BjX85tCW:feONtlfWFCnTK6Qkotf
Malware Config
Extracted
formbook
scse
SKpYFyVNT2zunKf0uuM=
FlEHUseI7I5XbrO8fR/XBcS9ZA==
FPuxoUOxkLiATugw
VKdxsDSk0jdT5Kw=
FpqHf9iI/1tl97E=
YGI6sIl3UIxfZvlD+JiUuuLR
oBAEO0suBEAD5aK00A==
RKJqTzg4gQ/Q6DYSuTjDGkwuyl0ik5Kb8w==
VFg9s3W0/Ype8A3cZb+D7g==
hwD+VNd6014nrsaTWm4FBcS9ZA==
zkAdUq1soKYUfZaTqLmL
XVQ9WbRivUIQ477a/hKv+g==
QireF2geizAwmp674AGc5g==
PSTUQxs6j8OATugw
LHJhyy2VbX8NEqf0uuM=
MiY1vg6T3HqATugw
wqkUjaVXnGgBqA==
jUr/eUtSIT01Wegt
PjQidcqKzAbSZICUZb+D7g==
OkAmcv12sUEAIHwFHakzdIo2FPHw
zyDLsw+3I3H6gnaGZb+D7g==
ll0HRs5IJGxCZMJPahHgOt2RqjU=
YqaIEokHuw6V
jGJG11YCObJ+IQIXCW8KU+ZcbA==
jv4ITr8zITdT5Kw=
nXYro3yHe5YV5aK00A==
rJt1IPkxeQDUayhVCJyUuuLR
oFwz1DUU/RdD5aK00A==
FHlVTKEVIRFE5aK00A==
8GhjL2lJOWD+5aK00A==
k3BLouunGsagwhAi6oeUuuLR
p45GiQN5bZMjR9karDwDa442FPHw
Zdd7rVCKu/b3TIVU6t/lP92RqjU=
wyjxGjYHuw6V
nW5RrwV6yTdT5Kw=
itzGDGclWW4SqnLBSWH5Pt2RqjU=
8zwgceJYRWn+DKf0uuM=
EmojFmj027tsHrs=
ExQEPY5UyyS00HPvNNCH8w==
laiGCZRTkbg/XAl/Zb+D7g==
wYQysWBl+DdT5Kw=
MWo3rYV3XoAJ5aK00A==
hnht0SrcDR+XpjV6H6WUuuLR
rxqw6S7qG8A=
aEcfph/RAUAcfZYnXOw=
EXdVkuuzJ8eEjkTROs2D
MDYsc8l6w0wM7ZOiyQ==
Rw3XPwT+8UID5aK00A==
zDPp+Pskft/5iqS+0Q==
Z8h8hYCm/ULHXQ+YY2kJBcS9ZA==
vTDkm31vabx5EfoFMjLsVpBlz+fQfg==
+EcrRpZyp7tFba65dhvXBcS9ZA==
rHVJpwl6dLSATugw
gUoTghFSoTMpiXyQe9N3uOjQ
47Zwn/CkFQCty07ROs2D
NYkP+jcHuw6V
nfvdFnkHuw6V
L4piRRhAmfwGKITjemhRkmQ=
s6Jdx36Q+t5U7LE=
58iYH6dVmzYCnHZ/Zb+D7g==
IQ/WHZJWuVUD5aK00A==
Cf6t72PUxhnicjvBiFxqP0o2FPHw
DQr7l4R4rlEJ5aK00A==
62gezKeQv8mIIBbcZb+D7g==
kmuregister.com
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
tnufmzyerp.exetnufmzyerp.exepid process 4568 tnufmzyerp.exe 4932 tnufmzyerp.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
tnufmzyerp.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation tnufmzyerp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
tnufmzyerp.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\upkja = "C:\\Users\\Admin\\AppData\\Roaming\\msyragql\\eecyphevfwbp.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\tnufmzyerp.exe\" C:\\Users\\Admin\\AppData" tnufmzyerp.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
tnufmzyerp.exetnufmzyerp.exeexplorer.exedescription pid process target process PID 4568 set thread context of 4932 4568 tnufmzyerp.exe tnufmzyerp.exe PID 4932 set thread context of 704 4932 tnufmzyerp.exe Explorer.EXE PID 548 set thread context of 704 548 explorer.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
explorer.exedescription ioc process Key created \Registry\User\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 explorer.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
Processes:
tnufmzyerp.exeexplorer.exepid process 4932 tnufmzyerp.exe 4932 tnufmzyerp.exe 4932 tnufmzyerp.exe 4932 tnufmzyerp.exe 4932 tnufmzyerp.exe 4932 tnufmzyerp.exe 4932 tnufmzyerp.exe 4932 tnufmzyerp.exe 548 explorer.exe 548 explorer.exe 548 explorer.exe 548 explorer.exe 548 explorer.exe 548 explorer.exe 548 explorer.exe 548 explorer.exe 548 explorer.exe 548 explorer.exe 548 explorer.exe 548 explorer.exe 548 explorer.exe 548 explorer.exe 548 explorer.exe 548 explorer.exe 548 explorer.exe 548 explorer.exe 548 explorer.exe 548 explorer.exe 548 explorer.exe 548 explorer.exe 548 explorer.exe 548 explorer.exe 548 explorer.exe 548 explorer.exe 548 explorer.exe 548 explorer.exe 548 explorer.exe 548 explorer.exe 548 explorer.exe 548 explorer.exe 548 explorer.exe 548 explorer.exe 548 explorer.exe 548 explorer.exe 548 explorer.exe 548 explorer.exe 548 explorer.exe 548 explorer.exe 548 explorer.exe 548 explorer.exe 548 explorer.exe 548 explorer.exe 548 explorer.exe 548 explorer.exe 548 explorer.exe 548 explorer.exe 548 explorer.exe 548 explorer.exe 548 explorer.exe 548 explorer.exe 548 explorer.exe 548 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 704 Explorer.EXE -
Suspicious behavior: MapViewOfSection 9 IoCs
Processes:
tnufmzyerp.exetnufmzyerp.exeexplorer.exepid process 4568 tnufmzyerp.exe 4568 tnufmzyerp.exe 4932 tnufmzyerp.exe 4932 tnufmzyerp.exe 4932 tnufmzyerp.exe 548 explorer.exe 548 explorer.exe 548 explorer.exe 548 explorer.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
tnufmzyerp.exeexplorer.exedescription pid process Token: SeDebugPrivilege 4932 tnufmzyerp.exe Token: SeDebugPrivilege 548 explorer.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
ab70079bd5d9f38db26ee66651c5eb37fa85fb7d42461cde2fc84bdb8df15e41.exetnufmzyerp.exeExplorer.EXEexplorer.exedescription pid process target process PID 4880 wrote to memory of 4568 4880 ab70079bd5d9f38db26ee66651c5eb37fa85fb7d42461cde2fc84bdb8df15e41.exe tnufmzyerp.exe PID 4880 wrote to memory of 4568 4880 ab70079bd5d9f38db26ee66651c5eb37fa85fb7d42461cde2fc84bdb8df15e41.exe tnufmzyerp.exe PID 4880 wrote to memory of 4568 4880 ab70079bd5d9f38db26ee66651c5eb37fa85fb7d42461cde2fc84bdb8df15e41.exe tnufmzyerp.exe PID 4568 wrote to memory of 4932 4568 tnufmzyerp.exe tnufmzyerp.exe PID 4568 wrote to memory of 4932 4568 tnufmzyerp.exe tnufmzyerp.exe PID 4568 wrote to memory of 4932 4568 tnufmzyerp.exe tnufmzyerp.exe PID 4568 wrote to memory of 4932 4568 tnufmzyerp.exe tnufmzyerp.exe PID 704 wrote to memory of 548 704 Explorer.EXE explorer.exe PID 704 wrote to memory of 548 704 Explorer.EXE explorer.exe PID 704 wrote to memory of 548 704 Explorer.EXE explorer.exe PID 548 wrote to memory of 3556 548 explorer.exe Firefox.exe PID 548 wrote to memory of 3556 548 explorer.exe Firefox.exe PID 548 wrote to memory of 3556 548 explorer.exe Firefox.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\ab70079bd5d9f38db26ee66651c5eb37fa85fb7d42461cde2fc84bdb8df15e41.exe"C:\Users\Admin\AppData\Local\Temp\ab70079bd5d9f38db26ee66651c5eb37fa85fb7d42461cde2fc84bdb8df15e41.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\tnufmzyerp.exe"C:\Users\Admin\AppData\Local\Temp\tnufmzyerp.exe" C:\Users\Admin\AppData\Local\Temp\pwtpij.yv3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\tnufmzyerp.exe"C:\Users\Admin\AppData\Local\Temp\tnufmzyerp.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\pvhvkzayfr.rehFilesize
184KB
MD5af5d35642e375b23e17612550417145a
SHA17194cb2e201b10233f7600ea3011f83fbb517bdb
SHA256c844f734218c48a9e73d7a4bb6387de29c9560155e67c272d846793d7792aa47
SHA512d038ef5ab9feda8b664e15f09af30add629834a8b74da6e165e07b6d455ac627090fe336270fd30af251eae3f8372aba43bdb07b61b7474d5993772209a7a314
-
C:\Users\Admin\AppData\Local\Temp\pwtpij.yvFilesize
7KB
MD5eefa8ba94c643e748e1d3d3610cd3b11
SHA199d548704223f1f407cb381c2b56f0293429017d
SHA256ee141c4dcfbb321e62e6c59f1dc566037b048a92c66f14615a4edf07eb591aaa
SHA5125a923f9c6a80818ef9f353d2704a8fa1a0c6e9c25d17f947c16ab07e1060c3bcacc13acb38fc954f9da69fe21136e0a0f0bd3bac44918bca6e6c1b1f0cf6f3d5
-
C:\Users\Admin\AppData\Local\Temp\tnufmzyerp.exeFilesize
66KB
MD56324dff9004f051aed9026927f7dbbdd
SHA106d35c19478d78c6d4df9c34f229c2a27d20287f
SHA256ae210feed932361ce9c9abded80a4f833cb3ec633dbcd6e4af33c8cacdb63826
SHA512eed97b183f60b362c7994be05da2c4dcfa93d64a0f9e9998026fb9656637379ba53f1f00b9c16741bcfe8f7650f8f1877aa7798391cdea0e9dce5173e8e99d29
-
C:\Users\Admin\AppData\Local\Temp\tnufmzyerp.exeFilesize
66KB
MD56324dff9004f051aed9026927f7dbbdd
SHA106d35c19478d78c6d4df9c34f229c2a27d20287f
SHA256ae210feed932361ce9c9abded80a4f833cb3ec633dbcd6e4af33c8cacdb63826
SHA512eed97b183f60b362c7994be05da2c4dcfa93d64a0f9e9998026fb9656637379ba53f1f00b9c16741bcfe8f7650f8f1877aa7798391cdea0e9dce5173e8e99d29
-
C:\Users\Admin\AppData\Local\Temp\tnufmzyerp.exeFilesize
66KB
MD56324dff9004f051aed9026927f7dbbdd
SHA106d35c19478d78c6d4df9c34f229c2a27d20287f
SHA256ae210feed932361ce9c9abded80a4f833cb3ec633dbcd6e4af33c8cacdb63826
SHA512eed97b183f60b362c7994be05da2c4dcfa93d64a0f9e9998026fb9656637379ba53f1f00b9c16741bcfe8f7650f8f1877aa7798391cdea0e9dce5173e8e99d29
-
memory/548-147-0x0000000002E50000-0x000000000319A000-memory.dmpFilesize
3.3MB
-
memory/548-149-0x0000000000B40000-0x0000000000B6D000-memory.dmpFilesize
180KB
-
memory/548-148-0x0000000002AF0000-0x0000000002B7F000-memory.dmpFilesize
572KB
-
memory/548-144-0x0000000000000000-mapping.dmp
-
memory/548-145-0x00000000005E0000-0x0000000000A13000-memory.dmpFilesize
4.2MB
-
memory/548-146-0x0000000000B40000-0x0000000000B6D000-memory.dmpFilesize
180KB
-
memory/704-151-0x0000000007F20000-0x0000000008071000-memory.dmpFilesize
1.3MB
-
memory/704-150-0x0000000007F20000-0x0000000008071000-memory.dmpFilesize
1.3MB
-
memory/704-143-0x0000000007A60000-0x0000000007B45000-memory.dmpFilesize
916KB
-
memory/4568-132-0x0000000000000000-mapping.dmp
-
memory/4932-137-0x0000000000000000-mapping.dmp
-
memory/4932-142-0x0000000000B20000-0x0000000000B30000-memory.dmpFilesize
64KB
-
memory/4932-140-0x0000000000BC0000-0x0000000000F0A000-memory.dmpFilesize
3.3MB
-
memory/4932-141-0x0000000000562000-0x0000000000564000-memory.dmpFilesize
8KB
-
memory/4932-139-0x0000000000540000-0x000000000056E000-memory.dmpFilesize
184KB