Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
31-01-2023 13:00
Static task
static1
Behavioral task
behavioral1
Sample
sof.exe
Resource
win7-20220812-en
General
-
Target
sof.exe
-
Size
262KB
-
MD5
512fcd3048ecc3311759e82e00c9888d
-
SHA1
be45965664140ed3a03236605f4b8c9ed7bfcc47
-
SHA256
b220568343b62f6a4bb4abc001ddfd4a00b66c9debe0542c55f6f2a91cd832bf
-
SHA512
1faac492c0a7fa1744c5a70b506d0b1d1e950c03b00e5a152bbe4a6ccb2237f6bb8ef6035839e1d976e1f228da2f0f1c1c4dec3d4f82bbc35659fe60e0625034
-
SSDEEP
6144:/Ya6Wa8RQeZcz5jHeU1NNWGYugdRUPmzDq9I+H:/YoaKcz5HeeNcGFgdRUGm95H
Malware Config
Extracted
formbook
u8ow
uzhDDUNgg10rOh8rkUMGYiLuNnRWl9gwMQ==
bfkA4IUaSgYi7IA=
ezX5yHeR21O3h2RCgQ==
x3E4ntHeLMGQm0kdTi6PJtjOVS6Em8UaKA==
xJuAYwcZLAfqrVazWjvkirgFxDSf
qrGugLdannLYegX5dCtFMA==
i61nMddueAYi7IA=
RoNMKNhtdDWpeiYoaB37TPiHTLo=
RFj3UHHrDtAktSZhYku36opnsaMbNA==
lx0g+6RPl4jwwNPRPuTD
MyEQ4oGk6vXrMM4V
0IVWH0rfKe1J4nn6J9XB
SYVlN3Zrnq2OaWpDiQ==
fNa0jy3P8KQK25rpmwqd0t8=
UZuSZpW+9ffX9KXzmgqd0t8=
Vxf85YCWvYNZjkcDdCtFMA==
0gG1EzLP7/DrMM4V
WExRGVAEE6YS5tJkTxMhR636+A==
6Tv7U4QdURt1KUI+gw==
ooR7RXgsXPtaEutnaQ3efjIXmfJePavzIA==
kH1+agwHHalYZx6qIgfY
ZWt1Rm0DSQlnBqPfWQAc/tcr
cLCK7t168nLRaWpDiQ==
mhlxXnj4ae2oyA==
cNfFjLnZBAbktB6qIgfY
e4+aeK07RtRvyDdIwbTJ
zV1cO+x+pG5zGpk=
Chw2HE2XGN4+Cr/5oYw2qDok
DP/jRm13vb2eiYBXkQ==
Ma9RHLrYBdejyIc/Mg2d/8xWIqM=
VTo6X4LaHCfge/wU
sWUqRFyEF4620a0t2n8=
gFcKdpXTkQzrMM4V
OhMDz+2HrUeaOs/fJBHkCKz7+g==
VO2d9iU2Thf318SIwq0EOA==
e1ku/6K39wfJUusrm0vPx4XRqHIvPpc=
P+jz1DwdYV0=
bTf6X4eNo29HFZaYHIdgOg==
4T4u2HphcHA0
tbfJk7tho2DrMM4V
mN6i/Su4QgqJXCqCRzW3mzJHyrWX
zW04ErzqFdmbu79Rig==
ZmprSnkJRcl0JKT6J9XB
MpWLW5et5BoKKk+rm3c=
Zr2aZxK7/FrlpnRYlw==
0U3tR3qhsDuRX0ebnn0=
wwHLoEjfITb8VSKpjXQ=
U0tVJVTjQAYi7IA=
UhwL8pe04L+OaWpDiQ==
aopHm8x6r2frMM4V
Lmst/p5BnbN6FIkTOM8rEdc=
GE06CTdjgx+Q6ZIV2H8=
EEj/aJNAfnLggR7q56O3833n8g==
iNu4mEHQ21YCng0d
KDEzCTXL1lu2jm76J9XB
75FOp9va+5X90pMaWzhMstYm
dC3913qn0YlNK0+rm3c=
JdWkeCE2aH5uMqzDQikE2IVmsaMbNA==
DXRpMVx9wYHolAeOVjsokL9HyrWX
OhHhPWGIz5DefU+rm3c=
50M3F7hrlnBBTDLKumo4nMY=
Fqq41ivP9XMLaTycqZUCOA==
711EHcp3p3EnLk+rm3c=
LT/fL08ENi0Gi1dYk4bzMQ==
majorcaplanetary.com
Signatures
-
Xloader payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1384-66-0x0000000000400000-0x000000000042C000-memory.dmp xloader behavioral1/memory/1384-73-0x0000000000400000-0x000000000042C000-memory.dmp xloader behavioral1/memory/756-76-0x0000000000090000-0x00000000000BC000-memory.dmp xloader behavioral1/memory/756-81-0x0000000000090000-0x00000000000BC000-memory.dmp xloader -
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
msiexec.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\9RSD1NEHI = "C:\\Program Files (x86)\\Thjg4l6x\\igfxipaddrp.exe" msiexec.exe -
Blocklisted process makes network request 2 IoCs
Processes:
msiexec.exeflow pid process 7 756 msiexec.exe 26 756 msiexec.exe -
Executes dropped EXE 2 IoCs
Processes:
kmgzaumv.exekmgzaumv.exepid process 1324 kmgzaumv.exe 1384 kmgzaumv.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
kmgzaumv.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Control Panel\International\Geo\Nation kmgzaumv.exe -
Loads dropped DLL 3 IoCs
Processes:
sof.exekmgzaumv.exepid process 1132 sof.exe 1132 sof.exe 1324 kmgzaumv.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
kmgzaumv.exekmgzaumv.exemsiexec.exedescription pid process target process PID 1324 set thread context of 1384 1324 kmgzaumv.exe kmgzaumv.exe PID 1384 set thread context of 1212 1384 kmgzaumv.exe Explorer.EXE PID 1384 set thread context of 1212 1384 kmgzaumv.exe Explorer.EXE PID 756 set thread context of 1212 756 msiexec.exe Explorer.EXE -
Drops file in Program Files directory 1 IoCs
Processes:
msiexec.exedescription ioc process File opened for modification C:\Program Files (x86)\Thjg4l6x\igfxipaddrp.exe msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
msiexec.exedescription ioc process Key created \Registry\User\S-1-5-21-999675638-2867687379-27515722-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 msiexec.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
Processes:
kmgzaumv.exemsiexec.exepid process 1384 kmgzaumv.exe 1384 kmgzaumv.exe 1384 kmgzaumv.exe 756 msiexec.exe 756 msiexec.exe 756 msiexec.exe 756 msiexec.exe 756 msiexec.exe 756 msiexec.exe 756 msiexec.exe 756 msiexec.exe 756 msiexec.exe 756 msiexec.exe 756 msiexec.exe 756 msiexec.exe 756 msiexec.exe 756 msiexec.exe 756 msiexec.exe 756 msiexec.exe 756 msiexec.exe 756 msiexec.exe 756 msiexec.exe 756 msiexec.exe -
Suspicious behavior: MapViewOfSection 9 IoCs
Processes:
kmgzaumv.exekmgzaumv.exemsiexec.exepid process 1324 kmgzaumv.exe 1384 kmgzaumv.exe 1384 kmgzaumv.exe 1384 kmgzaumv.exe 1384 kmgzaumv.exe 756 msiexec.exe 756 msiexec.exe 756 msiexec.exe 756 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
kmgzaumv.exemsiexec.exedescription pid process Token: SeDebugPrivilege 1384 kmgzaumv.exe Token: SeDebugPrivilege 756 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1212 Explorer.EXE 1212 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1212 Explorer.EXE 1212 Explorer.EXE -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
sof.exekmgzaumv.exekmgzaumv.exemsiexec.exedescription pid process target process PID 1132 wrote to memory of 1324 1132 sof.exe kmgzaumv.exe PID 1132 wrote to memory of 1324 1132 sof.exe kmgzaumv.exe PID 1132 wrote to memory of 1324 1132 sof.exe kmgzaumv.exe PID 1132 wrote to memory of 1324 1132 sof.exe kmgzaumv.exe PID 1324 wrote to memory of 1384 1324 kmgzaumv.exe kmgzaumv.exe PID 1324 wrote to memory of 1384 1324 kmgzaumv.exe kmgzaumv.exe PID 1324 wrote to memory of 1384 1324 kmgzaumv.exe kmgzaumv.exe PID 1324 wrote to memory of 1384 1324 kmgzaumv.exe kmgzaumv.exe PID 1324 wrote to memory of 1384 1324 kmgzaumv.exe kmgzaumv.exe PID 1384 wrote to memory of 756 1384 kmgzaumv.exe msiexec.exe PID 1384 wrote to memory of 756 1384 kmgzaumv.exe msiexec.exe PID 1384 wrote to memory of 756 1384 kmgzaumv.exe msiexec.exe PID 1384 wrote to memory of 756 1384 kmgzaumv.exe msiexec.exe PID 1384 wrote to memory of 756 1384 kmgzaumv.exe msiexec.exe PID 1384 wrote to memory of 756 1384 kmgzaumv.exe msiexec.exe PID 1384 wrote to memory of 756 1384 kmgzaumv.exe msiexec.exe PID 756 wrote to memory of 1468 756 msiexec.exe cmd.exe PID 756 wrote to memory of 1468 756 msiexec.exe cmd.exe PID 756 wrote to memory of 1468 756 msiexec.exe cmd.exe PID 756 wrote to memory of 1468 756 msiexec.exe cmd.exe PID 756 wrote to memory of 1624 756 msiexec.exe Firefox.exe PID 756 wrote to memory of 1624 756 msiexec.exe Firefox.exe PID 756 wrote to memory of 1624 756 msiexec.exe Firefox.exe PID 756 wrote to memory of 1624 756 msiexec.exe Firefox.exe PID 756 wrote to memory of 1624 756 msiexec.exe Firefox.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Temp\sof.exe"C:\Users\Admin\AppData\Local\Temp\sof.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\kmgzaumv.exe"C:\Users\Admin\AppData\Local\Temp\kmgzaumv.exe" C:\Users\Admin\AppData\Local\Temp\yaekxhsbqrp.x3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\kmgzaumv.exe"C:\Users\Admin\AppData\Local\Temp\kmgzaumv.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"5⤵
- Adds policy Run key to start application
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\kmgzaumv.exe"6⤵
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"6⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\jsgvegx.cFilesize
196KB
MD520d6ca878760712ccae7ba6d652506f5
SHA132ff1d2ccb8dc3d02cc1556d0382dc25966c0b78
SHA256730e5ed079f935a5bfae76720b726c0170acdb0ac0dcfef8385982b97dce7af3
SHA512c6bdce70c57fd175c71b044bd03bcf0baca356069518386cc732f65061c7b7d876459002916dc93111d5686b9e9a715d25c4ef11586767fbec092a8df4ce1988
-
C:\Users\Admin\AppData\Local\Temp\kmgzaumv.exeFilesize
75KB
MD58923600589c4af9654dc95922e6c5791
SHA1f9d3edd089a01a4bec5700f7daa4d51d12f16981
SHA2569adeae5c28c8b7de93fe94e3a34fe330d2c7c8c0160dc6aaf7ee6e2e917f1b03
SHA512f68b413952bb3dca342f47ee291701f12a8617b6ef405eb40411af471ef621ed26d62378fa28055bbfcc9ac868a9220d9a9417791480a82a99d30b0299a24815
-
C:\Users\Admin\AppData\Local\Temp\kmgzaumv.exeFilesize
75KB
MD58923600589c4af9654dc95922e6c5791
SHA1f9d3edd089a01a4bec5700f7daa4d51d12f16981
SHA2569adeae5c28c8b7de93fe94e3a34fe330d2c7c8c0160dc6aaf7ee6e2e917f1b03
SHA512f68b413952bb3dca342f47ee291701f12a8617b6ef405eb40411af471ef621ed26d62378fa28055bbfcc9ac868a9220d9a9417791480a82a99d30b0299a24815
-
C:\Users\Admin\AppData\Local\Temp\kmgzaumv.exeFilesize
75KB
MD58923600589c4af9654dc95922e6c5791
SHA1f9d3edd089a01a4bec5700f7daa4d51d12f16981
SHA2569adeae5c28c8b7de93fe94e3a34fe330d2c7c8c0160dc6aaf7ee6e2e917f1b03
SHA512f68b413952bb3dca342f47ee291701f12a8617b6ef405eb40411af471ef621ed26d62378fa28055bbfcc9ac868a9220d9a9417791480a82a99d30b0299a24815
-
C:\Users\Admin\AppData\Local\Temp\yaekxhsbqrp.xFilesize
5KB
MD55429138a957c0a88b28ff60b3a44167b
SHA155589112a809ccec8cd8a397dcdd5c8d25aaaf66
SHA25630cc7eb96bb55d2d4337ce8676140f235a7657ddab0532d81a3916adbb6378f0
SHA51215510bb15bc1980bd8468babefa596aa068fe0995db038a762533d0ceba2b18a1b64e3684b30d314efa2a9d9e4ea882b649d15681b0e1b0e69bcc7ee35628a70
-
\Users\Admin\AppData\Local\Temp\kmgzaumv.exeFilesize
75KB
MD58923600589c4af9654dc95922e6c5791
SHA1f9d3edd089a01a4bec5700f7daa4d51d12f16981
SHA2569adeae5c28c8b7de93fe94e3a34fe330d2c7c8c0160dc6aaf7ee6e2e917f1b03
SHA512f68b413952bb3dca342f47ee291701f12a8617b6ef405eb40411af471ef621ed26d62378fa28055bbfcc9ac868a9220d9a9417791480a82a99d30b0299a24815
-
\Users\Admin\AppData\Local\Temp\kmgzaumv.exeFilesize
75KB
MD58923600589c4af9654dc95922e6c5791
SHA1f9d3edd089a01a4bec5700f7daa4d51d12f16981
SHA2569adeae5c28c8b7de93fe94e3a34fe330d2c7c8c0160dc6aaf7ee6e2e917f1b03
SHA512f68b413952bb3dca342f47ee291701f12a8617b6ef405eb40411af471ef621ed26d62378fa28055bbfcc9ac868a9220d9a9417791480a82a99d30b0299a24815
-
\Users\Admin\AppData\Local\Temp\kmgzaumv.exeFilesize
75KB
MD58923600589c4af9654dc95922e6c5791
SHA1f9d3edd089a01a4bec5700f7daa4d51d12f16981
SHA2569adeae5c28c8b7de93fe94e3a34fe330d2c7c8c0160dc6aaf7ee6e2e917f1b03
SHA512f68b413952bb3dca342f47ee291701f12a8617b6ef405eb40411af471ef621ed26d62378fa28055bbfcc9ac868a9220d9a9417791480a82a99d30b0299a24815
-
memory/756-81-0x0000000000090000-0x00000000000BC000-memory.dmpFilesize
176KB
-
memory/756-76-0x0000000000090000-0x00000000000BC000-memory.dmpFilesize
176KB
-
memory/756-79-0x0000000000830000-0x00000000008C0000-memory.dmpFilesize
576KB
-
memory/756-72-0x0000000000000000-mapping.dmp
-
memory/756-78-0x0000000002130000-0x0000000002433000-memory.dmpFilesize
3.0MB
-
memory/756-75-0x0000000000940000-0x0000000000954000-memory.dmpFilesize
80KB
-
memory/1132-54-0x0000000075561000-0x0000000075563000-memory.dmpFilesize
8KB
-
memory/1212-82-0x0000000006040000-0x000000000614E000-memory.dmpFilesize
1.1MB
-
memory/1212-80-0x0000000006040000-0x000000000614E000-memory.dmpFilesize
1.1MB
-
memory/1212-69-0x0000000005EC0000-0x000000000603A000-memory.dmpFilesize
1.5MB
-
memory/1212-71-0x0000000003FE0000-0x00000000040CE000-memory.dmpFilesize
952KB
-
memory/1324-57-0x0000000000000000-mapping.dmp
-
memory/1384-67-0x0000000000740000-0x0000000000A43000-memory.dmpFilesize
3.0MB
-
memory/1384-73-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/1384-70-0x0000000002280000-0x0000000002291000-memory.dmpFilesize
68KB
-
memory/1384-68-0x0000000000480000-0x0000000000491000-memory.dmpFilesize
68KB
-
memory/1384-66-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/1384-64-0x0000000000420000-mapping.dmp
-
memory/1468-77-0x0000000000000000-mapping.dmp