Analysis
-
max time kernel
238s -
max time network
249s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2023 03:13
Static task
static1
Behavioral task
behavioral1
Sample
MOQ_T7FIBA00541·PDF .scr
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
MOQ_T7FIBA00541·PDF .scr
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
ORDER LIST_SEPT7FIBA00541·PDF.scr
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
ORDER LIST_SEPT7FIBA00541·PDF.scr
Resource
win10v2004-20230915-en
General
-
Target
MOQ_T7FIBA00541·PDF .scr
-
Size
670KB
-
MD5
48a5e2b45923213e94a82d30db1eb988
-
SHA1
eb3c3aeb61e6e20b149cbd966f60c81a8215e8b0
-
SHA256
19fa9896468d7dd79d76fa27b34f66e13b6c5268cdd574c0a78eeb0e3dbeb839
-
SHA512
13edc7b141a8bd854a07ec70371f6fe59055d1dfe4127e3912992181d983e710f990d0cfcaa294e5da8e37ab757efb93133382625e210c47823885586fc536da
-
SSDEEP
12288:PBzhfOS3GXJNUwCpoOekXOS6zjwehALsCGlhcBd:phfOS3sJWwvOeYCras
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation MOQ_T7FIBA00541·PDF .scr -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 836 ipconfig.exe 800 ipconfig.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2308 wrote to memory of 4768 2308 MOQ_T7FIBA00541·PDF .scr 90 PID 2308 wrote to memory of 4768 2308 MOQ_T7FIBA00541·PDF .scr 90 PID 2308 wrote to memory of 4768 2308 MOQ_T7FIBA00541·PDF .scr 90 PID 4768 wrote to memory of 836 4768 cmd.exe 92 PID 4768 wrote to memory of 836 4768 cmd.exe 92 PID 4768 wrote to memory of 836 4768 cmd.exe 92 PID 2308 wrote to memory of 2908 2308 MOQ_T7FIBA00541·PDF .scr 97 PID 2308 wrote to memory of 2908 2308 MOQ_T7FIBA00541·PDF .scr 97 PID 2308 wrote to memory of 2908 2308 MOQ_T7FIBA00541·PDF .scr 97 PID 2908 wrote to memory of 800 2908 cmd.exe 99 PID 2908 wrote to memory of 800 2908 cmd.exe 99 PID 2908 wrote to memory of 800 2908 cmd.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\MOQ_T7FIBA00541·PDF .scr"C:\Users\Admin\AppData\Local\Temp\MOQ_T7FIBA00541·PDF .scr" /S1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /release2⤵
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /release3⤵
- Gathers network information
PID:836
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /renew2⤵
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /renew3⤵
- Gathers network information
PID:800
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe2⤵PID:5036
-