Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06/02/2023, 07:15
Static task
static1
Behavioral task
behavioral1
Sample
TBbnIeshOChdGjx.exe
Resource
win7-20221111-en
General
-
Target
TBbnIeshOChdGjx.exe
-
Size
852KB
-
MD5
43413e0be3ce71e1f1513985c18fa0f9
-
SHA1
3d3584af7e0de77693261887e3165913f2a659ae
-
SHA256
f4a0e79e842eb7a46dc6e5ba3f5cc71c2ea6d600c86eca1fedf63cff8d410fd7
-
SHA512
0e512bb897950090f01cfca1c5fc245dafed7a2c530d511bfa38edb2788417389e2e5cea0020fb5112aebb75a66d9159ce3ad5e348ad20332fce8fad16e6df64
-
SSDEEP
24576:T1dH+AG6F0xMi4IfLJUPYd56HbMH1jr/wBf2tqG4yPaE:TPHrbWi9LwYHbMhC22
Malware Config
Extracted
formbook
g44n
t60gB4YRvsDLttd9HG4=
xck8G7COQ+g7VIpX
BQQF3mmpLPskhQ==
eLWwmzNyK6ee+nF1jDvvkxuSGA==
3tlgNOzw8BBjpNOQMnc=
nOpNEJhoU0h+00S9E1YfgA==
xcvTpljkjIyEdvhp+VcGFtJC
bZxOHr5CtzY4
rOD304X0u1DN/m7cbA==
Knixl0HJyEOOiNckwk8GFtJC
S4JMDRNTUAol
Vp9wSwNZSfY7VIpX
0Nf/zlrpmpahnM+tpkYGFtJC
joXsuHiBcVp88DHEHMA7
yN8i9ppoZYHSSaqqk6NZnQ==
4UFEMfyKhSB4UovzjdabqolwhFtMH1M=
d3RiRcXCeR8wlgjEHMA7
eMUS8PSBPCe2rPg=
LCsR0X328UuSAmlf
/keifSXopayqjLt1EWQ=
x8Hdn0pOACh11lPPYXo=
NXkuHKtxYYAXG3hA
d5dE59banPxMmA==
0vJUL/UPu1HN/m7cbA==
cG3LiYu7/OkmhQ==
kcFYNbltO4XkzzLEHMA7
c3now24l3wQX9EW8E1YfgA==
6kE4FbVNNTmvwBldAWY=
KzTXxYN5AlmUlfA=
pN03EpAPvdoG3td9HG4=
HFxFE8xVAzYdmOSoxIRGsGfPrq2RWw==
QKMj+KSybRYojwTEHMA7
PYRSDRNTUAol
OU/wwlhkGLrLFHx6Y4tNmQ==
5SOc+gRCtzY4
Wpm/fyDn4/3+CVe5E1YfgA==
dYOdeSmnq2BbpQLEHMA7
5vBBzXlHCp/yEEZBRKetUjQ52IU0yTJk
bbmih0CBPMgoE2DLXmVpeGo=
4S2wkRvbxeLo00C8WmVpeGo=
uECyFReWXAol
jNu+mzKEhkrN/m7cbA==
4gAT76Z35fIJDFm5E1YfgA==
qADJh1HW2aS+D2Q1E1YfgA==
dcvSv2utZ/AJgMdevpFTnQ==
JTfVqz447pqn6T42UST9jGfPrq2RWw==
iY+7qTKHfAfwUMO7yWj3my2YHA==
WmeZXSgwNX67nd5C2U4GFtJC
7P/CoUpIP1lWSI3ch/yAAIOwONni
5+eJT9fhjh9hv9+SMWw=
Y3Z/PQTQl7DjzUC9SmVpeGo=
EiBDCpcTF6v40SzEHMA7
P2sC6LDSgQA7VIpX
5eWOfxDRj6Pp4VDbY2VpeGo=
dsEE1oKWIEAv
Ua2MVQydVIHU0DXEHMA7
hNkQ540Z0sNCG25K
b4tOMMbN0uY5lt+32djuHPtxAw==
teuvevj8CyJw4EUsE1YfgA==
tNsZ75ZlU1WpFoCBm1RaVsvskzc=
aLsI8IQZ0uL0yNd9HG4=
RUPKsWJ0gHa5LI2Nj0P5cFDOnsZ1AC62uw==
P5f+1WAqKEOSIzw7ZA==
Mdxb0fR4Aa8Zdu8=
carolinerosenstein.com
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Control Panel\International\Geo\Nation TBbnIeshOChdGjx.exe -
Loads dropped DLL 1 IoCs
pid Process 1908 svchost.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2008 set thread context of 564 2008 TBbnIeshOChdGjx.exe 29 PID 564 set thread context of 1248 564 TBbnIeshOChdGjx.exe 16 PID 1908 set thread context of 1248 1908 svchost.exe 16 -
description ioc Process Key created \Registry\User\S-1-5-21-3385717845-2518323428-350143044-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 svchost.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 2008 TBbnIeshOChdGjx.exe 564 TBbnIeshOChdGjx.exe 564 TBbnIeshOChdGjx.exe 564 TBbnIeshOChdGjx.exe 564 TBbnIeshOChdGjx.exe 1908 svchost.exe 1908 svchost.exe 1908 svchost.exe 1908 svchost.exe 1908 svchost.exe 1908 svchost.exe 1908 svchost.exe 1908 svchost.exe 1908 svchost.exe 1908 svchost.exe 1908 svchost.exe 1908 svchost.exe 1908 svchost.exe 1908 svchost.exe 1908 svchost.exe 1908 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1248 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 564 TBbnIeshOChdGjx.exe 564 TBbnIeshOChdGjx.exe 564 TBbnIeshOChdGjx.exe 1908 svchost.exe 1908 svchost.exe 1908 svchost.exe 1908 svchost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2008 TBbnIeshOChdGjx.exe Token: SeDebugPrivilege 564 TBbnIeshOChdGjx.exe Token: SeDebugPrivilege 1908 svchost.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1248 Explorer.EXE 1248 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1248 Explorer.EXE 1248 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1248 Explorer.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2008 wrote to memory of 1636 2008 TBbnIeshOChdGjx.exe 28 PID 2008 wrote to memory of 1636 2008 TBbnIeshOChdGjx.exe 28 PID 2008 wrote to memory of 1636 2008 TBbnIeshOChdGjx.exe 28 PID 2008 wrote to memory of 1636 2008 TBbnIeshOChdGjx.exe 28 PID 2008 wrote to memory of 564 2008 TBbnIeshOChdGjx.exe 29 PID 2008 wrote to memory of 564 2008 TBbnIeshOChdGjx.exe 29 PID 2008 wrote to memory of 564 2008 TBbnIeshOChdGjx.exe 29 PID 2008 wrote to memory of 564 2008 TBbnIeshOChdGjx.exe 29 PID 2008 wrote to memory of 564 2008 TBbnIeshOChdGjx.exe 29 PID 2008 wrote to memory of 564 2008 TBbnIeshOChdGjx.exe 29 PID 2008 wrote to memory of 564 2008 TBbnIeshOChdGjx.exe 29 PID 1248 wrote to memory of 1908 1248 Explorer.EXE 30 PID 1248 wrote to memory of 1908 1248 Explorer.EXE 30 PID 1248 wrote to memory of 1908 1248 Explorer.EXE 30 PID 1248 wrote to memory of 1908 1248 Explorer.EXE 30 PID 1908 wrote to memory of 2016 1908 svchost.exe 33 PID 1908 wrote to memory of 2016 1908 svchost.exe 33 PID 1908 wrote to memory of 2016 1908 svchost.exe 33 PID 1908 wrote to memory of 2016 1908 svchost.exe 33 PID 1908 wrote to memory of 2016 1908 svchost.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\TBbnIeshOChdGjx.exe"C:\Users\Admin\AppData\Local\Temp\TBbnIeshOChdGjx.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\TBbnIeshOChdGjx.exe"C:\Users\Admin\AppData\Local\Temp\TBbnIeshOChdGjx.exe"3⤵PID:1636
-
-
C:\Users\Admin\AppData\Local\Temp\TBbnIeshOChdGjx.exe"C:\Users\Admin\AppData\Local\Temp\TBbnIeshOChdGjx.exe"3⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:564
-
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:2016
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
810KB
MD5c6ec991471d42128268ea10236d9cdb8
SHA1d569350d02db6a118136220da8de40a9973084f1
SHA2561b755cc3093dd45a0df857854aedfeb3c8f3622cff5bc491f2d492ebfa3ef8e0
SHA512a67ed46547b9270c8a5a7a947b375cb6baf3211072f90170aae2bb6ce9c4fe9d7be3e9d782420dcfdbc19a1f232b3be561ca503b80e8dc3e036a62c54cad5b57