Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
05-10-2023 12:04
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Indirect Standard PO_6400456813.exe
Resource
win7-20230831-en
windows7-x64
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
Indirect Standard PO_6400456813.exe
Resource
win10v2004-20230915-en
windows10-2004-x64
9 signatures
150 seconds
General
-
Target
Indirect Standard PO_6400456813.exe
-
Size
658KB
-
MD5
723e0598f2c1517b13506ea1521471fc
-
SHA1
499f19e81568b3a9ad11a69b1506cadefd06d9c0
-
SHA256
c8827b3385b4cfc8e31913a78e7e108ffeaa2cad099ccc49d4cb2c26edc5a910
-
SHA512
cdd043496f5d5732a4a0444ca7a003317131bc41994d5caf649888a55f1ca30dd59916482e852d0721876b6ca7489bfc18f26267b6d9ab507cd016727d5f44a7
-
SSDEEP
12288:4iMy/jZjSu/bAsWMEaH91sw4OHcfIhwEvoag4QbWS018uxmV/5aLEw:xLZjRDiRAYw4pAhwEvoxTRtQLE
Score
7/10
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation Indirect Standard PO_6400456813.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3232 set thread context of 3408 3232 Indirect Standard PO_6400456813.exe 97 PID 3408 set thread context of 3120 3408 Indirect Standard PO_6400456813.exe 48 PID 3408 set thread context of 3212 3408 Indirect Standard PO_6400456813.exe 99 PID 3212 set thread context of 3120 3212 raserver.exe 48 -
description ioc Process Key created \Registry\User\S-1-5-21-1574508946-349927670-1185736483-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 raserver.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 3232 Indirect Standard PO_6400456813.exe 3232 Indirect Standard PO_6400456813.exe 3408 Indirect Standard PO_6400456813.exe 3408 Indirect Standard PO_6400456813.exe 3408 Indirect Standard PO_6400456813.exe 3408 Indirect Standard PO_6400456813.exe 3408 Indirect Standard PO_6400456813.exe 3408 Indirect Standard PO_6400456813.exe 3408 Indirect Standard PO_6400456813.exe 3408 Indirect Standard PO_6400456813.exe 3408 Indirect Standard PO_6400456813.exe 3408 Indirect Standard PO_6400456813.exe 3408 Indirect Standard PO_6400456813.exe 3408 Indirect Standard PO_6400456813.exe 3408 Indirect Standard PO_6400456813.exe 3408 Indirect Standard PO_6400456813.exe 3408 Indirect Standard PO_6400456813.exe 3408 Indirect Standard PO_6400456813.exe 3212 raserver.exe 3212 raserver.exe 3212 raserver.exe 3212 raserver.exe 3212 raserver.exe 3212 raserver.exe 3212 raserver.exe 3212 raserver.exe 3212 raserver.exe 3212 raserver.exe 3212 raserver.exe 3212 raserver.exe 3212 raserver.exe 3212 raserver.exe 3212 raserver.exe 3212 raserver.exe 3212 raserver.exe 3212 raserver.exe 3212 raserver.exe 3212 raserver.exe 3212 raserver.exe 3212 raserver.exe 3212 raserver.exe 3212 raserver.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3120 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 3408 Indirect Standard PO_6400456813.exe 3120 Explorer.EXE 3120 Explorer.EXE 3212 raserver.exe 3212 raserver.exe 3212 raserver.exe 3212 raserver.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3232 Indirect Standard PO_6400456813.exe Token: SeDebugPrivilege 3408 Indirect Standard PO_6400456813.exe Token: SeDebugPrivilege 3212 raserver.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3120 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3232 wrote to memory of 3408 3232 Indirect Standard PO_6400456813.exe 97 PID 3232 wrote to memory of 3408 3232 Indirect Standard PO_6400456813.exe 97 PID 3232 wrote to memory of 3408 3232 Indirect Standard PO_6400456813.exe 97 PID 3232 wrote to memory of 3408 3232 Indirect Standard PO_6400456813.exe 97 PID 3232 wrote to memory of 3408 3232 Indirect Standard PO_6400456813.exe 97 PID 3232 wrote to memory of 3408 3232 Indirect Standard PO_6400456813.exe 97 PID 3120 wrote to memory of 3212 3120 Explorer.EXE 99 PID 3120 wrote to memory of 3212 3120 Explorer.EXE 99 PID 3120 wrote to memory of 3212 3120 Explorer.EXE 99 PID 3212 wrote to memory of 4556 3212 raserver.exe 104 PID 3212 wrote to memory of 4556 3212 raserver.exe 104 PID 3212 wrote to memory of 4556 3212 raserver.exe 104
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Users\Admin\AppData\Local\Temp\Indirect Standard PO_6400456813.exe"C:\Users\Admin\AppData\Local\Temp\Indirect Standard PO_6400456813.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\Indirect Standard PO_6400456813.exe"C:\Users\Admin\AppData\Local\Temp\Indirect Standard PO_6400456813.exe"3⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3408
-
-
-
C:\Windows\SysWOW64\raserver.exe"C:\Windows\SysWOW64\raserver.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:4556
-
-