Analysis
-
max time kernel
137s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
19-02-2022 21:45
Static task
static1
Behavioral task
behavioral1
Sample
a3c243afceb1fb38f25ae81816891d7d7c11ae76e80a43f31d2ceb9833f2f3df.exe
Resource
win7-en-20211208
General
-
Target
a3c243afceb1fb38f25ae81816891d7d7c11ae76e80a43f31d2ceb9833f2f3df.exe
-
Size
619KB
-
MD5
a4a24a3daed6b4673884187b131c968b
-
SHA1
b20661090b7305239d75209bac8d2179f648dcaa
-
SHA256
a3c243afceb1fb38f25ae81816891d7d7c11ae76e80a43f31d2ceb9833f2f3df
-
SHA512
3f49b3876921b41483b907066c9f1f6a61d3fe759219c2db8cb048473b94ba52ab064fcc7c4615da2e1b8056dedc93bf22ed865ff4df442e5ba5c43b1c6082dc
Malware Config
Extracted
gootkit
260319
sillikogermin.com
feferturietan.com
manjuorlidnqo.com
chechelderpos.com
kalamindridro.com
-
vendor_id
260319
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
a3c243afceb1fb38f25ae81816891d7d7c11ae76e80a43f31d2ceb9833f2f3df.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation a3c243afceb1fb38f25ae81816891d7d7c11ae76e80a43f31d2ceb9833f2f3df.exe -
Drops file in Windows directory 6 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe File opened for modification C:\Windows\WindowsUpdate.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
svchost.exedescription pid process Token: SeShutdownPrivilege 1076 svchost.exe Token: SeCreatePagefilePrivilege 1076 svchost.exe Token: SeShutdownPrivilege 1076 svchost.exe Token: SeCreatePagefilePrivilege 1076 svchost.exe Token: SeShutdownPrivilege 1076 svchost.exe Token: SeCreatePagefilePrivilege 1076 svchost.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
a3c243afceb1fb38f25ae81816891d7d7c11ae76e80a43f31d2ceb9833f2f3df.execmd.exedescription pid process target process PID 4728 wrote to memory of 3084 4728 a3c243afceb1fb38f25ae81816891d7d7c11ae76e80a43f31d2ceb9833f2f3df.exe cmd.exe PID 4728 wrote to memory of 3084 4728 a3c243afceb1fb38f25ae81816891d7d7c11ae76e80a43f31d2ceb9833f2f3df.exe cmd.exe PID 4728 wrote to memory of 3084 4728 a3c243afceb1fb38f25ae81816891d7d7c11ae76e80a43f31d2ceb9833f2f3df.exe cmd.exe PID 3084 wrote to memory of 3744 3084 cmd.exe attrib.exe PID 3084 wrote to memory of 3744 3084 cmd.exe attrib.exe PID 3084 wrote to memory of 3744 3084 cmd.exe attrib.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3c243afceb1fb38f25ae81816891d7d7c11ae76e80a43f31d2ceb9833f2f3df.exe"C:\Users\Admin\AppData\Local\Temp\a3c243afceb1fb38f25ae81816891d7d7c11ae76e80a43f31d2ceb9833f2f3df.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\30257187.bat" "C:\Users\Admin\AppData\Local\Temp\a3c243afceb1fb38f25ae81816891d7d7c11ae76e80a43f31d2ceb9833f2f3df.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\a3c243afceb1fb38f25ae81816891d7d7c11ae76e80a43f31d2ceb9833f2f3df.exe"3⤵
- Views/modifies file attributes
PID:3744
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1076
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
21c397d45a75dd3ce1ddb94cf5b63a7f
SHA1ec3de1bbb4e47e0b9cafec64f38a0b392d7f62e3
SHA2569dc219091717908c6f637b9869ce4bd186728ad2fd084f2388256689bfebe64a
SHA512b253a8c259ff73958ca7339207431e73bcadda99afff17f85e720fd6c71e6b82c744d5e34c13d0616bea1889b5d3e6d2249038a2f92f5ddddffe4dd2e9ab31e1