Resubmissions

20/04/2025, 00:10 UTC

250420-agcc8axyax 10

16/04/2025, 11:04 UTC

250416-m58gsaz1ay 10

15/04/2025, 17:34 UTC

250415-v5ylksypw9 10

15/04/2025, 06:16 UTC

250415-g1p7ras1dw 10

14/04/2025, 08:06 UTC

250414-jzpwpstxhx 10

14/04/2025, 07:59 UTC

250414-jvg1assky4 10

14/04/2025, 07:22 UTC

250414-h7g1dss1h1 10

14/04/2025, 07:16 UTC

250414-h3xv2s1nv6 10

Analysis

  • max time kernel
    153s
  • max time network
    163s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250410-en
  • resource tags

    arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    15/04/2025, 06:16 UTC

General

  • Target

    ForceOp 2.8.7 - By RaiSence.exe

  • Size

    1.0MB

  • MD5

    0a88ebdd3ae5ab0b006d4eaa2f5bc4b2

  • SHA1

    6bf1215ac7b1fde54442a9d075c84544b6e80d50

  • SHA256

    26509645fe956ff1b7c540b935f88817281b65413c62da67e597eaefb2406680

  • SHA512

    54c8cde607bd33264c61dbe750a34f8dd190dfa400fc063b61efcd4426f0635c8de42bc3daf8befb14835856b4477fec3bdc8806c555e49684528ff67dd45f37

  • SSDEEP

    24576:sAOcZ1SxlW2YT6EtAcl0URqqqUeiG3STJq3n:64SK2YT6E1l0EqqqU1GwcX

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 5 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ForceOp 2.8.7 - By RaiSence.exe
    "C:\Users\Admin\AppData\Local\Temp\ForceOp 2.8.7 - By RaiSence.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:5524
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\intofont\1Udi0TDz635jTrMWFNrE4kqnOIuYIi.vbe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4556
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\intofont\xLg6v1j1ZJy5DZ1pz826KfZq2BmfLM.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:6020
        • C:\intofont\wincommon.exe
          "C:\intofont\wincommon.exe"
          4⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4716
          • C:\Windows\SYSTEM32\schtasks.exe
            "schtasks" /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\435ec8a8125891fda9b522e0\SppExtComObj.exe'" /rl HIGHEST /f
            5⤵
            • Scheduled Task/Job: Scheduled Task
            PID:3552
          • C:\Windows\SYSTEM32\schtasks.exe
            "schtasks" /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\fontdrvhost.exe'" /rl HIGHEST /f
            5⤵
            • Scheduled Task/Job: Scheduled Task
            PID:5020
          • C:\Program Files (x86)\Mozilla Maintenance Service\logs\fontdrvhost.exe
            "C:\Program Files (x86)\Mozilla Maintenance Service\logs\fontdrvhost.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4900
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\intofont\msg.vbs"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2960
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2296
  • C:\Windows\system32\rundll32.exe
    "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,Control_RunDLL C:\Windows\System32\srchadmin.dll ,
    1⤵
      PID:5156
    • C:\Windows\system32\BackgroundTransferHost.exe
      "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.13
      1⤵
      • Modifies registry class
      PID:4976
    • C:\Windows\SysWOW64\DllHost.exe
      C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
      1⤵
      • System Location Discovery: System Language Discovery
      PID:3200
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,Control_RunDLL C:\Windows\System32\srchadmin.dll ,
      1⤵
        PID:3048
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc
        1⤵
          PID:2212
        • C:\Windows\System32\oobe\UserOOBEBroker.exe
          C:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding
          1⤵
          • Drops file in Windows directory
          PID:1736
        • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe
          C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding
          1⤵
          • System Location Discovery: System Language Discovery
          PID:1548

        Network

        • flag-us
          DNS
          browser.pipe.aria.microsoft.com
          Remote address:
          8.8.8.8:53
          Request
          browser.pipe.aria.microsoft.com
          IN A
          Response
          browser.pipe.aria.microsoft.com
          IN CNAME
          browser.events.data.trafficmanager.net
          browser.events.data.trafficmanager.net
          IN CNAME
          onedscolprdeus05.eastus.cloudapp.azure.com
          onedscolprdeus05.eastus.cloudapp.azure.com
          IN A
          20.42.65.85
        • flag-us
          DNS
          ocsp.digicert.com
          Remote address:
          8.8.8.8:53
          Request
          ocsp.digicert.com
          IN A
          Response
          ocsp.digicert.com
          IN CNAME
          ocsp.edge.digicert.com
          ocsp.edge.digicert.com
          IN CNAME
          cac-ocsp.digicert.com.edgekey.net
          cac-ocsp.digicert.com.edgekey.net
          IN CNAME
          e3913.cd.akamaiedge.net
          e3913.cd.akamaiedge.net
          IN A
          2.22.98.7
        • flag-us
          DNS
          85.65.42.20.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          85.65.42.20.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          7.98.22.2.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          7.98.22.2.in-addr.arpa
          IN PTR
          Response
          7.98.22.2.in-addr.arpa
          IN PTR
          a2-22-98-7deploystaticakamaitechnologiescom
        • flag-us
          DNS
          login.live.com
          Remote address:
          8.8.8.8:53
          Request
          login.live.com
          IN A
          Response
          login.live.com
          IN CNAME
          login.msa.msidentity.com
          login.msa.msidentity.com
          IN CNAME
          www.tm.lg.prod.aadmsa.trafficmanager.net
          www.tm.lg.prod.aadmsa.trafficmanager.net
          IN CNAME
          prdv4a.aadg.msidentity.com
          prdv4a.aadg.msidentity.com
          IN CNAME
          www.tm.v4.a.prd.aadg.akadns.net
          www.tm.v4.a.prd.aadg.akadns.net
          IN A
          20.190.159.71
          www.tm.v4.a.prd.aadg.akadns.net
          IN A
          20.190.159.4
          www.tm.v4.a.prd.aadg.akadns.net
          IN A
          40.126.31.130
          www.tm.v4.a.prd.aadg.akadns.net
          IN A
          20.190.159.131
          www.tm.v4.a.prd.aadg.akadns.net
          IN A
          40.126.31.73
          www.tm.v4.a.prd.aadg.akadns.net
          IN A
          40.126.31.71
          www.tm.v4.a.prd.aadg.akadns.net
          IN A
          40.126.31.131
          www.tm.v4.a.prd.aadg.akadns.net
          IN A
          20.190.159.73
        • flag-us
          DNS
          fp.msedge.net
          Remote address:
          8.8.8.8:53
          Request
          fp.msedge.net
          IN A
          Response
          fp.msedge.net
          IN CNAME
          1.perf.msedge.net
          1.perf.msedge.net
          IN CNAME
          a-0019.a-msedge.net
          a-0019.a-msedge.net
          IN CNAME
          a-0019.a.dns.azurefd.net
          a-0019.a.dns.azurefd.net
          IN CNAME
          a-0019.standard.a-msedge.net
          a-0019.standard.a-msedge.net
          IN A
          204.79.197.222
        • flag-us
          DNS
          222.197.79.204.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          222.197.79.204.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          a-ring.msedge.net
          Remote address:
          8.8.8.8:53
          Request
          a-ring.msedge.net
          IN A
          Response
          a-ring.msedge.net
          IN CNAME
          a-ring.a-9999.a-msedge.net
          a-ring.a-9999.a-msedge.net
          IN CNAME
          a-9999.a-msedge.net
          a-9999.a-msedge.net
          IN A
          204.79.197.254
        • flag-us
          DNS
          f7127d0abf2ae53f4fc5b215dc18286c.azr.footprintdns.com
          Remote address:
          8.8.8.8:53
          Request
          f7127d0abf2ae53f4fc5b215dc18286c.azr.footprintdns.com
          IN A
          Response
          f7127d0abf2ae53f4fc5b215dc18286c.azr.footprintdns.com
          IN CNAME
          azperfmaptargets-prod.trafficmanager.net
          azperfmaptargets-prod.trafficmanager.net
          IN CNAME
          db3prdapp01-canary.netmon.azure.com
          db3prdapp01-canary.netmon.azure.com
          IN CNAME
          db3prdapp01-canary.northeurope.cloudapp.azure.com
          db3prdapp01-canary.northeurope.cloudapp.azure.com
          IN A
          128.251.95.9
        • flag-us
          DNS
          9.95.251.128.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          9.95.251.128.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          254.31.171.150.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          254.31.171.150.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          arc.msn.com
          Remote address:
          8.8.8.8:53
          Request
          arc.msn.com
          IN A
          Response
          arc.msn.com
          IN CNAME
          arc.trafficmanager.net
          arc.trafficmanager.net
          IN CNAME
          iris-de-prod-azsc-v2-neu.northeurope.cloudapp.azure.com
          iris-de-prod-azsc-v2-neu.northeurope.cloudapp.azure.com
          IN A
          20.223.35.26
        • flag-us
          DNS
          arc.msn.com
          Remote address:
          8.8.8.8:53
          Request
          arc.msn.com
          IN A
        • flag-us
          GET
          https://t-ring-s2.msedge.net/apc/trans.gif?fb37d48234b6d1382a4f1abfdb1bba6c
          Remote address:
          13.107.213.254:443
          Request
          GET /apc/trans.gif?fb37d48234b6d1382a4f1abfdb1bba6c HTTP/1.1
          Referer: https://www.bing.com/WS/Init
          Accept: image/png,image/svg+xml,image/*;q=0.8,*/*;q=0.5
          Accept-Language: en-US
          Accept-Encoding: gzip, deflate, br
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Cortana 1.17.1.21325; 10.0.0.0.22000.493) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.22000
          Host: t-ring-s2.msedge.net
          Connection: Keep-Alive
          Response
          HTTP/1.1 200 OK
          Date: Tue, 15 Apr 2025 06:19:14 GMT
          Content-Type: image/gif
          Content-Length: 43
          Last-Modified: Mon, 14 Apr 2025 23:19:57 GMT
          Connection: keep-alive
          ETag: "67fd981d-2b"
          x-azure-ref: 20250415T061914Z-155b7596b5bj6xs9hC1LONxsbg00000001ag000000007w2g
          X-Cache: CONFIG_NOCACHE
          Accept-Ranges: bytes
        • flag-us
          GET
          https://t-ring-s2.msedge.net/apc/trans.gif?015135f0092f4f350a6417ec0abccaaa
          Remote address:
          13.107.213.254:443
          Request
          GET /apc/trans.gif?015135f0092f4f350a6417ec0abccaaa HTTP/1.1
          Referer: https://www.bing.com/WS/Init
          Accept: image/png,image/svg+xml,image/*;q=0.8,*/*;q=0.5
          Accept-Language: en-US
          Accept-Encoding: gzip, deflate, br
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Cortana 1.17.1.21325; 10.0.0.0.22000.493) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.22000
          Host: t-ring-s2.msedge.net
          Connection: Keep-Alive
          Response
          HTTP/1.1 200 OK
          Date: Tue, 15 Apr 2025 06:19:14 GMT
          Content-Type: image/gif
          Content-Length: 43
          Last-Modified: Mon, 14 Apr 2025 23:19:57 GMT
          Connection: keep-alive
          ETag: "67fd981d-2b"
          x-azure-ref: 20250415T061914Z-155b7596b5bj6xs9hC1LONxsbg00000001ag000000007w2r
          X-Cache: CONFIG_NOCACHE
          Accept-Ranges: bytes
        • flag-gb
          GET
          http://c.pki.goog/r/r1.crl
          Remote address:
          142.250.180.3:80
          Request
          GET /r/r1.crl HTTP/1.1
          Cache-Control: max-age = 3000
          Connection: Keep-Alive
          Accept: */*
          If-Modified-Since: Thu, 03 Apr 2025 14:18:00 GMT
          User-Agent: Microsoft-CryptoAPI/10.0
          Host: c.pki.goog
          Response
          HTTP/1.1 304 Not Modified
          Date: Tue, 15 Apr 2025 05:32:38 GMT
          Expires: Tue, 15 Apr 2025 06:22:38 GMT
          Age: 2837
          Last-Modified: Thu, 03 Apr 2025 14:18:00 GMT
          Cache-Control: public, max-age=3000
          Vary: Accept-Encoding
        • 2.18.66.163:443
          www.bing.com
          tls
          102.4kB
          901.5kB
          810
          736
        • 20.42.65.85:443
          browser.pipe.aria.microsoft.com
          tls
          8.2kB
          8.2kB
          36
          22
        • 5.23.51.23:80
          cb76972.tmweb.ru
          fontdrvhost.exe
          260 B
          5
        • 88.221.135.10:443
          www.bing.com
          tls
          BackgroundTransferHost.exe
          21.6kB
          593.4kB
          446
          443
        • 13.107.213.254:443
          https://t-ring-s2.msedge.net/apc/trans.gif?015135f0092f4f350a6417ec0abccaaa
          tls, http
          2.2kB
          8.9kB
          18
          15

          HTTP Request

          GET https://t-ring-s2.msedge.net/apc/trans.gif?fb37d48234b6d1382a4f1abfdb1bba6c

          HTTP Response

          200

          HTTP Request

          GET https://t-ring-s2.msedge.net/apc/trans.gif?015135f0092f4f350a6417ec0abccaaa

          HTTP Response

          200
        • 128.251.95.9:443
          f7127d0abf2ae53f4fc5b215dc18286c.azr.footprintdns.com
          tls
          2.1kB
          7.6kB
          19
          13
        • 5.23.51.23:80
          cb76972.tmweb.ru
          fontdrvhost.exe
          260 B
          5
        • 150.171.31.254:443
          ev2-ring.msedge.net
          tls
          2.5kB
          8.9kB
          25
          21
        • 13.107.42.10:443
          8094c2759ba9fd736005d532d1510bc7.clo.footprintdns.com
          tls
          4.3kB
          10.0kB
          28
          20
        • 13.107.3.254:443
          s-ring.msedge.net
          tls
          2.2kB
          8.5kB
          22
          19
        • 142.250.180.3:80
          http://c.pki.goog/r/r1.crl
          http
          476 B
          395 B
          6
          4

          HTTP Request

          GET http://c.pki.goog/r/r1.crl

          HTTP Response

          304
        • 8.8.8.8:53
          browser.pipe.aria.microsoft.com
          dns
          890 B
          2.2kB
          13
          12

          DNS Request

          browser.pipe.aria.microsoft.com

          DNS Response

          20.42.65.85

          DNS Request

          ocsp.digicert.com

          DNS Response

          2.22.98.7

          DNS Request

          85.65.42.20.in-addr.arpa

          DNS Request

          7.98.22.2.in-addr.arpa

          DNS Request

          login.live.com

          DNS Response

          20.190.159.71
          20.190.159.4
          40.126.31.130
          20.190.159.131
          40.126.31.73
          40.126.31.71
          40.126.31.131
          20.190.159.73

          DNS Request

          fp.msedge.net

          DNS Response

          204.79.197.222

          DNS Request

          222.197.79.204.in-addr.arpa

          DNS Request

          a-ring.msedge.net

          DNS Response

          204.79.197.254

          DNS Request

          f7127d0abf2ae53f4fc5b215dc18286c.azr.footprintdns.com

          DNS Response

          128.251.95.9

          DNS Request

          9.95.251.128.in-addr.arpa

          DNS Request

          254.31.171.150.in-addr.arpa

          DNS Request

          arc.msn.com

          DNS Request

          arc.msn.com

          DNS Response

          20.223.35.26

        MITRE ATT&CK Enterprise v16

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\BackgroundTransferApi\122fc56a-8daf-4bb9-a30b-bae33ba34648.down_data

          Filesize

          555KB

          MD5

          5683c0028832cae4ef93ca39c8ac5029

          SHA1

          248755e4e1db552e0b6f8651b04ca6d1b31a86fb

          SHA256

          855abd360d8a8d6974eba92b70cbd09ce519bc8773439993f9ab37cb6847309e

          SHA512

          aba434bd29be191c823b02ea9b639beb10647bbe7759bbffdaa790dfb1ec2c58d74c525ef11aacda209e4effe322d1d3a07b115446c8914b07a3bce4d8a0e2c3

        • C:\intofont\1Udi0TDz635jTrMWFNrE4kqnOIuYIi.vbe

          Filesize

          220B

          MD5

          35f693ab095c33d4c62230d69ff6b43f

          SHA1

          19e8b126076b5e5d8e8b97f3757ad99357915bf4

          SHA256

          1a3b550ae14c360fd9600e52924706a356290939317f3a32b35bfa97b5dbc163

          SHA512

          1e2599c7b10a1fc5c004d7d68c487028d5d2d6a1102af0150ea0c15663819dac42e3a55a769cc532cf45f9f037cece3fcdc2820f2bfbe8439fd0a3d5a16bb4df

        • C:\intofont\MOS

          Filesize

          9B

          MD5

          cb456215c3333db0551bd0788bc258c7

          SHA1

          a0b861f6121344b631992c8252fa8748835e4df6

          SHA256

          7e7b3a01539b5dd82108fe0dc455a76294708bb782f8f7590b06f0975fdf93c1

          SHA512

          796ccc0f1fc4a990fe3c50f54a2d009e6ddb8e4e062ac1839a2c2c1e6f120311dad66fa86211137cb38cce27a99614085702d5fe9b6f3effc5dd1db0ad879448

        • C:\intofont\msg.vbs

          Filesize

          128B

          MD5

          01c71ea2d98437129936261c48403132

          SHA1

          dc689fb68a3e7e09a334e7a37c0d10d0641af1a6

          SHA256

          0401f2dd76d5ed6f90c82b72e1e7a122ef127bedbaf717532c4bba26d43a0061

          SHA512

          a668d4216a50ccc699221dd902d8b0f864e44368dc7474fa5659a739154d4e769b85d49b60a73affb8fba7628e7210b0f8106d5652006d1bbba67083513e65d9

        • C:\intofont\wincommon.exe

          Filesize

          1.1MB

          MD5

          9134637118b2a4485fb46d439133749b

          SHA1

          25b60dba36e432f53f68603797d50b9c6cc127ce

          SHA256

          5dca1a463f5308018c477503a5179f45c468245dd4a84732ee824bd704521acc

          SHA512

          a6db12e3349c034051940b15adbb530ba34152ccbe41afc210dad7e64331221b3dbae1563a2f3b79a43d12da54eaeac3f30cfb708ebc75ab6a9dfc30a8f1e601

        • C:\intofont\xLg6v1j1ZJy5DZ1pz826KfZq2BmfLM.bat

          Filesize

          27B

          MD5

          9fe442702fb57ffec2b831c3949a74e0

          SHA1

          e285d89241ef0aeeeb50f65e09a741baf399cb1f

          SHA256

          d50176a5de27bc9b4c52ebb4e30ec4cbf1e6a79eda4d83a013b220f489a5bcb9

          SHA512

          548a8df7f0d9278f84eca35bf40638a4572cb625050f7a0684ee14b2117df8307101d8f9383c3fcab23fcf656c21f69db3f4509a037307ed6658ff4c063b4eab

        • memory/4716-20-0x0000000000030000-0x000000000015C000-memory.dmp

          Filesize

          1.2MB

        • memory/4716-21-0x00000000023E0000-0x0000000002402000-memory.dmp

          Filesize

          136KB

        We care about your privacy.

        This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.