Analysis
-
max time kernel
216s -
max time network
242s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 07:10
Static task
static1
Behavioral task
behavioral1
Sample
RFQINVOICE09876000090.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
RFQINVOICE09876000090.exe
Resource
win10v2004-20230915-en
General
-
Target
RFQINVOICE09876000090.exe
-
Size
384KB
-
MD5
45ee0796819451c310a4652b2f4c9e55
-
SHA1
0fea82ff3ce07f31c5e785b58b6a1aee43d8778f
-
SHA256
bc890782390a43bb02de2a7f6d6bbc1f05cceed4e6277f3f36719edb14cb5067
-
SHA512
e4e8656b17525aebbfbd4ad6ca8508f3b7ef6be3528febaa732f919ee03fbe0820a2a4cd7073e6e285171a118389e17ee6aae9e8d4dde0a8de9ad425de706320
-
SSDEEP
12288:LnPdvKRsZayz+O73iyx48RAgaPF5dkg3FM:TPdvQsZvf48Q1kg3FM
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Control Panel\International\Geo\Nation ocwxklckil.exe -
Executes dropped EXE 2 IoCs
pid Process 2880 ocwxklckil.exe 2676 ocwxklckil.exe -
Loads dropped DLL 2 IoCs
pid Process 2928 RFQINVOICE09876000090.exe 2880 ocwxklckil.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2880 set thread context of 2676 2880 ocwxklckil.exe 30 PID 2676 set thread context of 1212 2676 ocwxklckil.exe 8 PID 2676 set thread context of 2996 2676 ocwxklckil.exe 31 PID 2996 set thread context of 1212 2996 help.exe 8 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \Registry\User\S-1-5-21-3750544865-3773649541-1858556521-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 help.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 2676 ocwxklckil.exe 2676 ocwxklckil.exe 2676 ocwxklckil.exe 2676 ocwxklckil.exe 2676 ocwxklckil.exe 2676 ocwxklckil.exe 2676 ocwxklckil.exe 2676 ocwxklckil.exe 2996 help.exe 2996 help.exe 2996 help.exe 2996 help.exe 2996 help.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1212 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2880 ocwxklckil.exe 2676 ocwxklckil.exe 1212 Explorer.EXE 1212 Explorer.EXE 2996 help.exe 2996 help.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2676 ocwxklckil.exe Token: SeDebugPrivilege 2996 help.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2928 wrote to memory of 2880 2928 RFQINVOICE09876000090.exe 29 PID 2928 wrote to memory of 2880 2928 RFQINVOICE09876000090.exe 29 PID 2928 wrote to memory of 2880 2928 RFQINVOICE09876000090.exe 29 PID 2928 wrote to memory of 2880 2928 RFQINVOICE09876000090.exe 29 PID 2880 wrote to memory of 2676 2880 ocwxklckil.exe 30 PID 2880 wrote to memory of 2676 2880 ocwxklckil.exe 30 PID 2880 wrote to memory of 2676 2880 ocwxklckil.exe 30 PID 2880 wrote to memory of 2676 2880 ocwxklckil.exe 30 PID 2880 wrote to memory of 2676 2880 ocwxklckil.exe 30 PID 1212 wrote to memory of 2996 1212 Explorer.EXE 31 PID 1212 wrote to memory of 2996 1212 Explorer.EXE 31 PID 1212 wrote to memory of 2996 1212 Explorer.EXE 31 PID 1212 wrote to memory of 2996 1212 Explorer.EXE 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\RFQINVOICE09876000090.exe"C:\Users\Admin\AppData\Local\Temp\RFQINVOICE09876000090.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\ocwxklckil.exe"C:\Users\Admin\AppData\Local\Temp\ocwxklckil.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\ocwxklckil.exe"C:\Users\Admin\AppData\Local\Temp\ocwxklckil.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2676
-
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2996 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1588
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
474KB
MD5af10a982a2ef91c9787106eea1a0cc4a
SHA100435a36f5e6059287cde2cebb2882669cdba3a5
SHA256e028068b067e5e60fa5680b0bafa48a31287b6d614ee0b92df51cce23b974099
SHA51273d0d3034405527798b854dc33fc608c7ccf0af1689e139af4bbb5a5324dc0748bdc2bf632468745920dc7be4eb7f0240d3cf1b5872d3f5c0c897725db78bf9f
-
Filesize
250KB
MD5115356958470665c6ae130d757c61050
SHA1831fc53bb0f2206d139e7e2027ef01719a6eb906
SHA256086592db679fd7b6077e9cf7a168586c757b15453724b5dbe64117091566c80d
SHA5121dc3b8184543a3ad728df419a8f78a67561bd0219274db5f4b6b1c99c10e16106e36fcea5598fac516eab6e3fe1cb522b4d60bbb374715f81b71ef1d4114ddcc
-
Filesize
194KB
MD5d0d39072d96466898066b3a39747087e
SHA12c41d13e28a6ca285b1f2d44bc8eb5d27e8b33e2
SHA256da7b0be64ebe422d4cbd53f072a32647b65c3a87b7ad333184b595efb42f5c13
SHA5120da6aad1a80decf8c3d0c0ab0d13648d4cdd3e6506a3d7fc6560f336a24577b6e30f42f80defb60b299fca1e0d623dd9feb4abf8537df5cd8b3d508b0a7c9aaa
-
Filesize
194KB
MD5d0d39072d96466898066b3a39747087e
SHA12c41d13e28a6ca285b1f2d44bc8eb5d27e8b33e2
SHA256da7b0be64ebe422d4cbd53f072a32647b65c3a87b7ad333184b595efb42f5c13
SHA5120da6aad1a80decf8c3d0c0ab0d13648d4cdd3e6506a3d7fc6560f336a24577b6e30f42f80defb60b299fca1e0d623dd9feb4abf8537df5cd8b3d508b0a7c9aaa
-
Filesize
194KB
MD5d0d39072d96466898066b3a39747087e
SHA12c41d13e28a6ca285b1f2d44bc8eb5d27e8b33e2
SHA256da7b0be64ebe422d4cbd53f072a32647b65c3a87b7ad333184b595efb42f5c13
SHA5120da6aad1a80decf8c3d0c0ab0d13648d4cdd3e6506a3d7fc6560f336a24577b6e30f42f80defb60b299fca1e0d623dd9feb4abf8537df5cd8b3d508b0a7c9aaa
-
Filesize
194KB
MD5d0d39072d96466898066b3a39747087e
SHA12c41d13e28a6ca285b1f2d44bc8eb5d27e8b33e2
SHA256da7b0be64ebe422d4cbd53f072a32647b65c3a87b7ad333184b595efb42f5c13
SHA5120da6aad1a80decf8c3d0c0ab0d13648d4cdd3e6506a3d7fc6560f336a24577b6e30f42f80defb60b299fca1e0d623dd9feb4abf8537df5cd8b3d508b0a7c9aaa
-
Filesize
194KB
MD5d0d39072d96466898066b3a39747087e
SHA12c41d13e28a6ca285b1f2d44bc8eb5d27e8b33e2
SHA256da7b0be64ebe422d4cbd53f072a32647b65c3a87b7ad333184b595efb42f5c13
SHA5120da6aad1a80decf8c3d0c0ab0d13648d4cdd3e6506a3d7fc6560f336a24577b6e30f42f80defb60b299fca1e0d623dd9feb4abf8537df5cd8b3d508b0a7c9aaa
-
Filesize
904KB
MD55e5ba61531d74e45b11cadb79e7394a1
SHA1677224e14aac9dd35f367d5eb1704b36e69356b8
SHA25699e91ae250c955bd403ec1a2321d6b11fcb715bdcc7cb3f63ffb46b349afde5c
SHA512712bfe419ba97ecf0ec8323a68743013e8c767da9d986f74ab94d2a395c3086cac2a5823048e0022d3bbcebb55281b9e1f8c87fdc9295c70cc5521b57850bf46