Analysis
-
max time kernel
146s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
15/02/2023, 14:58
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20220901-en
General
-
Target
tmp.exe
-
Size
814KB
-
MD5
e9565aea25722423e054792af30cdc76
-
SHA1
bb81b0e4dc9ebab4f2e471ec4b0dc6725886f951
-
SHA256
0a3fb57d9fdcf594a55f48fe4853fc37ae7c05d15d710cc902a23b5cccf6c377
-
SHA512
defcb98a4f07c1dada23a36e5001718ba2e4486cf717829a011a569ee2087cbe01220beee85871f99bde11f740965c20570241b316f0946831f050ef8df38806
-
SSDEEP
12288:gCIZozxz0SNFJ75PGWLXJqnpQ9eyJnsIc3wwOfawHRr/CB06KuLp4bDDlG:gDSNFtYWzYpoeyJsIc3bOfawxO5d4Z
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\International\Geo\Nation tmp.exe -
Loads dropped DLL 1 IoCs
pid Process 1516 mstsc.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1648 set thread context of 544 1648 tmp.exe 28 PID 544 set thread context of 1256 544 tmp.exe 16 PID 1516 set thread context of 1256 1516 mstsc.exe 16 -
description ioc Process Key created \Registry\User\S-1-5-21-3406023954-474543476-3319432036-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 mstsc.exe -
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 544 tmp.exe 544 tmp.exe 544 tmp.exe 544 tmp.exe 1516 mstsc.exe 1516 mstsc.exe 1516 mstsc.exe 1516 mstsc.exe 1516 mstsc.exe 1516 mstsc.exe 1516 mstsc.exe 1516 mstsc.exe 1516 mstsc.exe 1516 mstsc.exe 1516 mstsc.exe 1516 mstsc.exe 1516 mstsc.exe 1516 mstsc.exe 1516 mstsc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1256 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 544 tmp.exe 544 tmp.exe 544 tmp.exe 1516 mstsc.exe 1516 mstsc.exe 1516 mstsc.exe 1516 mstsc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 544 tmp.exe Token: SeDebugPrivilege 1516 mstsc.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1256 Explorer.EXE 1256 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1256 Explorer.EXE 1256 Explorer.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1648 wrote to memory of 544 1648 tmp.exe 28 PID 1648 wrote to memory of 544 1648 tmp.exe 28 PID 1648 wrote to memory of 544 1648 tmp.exe 28 PID 1648 wrote to memory of 544 1648 tmp.exe 28 PID 1648 wrote to memory of 544 1648 tmp.exe 28 PID 1648 wrote to memory of 544 1648 tmp.exe 28 PID 1648 wrote to memory of 544 1648 tmp.exe 28 PID 1256 wrote to memory of 1516 1256 Explorer.EXE 30 PID 1256 wrote to memory of 1516 1256 Explorer.EXE 30 PID 1256 wrote to memory of 1516 1256 Explorer.EXE 30 PID 1256 wrote to memory of 1516 1256 Explorer.EXE 30 PID 1516 wrote to memory of 1628 1516 mstsc.exe 33 PID 1516 wrote to memory of 1628 1516 mstsc.exe 33 PID 1516 wrote to memory of 1628 1516 mstsc.exe 33 PID 1516 wrote to memory of 1628 1516 mstsc.exe 33 PID 1516 wrote to memory of 1628 1516 mstsc.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"3⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:544
-
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:1784
-
-
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1628
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
831KB
MD5f4d8be409d1bd016a7b3b2580a2b90fb
SHA1a68e1f6a9b2234f2269d9cf1fbda94124c428dbe
SHA256d70b27121bb33012560b14a7bd597666d76193d7dc5f89e2ac5e7507240bf708
SHA5129892cd38d77898fe7916a8810c82a377bbcb4f0c3f75a8295943fa29a5cb4daec95a1600a74614f31ec723967fd95721174042f2e54b12e52fe85202cdf052df