Analysis

  • max time kernel
    216s
  • max time network
    242s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 07:10

General

  • Target

    RFQINVOICE09876000090.exe

  • Size

    384KB

  • MD5

    45ee0796819451c310a4652b2f4c9e55

  • SHA1

    0fea82ff3ce07f31c5e785b58b6a1aee43d8778f

  • SHA256

    bc890782390a43bb02de2a7f6d6bbc1f05cceed4e6277f3f36719edb14cb5067

  • SHA512

    e4e8656b17525aebbfbd4ad6ca8508f3b7ef6be3528febaa732f919ee03fbe0820a2a4cd7073e6e285171a118389e17ee6aae9e8d4dde0a8de9ad425de706320

  • SSDEEP

    12288:LnPdvKRsZayz+O73iyx48RAgaPF5dkg3FM:TPdvQsZvf48Q1kg3FM

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RFQINVOICE09876000090.exe
    "C:\Users\Admin\AppData\Local\Temp\RFQINVOICE09876000090.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2928
    • C:\Users\Admin\AppData\Local\Temp\ocwxklckil.exe
      "C:\Users\Admin\AppData\Local\Temp\ocwxklckil.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:2880
      • C:\Users\Admin\AppData\Local\Temp\ocwxklckil.exe
        "C:\Users\Admin\AppData\Local\Temp\ocwxklckil.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2676
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:1212
    • C:\Windows\SysWOW64\help.exe
      "C:\Windows\SysWOW64\help.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      PID:2996
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:1588

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\ib1tb2l.zip

      Filesize

      474KB

      MD5

      af10a982a2ef91c9787106eea1a0cc4a

      SHA1

      00435a36f5e6059287cde2cebb2882669cdba3a5

      SHA256

      e028068b067e5e60fa5680b0bafa48a31287b6d614ee0b92df51cce23b974099

      SHA512

      73d0d3034405527798b854dc33fc608c7ccf0af1689e139af4bbb5a5324dc0748bdc2bf632468745920dc7be4eb7f0240d3cf1b5872d3f5c0c897725db78bf9f

    • C:\Users\Admin\AppData\Local\Temp\mwvze.v

      Filesize

      250KB

      MD5

      115356958470665c6ae130d757c61050

      SHA1

      831fc53bb0f2206d139e7e2027ef01719a6eb906

      SHA256

      086592db679fd7b6077e9cf7a168586c757b15453724b5dbe64117091566c80d

      SHA512

      1dc3b8184543a3ad728df419a8f78a67561bd0219274db5f4b6b1c99c10e16106e36fcea5598fac516eab6e3fe1cb522b4d60bbb374715f81b71ef1d4114ddcc

    • C:\Users\Admin\AppData\Local\Temp\ocwxklckil.exe

      Filesize

      194KB

      MD5

      d0d39072d96466898066b3a39747087e

      SHA1

      2c41d13e28a6ca285b1f2d44bc8eb5d27e8b33e2

      SHA256

      da7b0be64ebe422d4cbd53f072a32647b65c3a87b7ad333184b595efb42f5c13

      SHA512

      0da6aad1a80decf8c3d0c0ab0d13648d4cdd3e6506a3d7fc6560f336a24577b6e30f42f80defb60b299fca1e0d623dd9feb4abf8537df5cd8b3d508b0a7c9aaa

    • C:\Users\Admin\AppData\Local\Temp\ocwxklckil.exe

      Filesize

      194KB

      MD5

      d0d39072d96466898066b3a39747087e

      SHA1

      2c41d13e28a6ca285b1f2d44bc8eb5d27e8b33e2

      SHA256

      da7b0be64ebe422d4cbd53f072a32647b65c3a87b7ad333184b595efb42f5c13

      SHA512

      0da6aad1a80decf8c3d0c0ab0d13648d4cdd3e6506a3d7fc6560f336a24577b6e30f42f80defb60b299fca1e0d623dd9feb4abf8537df5cd8b3d508b0a7c9aaa

    • C:\Users\Admin\AppData\Local\Temp\ocwxklckil.exe

      Filesize

      194KB

      MD5

      d0d39072d96466898066b3a39747087e

      SHA1

      2c41d13e28a6ca285b1f2d44bc8eb5d27e8b33e2

      SHA256

      da7b0be64ebe422d4cbd53f072a32647b65c3a87b7ad333184b595efb42f5c13

      SHA512

      0da6aad1a80decf8c3d0c0ab0d13648d4cdd3e6506a3d7fc6560f336a24577b6e30f42f80defb60b299fca1e0d623dd9feb4abf8537df5cd8b3d508b0a7c9aaa

    • \Users\Admin\AppData\Local\Temp\ocwxklckil.exe

      Filesize

      194KB

      MD5

      d0d39072d96466898066b3a39747087e

      SHA1

      2c41d13e28a6ca285b1f2d44bc8eb5d27e8b33e2

      SHA256

      da7b0be64ebe422d4cbd53f072a32647b65c3a87b7ad333184b595efb42f5c13

      SHA512

      0da6aad1a80decf8c3d0c0ab0d13648d4cdd3e6506a3d7fc6560f336a24577b6e30f42f80defb60b299fca1e0d623dd9feb4abf8537df5cd8b3d508b0a7c9aaa

    • \Users\Admin\AppData\Local\Temp\ocwxklckil.exe

      Filesize

      194KB

      MD5

      d0d39072d96466898066b3a39747087e

      SHA1

      2c41d13e28a6ca285b1f2d44bc8eb5d27e8b33e2

      SHA256

      da7b0be64ebe422d4cbd53f072a32647b65c3a87b7ad333184b595efb42f5c13

      SHA512

      0da6aad1a80decf8c3d0c0ab0d13648d4cdd3e6506a3d7fc6560f336a24577b6e30f42f80defb60b299fca1e0d623dd9feb4abf8537df5cd8b3d508b0a7c9aaa

    • \Users\Admin\AppData\Local\Temp\sqlite3.dll

      Filesize

      904KB

      MD5

      5e5ba61531d74e45b11cadb79e7394a1

      SHA1

      677224e14aac9dd35f367d5eb1704b36e69356b8

      SHA256

      99e91ae250c955bd403ec1a2321d6b11fcb715bdcc7cb3f63ffb46b349afde5c

      SHA512

      712bfe419ba97ecf0ec8323a68743013e8c767da9d986f74ab94d2a395c3086cac2a5823048e0022d3bbcebb55281b9e1f8c87fdc9295c70cc5521b57850bf46

    • memory/1212-26-0x0000000008A10000-0x0000000009675000-memory.dmp

      Filesize

      12.4MB

    • memory/1212-19-0x0000000008A10000-0x0000000009675000-memory.dmp

      Filesize

      12.4MB

    • memory/1212-31-0x0000000004240000-0x000000000435A000-memory.dmp

      Filesize

      1.1MB

    • memory/1212-34-0x0000000004240000-0x000000000435A000-memory.dmp

      Filesize

      1.1MB

    • memory/1212-30-0x0000000004240000-0x000000000435A000-memory.dmp

      Filesize

      1.1MB

    • memory/2676-21-0x00000000002D0000-0x00000000002F4000-memory.dmp

      Filesize

      144KB

    • memory/2676-14-0x0000000000400000-0x000000000043A000-memory.dmp

      Filesize

      232KB

    • memory/2676-18-0x00000000002D0000-0x00000000002F4000-memory.dmp

      Filesize

      144KB

    • memory/2676-23-0x0000000000400000-0x000000000043A000-memory.dmp

      Filesize

      232KB

    • memory/2676-24-0x0000000000400000-0x000000000043A000-memory.dmp

      Filesize

      232KB

    • memory/2676-10-0x0000000000400000-0x000000000043A000-memory.dmp

      Filesize

      232KB

    • memory/2676-16-0x0000000000400000-0x000000000043A000-memory.dmp

      Filesize

      232KB

    • memory/2676-13-0x0000000000810000-0x0000000000B13000-memory.dmp

      Filesize

      3.0MB

    • memory/2676-15-0x0000000000400000-0x000000000043A000-memory.dmp

      Filesize

      232KB

    • memory/2880-6-0x0000000000090000-0x0000000000092000-memory.dmp

      Filesize

      8KB

    • memory/2996-20-0x0000000000080000-0x00000000000B6000-memory.dmp

      Filesize

      216KB

    • memory/2996-28-0x00000000005E0000-0x0000000000683000-memory.dmp

      Filesize

      652KB

    • memory/2996-32-0x0000000000080000-0x00000000000B6000-memory.dmp

      Filesize

      216KB

    • memory/2996-33-0x00000000005E0000-0x0000000000683000-memory.dmp

      Filesize

      652KB

    • memory/2996-27-0x0000000000080000-0x00000000000B6000-memory.dmp

      Filesize

      216KB

    • memory/2996-25-0x0000000000800000-0x0000000000B03000-memory.dmp

      Filesize

      3.0MB

    • memory/2996-22-0x0000000000080000-0x00000000000B6000-memory.dmp

      Filesize

      216KB

    • memory/2996-74-0x0000000061E00000-0x0000000061ECE000-memory.dmp

      Filesize

      824KB