Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 07:10
Static task
static1
Behavioral task
behavioral1
Sample
RFQINVOICE09876000090.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
RFQINVOICE09876000090.exe
Resource
win10v2004-20230915-en
General
-
Target
RFQINVOICE09876000090.exe
-
Size
384KB
-
MD5
45ee0796819451c310a4652b2f4c9e55
-
SHA1
0fea82ff3ce07f31c5e785b58b6a1aee43d8778f
-
SHA256
bc890782390a43bb02de2a7f6d6bbc1f05cceed4e6277f3f36719edb14cb5067
-
SHA512
e4e8656b17525aebbfbd4ad6ca8508f3b7ef6be3528febaa732f919ee03fbe0820a2a4cd7073e6e285171a118389e17ee6aae9e8d4dde0a8de9ad425de706320
-
SSDEEP
12288:LnPdvKRsZayz+O73iyx48RAgaPF5dkg3FM:TPdvQsZvf48Q1kg3FM
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation ocwxklckil.exe -
Executes dropped EXE 2 IoCs
pid Process 452 ocwxklckil.exe 3248 ocwxklckil.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 452 set thread context of 3248 452 ocwxklckil.exe 89 PID 3248 set thread context of 3140 3248 ocwxklckil.exe 43 PID 3248 set thread context of 3140 3248 ocwxklckil.exe 43 PID 3248 set thread context of 1244 3248 ocwxklckil.exe 101 PID 1244 set thread context of 3236 1244 colorcpl.exe 100 PID 1244 set thread context of 3140 1244 colorcpl.exe 43 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \Registry\User\S-1-5-21-919254492-3979293997-764407192-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 colorcpl.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 3248 ocwxklckil.exe 3248 ocwxklckil.exe 3248 ocwxklckil.exe 3248 ocwxklckil.exe 3248 ocwxklckil.exe 3248 ocwxklckil.exe 3248 ocwxklckil.exe 3248 ocwxklckil.exe 3248 ocwxklckil.exe 3248 ocwxklckil.exe 3248 ocwxklckil.exe 3248 ocwxklckil.exe 3248 ocwxklckil.exe 3248 ocwxklckil.exe 3248 ocwxklckil.exe 3248 ocwxklckil.exe 3248 ocwxklckil.exe 3248 ocwxklckil.exe 3248 ocwxklckil.exe 3248 ocwxklckil.exe 1244 colorcpl.exe 1244 colorcpl.exe 1244 colorcpl.exe 1244 colorcpl.exe 1244 colorcpl.exe 1244 colorcpl.exe 1244 colorcpl.exe 1244 colorcpl.exe 1244 colorcpl.exe 1244 colorcpl.exe 1244 colorcpl.exe 1244 colorcpl.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3140 Explorer.EXE -
Suspicious behavior: MapViewOfSection 10 IoCs
pid Process 452 ocwxklckil.exe 3248 ocwxklckil.exe 3248 ocwxklckil.exe 3248 ocwxklckil.exe 3140 Explorer.EXE 3140 Explorer.EXE 1244 colorcpl.exe 1244 colorcpl.exe 1244 colorcpl.exe 1244 colorcpl.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3248 ocwxklckil.exe Token: SeDebugPrivilege 1244 colorcpl.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3140 Explorer.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4832 wrote to memory of 452 4832 RFQINVOICE09876000090.exe 87 PID 4832 wrote to memory of 452 4832 RFQINVOICE09876000090.exe 87 PID 4832 wrote to memory of 452 4832 RFQINVOICE09876000090.exe 87 PID 452 wrote to memory of 3248 452 ocwxklckil.exe 89 PID 452 wrote to memory of 3248 452 ocwxklckil.exe 89 PID 452 wrote to memory of 3248 452 ocwxklckil.exe 89 PID 452 wrote to memory of 3248 452 ocwxklckil.exe 89 PID 3140 wrote to memory of 1244 3140 Explorer.EXE 101 PID 3140 wrote to memory of 1244 3140 Explorer.EXE 101 PID 3140 wrote to memory of 1244 3140 Explorer.EXE 101 PID 3140 wrote to memory of 3236 3140 Explorer.EXE 100 PID 3140 wrote to memory of 3236 3140 Explorer.EXE 100 PID 3140 wrote to memory of 3236 3140 Explorer.EXE 100
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Users\Admin\AppData\Local\Temp\RFQINVOICE09876000090.exe"C:\Users\Admin\AppData\Local\Temp\RFQINVOICE09876000090.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Users\Admin\AppData\Local\Temp\ocwxklckil.exe"C:\Users\Admin\AppData\Local\Temp\ocwxklckil.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Users\Admin\AppData\Local\Temp\ocwxklckil.exe"C:\Users\Admin\AppData\Local\Temp\ocwxklckil.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3248
-
-
-
-
C:\Windows\SysWOW64\control.exe"C:\Windows\SysWOW64\control.exe"2⤵PID:3236
-
-
C:\Windows\SysWOW64\colorcpl.exe"C:\Windows\SysWOW64\colorcpl.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1244
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
250KB
MD5115356958470665c6ae130d757c61050
SHA1831fc53bb0f2206d139e7e2027ef01719a6eb906
SHA256086592db679fd7b6077e9cf7a168586c757b15453724b5dbe64117091566c80d
SHA5121dc3b8184543a3ad728df419a8f78a67561bd0219274db5f4b6b1c99c10e16106e36fcea5598fac516eab6e3fe1cb522b4d60bbb374715f81b71ef1d4114ddcc
-
Filesize
194KB
MD5d0d39072d96466898066b3a39747087e
SHA12c41d13e28a6ca285b1f2d44bc8eb5d27e8b33e2
SHA256da7b0be64ebe422d4cbd53f072a32647b65c3a87b7ad333184b595efb42f5c13
SHA5120da6aad1a80decf8c3d0c0ab0d13648d4cdd3e6506a3d7fc6560f336a24577b6e30f42f80defb60b299fca1e0d623dd9feb4abf8537df5cd8b3d508b0a7c9aaa
-
Filesize
194KB
MD5d0d39072d96466898066b3a39747087e
SHA12c41d13e28a6ca285b1f2d44bc8eb5d27e8b33e2
SHA256da7b0be64ebe422d4cbd53f072a32647b65c3a87b7ad333184b595efb42f5c13
SHA5120da6aad1a80decf8c3d0c0ab0d13648d4cdd3e6506a3d7fc6560f336a24577b6e30f42f80defb60b299fca1e0d623dd9feb4abf8537df5cd8b3d508b0a7c9aaa
-
Filesize
194KB
MD5d0d39072d96466898066b3a39747087e
SHA12c41d13e28a6ca285b1f2d44bc8eb5d27e8b33e2
SHA256da7b0be64ebe422d4cbd53f072a32647b65c3a87b7ad333184b595efb42f5c13
SHA5120da6aad1a80decf8c3d0c0ab0d13648d4cdd3e6506a3d7fc6560f336a24577b6e30f42f80defb60b299fca1e0d623dd9feb4abf8537df5cd8b3d508b0a7c9aaa