Analysis
-
max time kernel
137s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
19-02-2022 21:45
Static task
static1
Behavioral task
behavioral1
Sample
a3c243afceb1fb38f25ae81816891d7d7c11ae76e80a43f31d2ceb9833f2f3df.exe
Resource
win7-en-20211208
General
-
Target
a3c243afceb1fb38f25ae81816891d7d7c11ae76e80a43f31d2ceb9833f2f3df.exe
-
Size
619KB
-
MD5
a4a24a3daed6b4673884187b131c968b
-
SHA1
b20661090b7305239d75209bac8d2179f648dcaa
-
SHA256
a3c243afceb1fb38f25ae81816891d7d7c11ae76e80a43f31d2ceb9833f2f3df
-
SHA512
3f49b3876921b41483b907066c9f1f6a61d3fe759219c2db8cb048473b94ba52ab064fcc7c4615da2e1b8056dedc93bf22ed865ff4df442e5ba5c43b1c6082dc
Malware Config
Extracted
gootkit
260319
sillikogermin.com
feferturietan.com
manjuorlidnqo.com
chechelderpos.com
kalamindridro.com
-
vendor_id
260319
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation a3c243afceb1fb38f25ae81816891d7d7c11ae76e80a43f31d2ceb9833f2f3df.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe File opened for modification C:\Windows\WindowsUpdate.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeShutdownPrivilege 1076 svchost.exe Token: SeCreatePagefilePrivilege 1076 svchost.exe Token: SeShutdownPrivilege 1076 svchost.exe Token: SeCreatePagefilePrivilege 1076 svchost.exe Token: SeShutdownPrivilege 1076 svchost.exe Token: SeCreatePagefilePrivilege 1076 svchost.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4728 wrote to memory of 3084 4728 a3c243afceb1fb38f25ae81816891d7d7c11ae76e80a43f31d2ceb9833f2f3df.exe 92 PID 4728 wrote to memory of 3084 4728 a3c243afceb1fb38f25ae81816891d7d7c11ae76e80a43f31d2ceb9833f2f3df.exe 92 PID 4728 wrote to memory of 3084 4728 a3c243afceb1fb38f25ae81816891d7d7c11ae76e80a43f31d2ceb9833f2f3df.exe 92 PID 3084 wrote to memory of 3744 3084 cmd.exe 95 PID 3084 wrote to memory of 3744 3084 cmd.exe 95 PID 3084 wrote to memory of 3744 3084 cmd.exe 95 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 3744 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3c243afceb1fb38f25ae81816891d7d7c11ae76e80a43f31d2ceb9833f2f3df.exe"C:\Users\Admin\AppData\Local\Temp\a3c243afceb1fb38f25ae81816891d7d7c11ae76e80a43f31d2ceb9833f2f3df.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\30257187.bat" "C:\Users\Admin\AppData\Local\Temp\a3c243afceb1fb38f25ae81816891d7d7c11ae76e80a43f31d2ceb9833f2f3df.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\a3c243afceb1fb38f25ae81816891d7d7c11ae76e80a43f31d2ceb9833f2f3df.exe"3⤵
- Views/modifies file attributes
PID:3744
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1076