Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
02/03/2023, 10:16
Static task
static1
Behavioral task
behavioral1
Sample
New Business Plans For 2023.exe
Resource
win7-20230220-en
General
-
Target
New Business Plans For 2023.exe
-
Size
288KB
-
MD5
70edcda282f212e200de869a5259b54e
-
SHA1
33c4a2f7b7da8a852c9ca88b37bcd2f26293f930
-
SHA256
96063791795dc2a645f18624ed05896d1a5913c724e9b6f8caf9f59bad9ef954
-
SHA512
ea72392cf71d49a93b952ae7d84aeb936ce3e8742744f891a6eadd8ee2c658eb7954b0384be13728fd3b43a23bc6012a769c25ff91f7eee81001913e044a2134
-
SSDEEP
6144:vYa6KJRFNCNxlBhMrhtQ5m6gOue4B+HynWSIUGQB7Rw7uilgy:vY0TCXMrhtAJC+Sr9h27uil/
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation lgbcj.exe -
Executes dropped EXE 2 IoCs
pid Process 1660 lgbcj.exe 1160 lgbcj.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1660 set thread context of 1160 1660 lgbcj.exe 86 PID 1160 set thread context of 748 1160 lgbcj.exe 30 PID 640 set thread context of 748 640 cmd.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3948 1688 WerFault.exe 94 -
description ioc Process Key created \Registry\User\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 cmd.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 1160 lgbcj.exe 1160 lgbcj.exe 1160 lgbcj.exe 1160 lgbcj.exe 1160 lgbcj.exe 1160 lgbcj.exe 1160 lgbcj.exe 1160 lgbcj.exe 640 cmd.exe 640 cmd.exe 640 cmd.exe 640 cmd.exe 640 cmd.exe 640 cmd.exe 640 cmd.exe 640 cmd.exe 640 cmd.exe 640 cmd.exe 640 cmd.exe 640 cmd.exe 640 cmd.exe 640 cmd.exe 640 cmd.exe 640 cmd.exe 640 cmd.exe 640 cmd.exe 640 cmd.exe 640 cmd.exe 640 cmd.exe 640 cmd.exe 640 cmd.exe 640 cmd.exe 640 cmd.exe 640 cmd.exe 640 cmd.exe 640 cmd.exe 640 cmd.exe 640 cmd.exe 640 cmd.exe 640 cmd.exe 640 cmd.exe 640 cmd.exe 640 cmd.exe 640 cmd.exe 640 cmd.exe 640 cmd.exe 640 cmd.exe 640 cmd.exe 640 cmd.exe 640 cmd.exe 640 cmd.exe 640 cmd.exe 640 cmd.exe 640 cmd.exe 640 cmd.exe 640 cmd.exe 640 cmd.exe 640 cmd.exe 640 cmd.exe 640 cmd.exe 640 cmd.exe 640 cmd.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 748 Explorer.EXE -
Suspicious behavior: MapViewOfSection 9 IoCs
pid Process 1660 lgbcj.exe 1660 lgbcj.exe 1160 lgbcj.exe 1160 lgbcj.exe 1160 lgbcj.exe 640 cmd.exe 640 cmd.exe 640 cmd.exe 640 cmd.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1160 lgbcj.exe Token: SeDebugPrivilege 640 cmd.exe Token: SeShutdownPrivilege 748 Explorer.EXE Token: SeCreatePagefilePrivilege 748 Explorer.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4172 wrote to memory of 1660 4172 New Business Plans For 2023.exe 85 PID 4172 wrote to memory of 1660 4172 New Business Plans For 2023.exe 85 PID 4172 wrote to memory of 1660 4172 New Business Plans For 2023.exe 85 PID 1660 wrote to memory of 1160 1660 lgbcj.exe 86 PID 1660 wrote to memory of 1160 1660 lgbcj.exe 86 PID 1660 wrote to memory of 1160 1660 lgbcj.exe 86 PID 1660 wrote to memory of 1160 1660 lgbcj.exe 86 PID 748 wrote to memory of 640 748 Explorer.EXE 87 PID 748 wrote to memory of 640 748 Explorer.EXE 87 PID 748 wrote to memory of 640 748 Explorer.EXE 87 PID 640 wrote to memory of 1688 640 cmd.exe 94 PID 640 wrote to memory of 1688 640 cmd.exe 94 PID 640 wrote to memory of 1688 640 cmd.exe 94
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Users\Admin\AppData\Local\Temp\New Business Plans For 2023.exe"C:\Users\Admin\AppData\Local\Temp\New Business Plans For 2023.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Users\Admin\AppData\Local\Temp\lgbcj.exe"C:\Users\Admin\AppData\Local\Temp\lgbcj.exe" C:\Users\Admin\AppData\Local\Temp\swkjfpqpbzf.s3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\lgbcj.exe"C:\Users\Admin\AppData\Local\Temp\lgbcj.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1160
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1688
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1688 -s 1484⤵
- Program crash
PID:3948
-
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 476 -p 1688 -ip 16881⤵PID:3704
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
97KB
MD538a998957adfd7d7408b04219feca7c8
SHA1ef7ae5257c7188b52c164253cec9ce55adb76288
SHA256eaeae9387c1d92d917b6b2e5383d24ad709b69e6cf2ce2d4035523473c32c474
SHA51233383e62fa2da08926d06ddb69396b1a71f885e9567d3fdfe861075a08523c4a0b644f532429318b2edcd9671867509a5880fca50eeb891b7517257ef580e3ae
-
Filesize
97KB
MD538a998957adfd7d7408b04219feca7c8
SHA1ef7ae5257c7188b52c164253cec9ce55adb76288
SHA256eaeae9387c1d92d917b6b2e5383d24ad709b69e6cf2ce2d4035523473c32c474
SHA51233383e62fa2da08926d06ddb69396b1a71f885e9567d3fdfe861075a08523c4a0b644f532429318b2edcd9671867509a5880fca50eeb891b7517257ef580e3ae
-
Filesize
97KB
MD538a998957adfd7d7408b04219feca7c8
SHA1ef7ae5257c7188b52c164253cec9ce55adb76288
SHA256eaeae9387c1d92d917b6b2e5383d24ad709b69e6cf2ce2d4035523473c32c474
SHA51233383e62fa2da08926d06ddb69396b1a71f885e9567d3fdfe861075a08523c4a0b644f532429318b2edcd9671867509a5880fca50eeb891b7517257ef580e3ae
-
Filesize
202KB
MD50088cf2da429e9fc128ad672cc0459d7
SHA1c68453b91fc6dfa0a38b05ff611466e23a6cee80
SHA256872f483c81321416c17bdafedc5005b347bf10ebc42cacd922e5a4f5df8f475a
SHA5128d676907feeec1015f1cfa72f6f3afa2acecee9acb90383dbff8607f3265b27c9bb345a5fee298bc00b1778ae2ee69264768ae40bbfbc8fcd48084d415f0e442
-
Filesize
6KB
MD5e8294c61e6c568acc405876ee731887a
SHA1ca75ad2de0afe8cca29336bc1b4a7ff4859003c2
SHA256d30fb337260de421fbdfd9ec4043a9762092c3e389efa83d1318cc0a8ecf86c0
SHA5126e4f1dbcdbb19fef7e9931d94e77c142f9d1524dd5678dbd98d997d0bf9b45a245c7189e1c59a359cdcc4dd213c3bb070d03b68255c73c238f235447e053c76f