Analysis
-
max time kernel
150s -
max time network
148s -
submitted
01-01-1970 00:00
Static task
static1
Behavioral task
behavioral1
Sample
00349c28a5f82e5617e4ca2410cc4b21.exe
Resource
win7-en-20210920
0 signatures
0 seconds
General
-
Target
00349c28a5f82e5617e4ca2410cc4b21.exe
-
Size
5.4MB
-
MD5
00349c28a5f82e5617e4ca2410cc4b21
-
SHA1
916eacdc0c0b2c7f7d1ebae963d8edda8631e424
-
SHA256
8b4e974a65677792d97fdcb35bba28c1e961b6b32c99b4baa81bfdd7c85348bd
-
SHA512
f93ce4a93204e4a7410f553bf2af3ade1d6afb3d8509a2b1bb01bfef3645a1e68c6b3594142ed8b2681003941aa8913822d0910652e4da4dbbe8f42b5495a89e
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1472 biztool.exe 108 biztool.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Control Panel\International\Geo\Nation biztool.exe -
Loads dropped DLL 9 IoCs
pid Process 612 00349c28a5f82e5617e4ca2410cc4b21.exe 612 00349c28a5f82e5617e4ca2410cc4b21.exe 612 00349c28a5f82e5617e4ca2410cc4b21.exe 612 00349c28a5f82e5617e4ca2410cc4b21.exe 612 00349c28a5f82e5617e4ca2410cc4b21.exe 1472 biztool.exe 1472 biztool.exe 108 biztool.exe 108 biztool.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\hardware\description\system\centralProcessor\2 biztool.exe Key opened \REGISTRY\MACHINE\hardware\description\system\centralProcessor\0 biztool.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString biztool.exe Key opened \REGISTRY\MACHINE\hardware\description\system\centralProcessor\16 biztool.exe Key opened \REGISTRY\MACHINE\hardware\description\system\centralProcessor\1 biztool.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString biztool.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1472 biztool.exe 1472 biztool.exe 1472 biztool.exe 1472 biztool.exe 1472 biztool.exe 1472 biztool.exe 1472 biztool.exe 1472 biztool.exe 108 biztool.exe 108 biztool.exe 108 biztool.exe 108 biztool.exe 108 biztool.exe 108 biztool.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1472 biztool.exe Token: SeDebugPrivilege 1472 biztool.exe Token: SeTakeOwnershipPrivilege 108 biztool.exe Token: SeTcbPrivilege 108 biztool.exe Token: SeTcbPrivilege 108 biztool.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1472 biztool.exe 1472 biztool.exe 1472 biztool.exe 1472 biztool.exe 108 biztool.exe 108 biztool.exe 108 biztool.exe 108 biztool.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 612 wrote to memory of 1472 612 00349c28a5f82e5617e4ca2410cc4b21.exe 28 PID 612 wrote to memory of 1472 612 00349c28a5f82e5617e4ca2410cc4b21.exe 28 PID 612 wrote to memory of 1472 612 00349c28a5f82e5617e4ca2410cc4b21.exe 28 PID 612 wrote to memory of 1472 612 00349c28a5f82e5617e4ca2410cc4b21.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\00349c28a5f82e5617e4ca2410cc4b21.exe"C:\Users\Admin\AppData\Local\Temp\00349c28a5f82e5617e4ca2410cc4b21.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:612 -
C:\Users\Public\Business Utilities\biztool.exe"C:\Users\Public\Business Utilities\biztool.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1472 -
C:\Users\Public\Business Utilities\biztool.exe"C:\Users\Public\Business Utilities\biztool.exe" -run_agent -second3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:108
-
-