Analysis
-
max time kernel
122s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
19-02-2022 21:08
Static task
static1
Behavioral task
behavioral1
Sample
d5ba0f1c01cf12f57cca93996d2f87191c9420afbbd116d3757060d780338d29.exe
Resource
win7-en-20211208
General
-
Target
d5ba0f1c01cf12f57cca93996d2f87191c9420afbbd116d3757060d780338d29.exe
-
Size
285KB
-
MD5
c25b6469a89826074b513d45b76c4c6a
-
SHA1
cd13f2ee1af78f3f48edb595fc90358415e5ebe1
-
SHA256
d5ba0f1c01cf12f57cca93996d2f87191c9420afbbd116d3757060d780338d29
-
SHA512
a9314292c946ad2c63165f241ab4bc3dbb5626b14b7fb5d6606dbf8d789040a50e7eb5777721568fbc32bed4d0a4e815dd423096a92026c319d4d96dcc3fc5f7
Malware Config
Extracted
gootkit
6546
servicemanager.icu
partnerservice.xyz
-
vendor_id
6546
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
d5ba0f1c01cf12f57cca93996d2f87191c9420afbbd116d3757060d780338d29.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d5ba0f1c01cf12f57cca93996d2f87191c9420afbbd116d3757060d780338d29.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
d5ba0f1c01cf12f57cca93996d2f87191c9420afbbd116d3757060d780338d29.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation d5ba0f1c01cf12f57cca93996d2f87191c9420afbbd116d3757060d780338d29.exe -
Drops file in Windows directory 6 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe File opened for modification C:\Windows\WindowsUpdate.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
svchost.exedescription pid process Token: SeShutdownPrivilege 4536 svchost.exe Token: SeCreatePagefilePrivilege 4536 svchost.exe Token: SeShutdownPrivilege 4536 svchost.exe Token: SeCreatePagefilePrivilege 4536 svchost.exe Token: SeShutdownPrivilege 4536 svchost.exe Token: SeCreatePagefilePrivilege 4536 svchost.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
d5ba0f1c01cf12f57cca93996d2f87191c9420afbbd116d3757060d780338d29.execmd.exedescription pid process target process PID 548 wrote to memory of 2368 548 d5ba0f1c01cf12f57cca93996d2f87191c9420afbbd116d3757060d780338d29.exe cmd.exe PID 548 wrote to memory of 2368 548 d5ba0f1c01cf12f57cca93996d2f87191c9420afbbd116d3757060d780338d29.exe cmd.exe PID 548 wrote to memory of 2368 548 d5ba0f1c01cf12f57cca93996d2f87191c9420afbbd116d3757060d780338d29.exe cmd.exe PID 2368 wrote to memory of 2700 2368 cmd.exe attrib.exe PID 2368 wrote to memory of 2700 2368 cmd.exe attrib.exe PID 2368 wrote to memory of 2700 2368 cmd.exe attrib.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5ba0f1c01cf12f57cca93996d2f87191c9420afbbd116d3757060d780338d29.exe"C:\Users\Admin\AppData\Local\Temp\d5ba0f1c01cf12f57cca93996d2f87191c9420afbbd116d3757060d780338d29.exe"1⤵
- Checks BIOS information in registry
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\30226078.bat" "C:\Users\Admin\AppData\Local\Temp\d5ba0f1c01cf12f57cca93996d2f87191c9420afbbd116d3757060d780338d29.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\d5ba0f1c01cf12f57cca93996d2f87191c9420afbbd116d3757060d780338d29.exe"3⤵
- Views/modifies file attributes
PID:2700
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4536
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
5af0c80a702c8f14ec00aeec6c19111b
SHA1c9bfe8e3bf4bf7eca9e586243b202cdc4bc1d5a9
SHA2562be0c9aa28da142b6a8a10275350a0b610254063f5f99bc558bafdec26874f7c
SHA512be1d8510c4fc1b775cc6d05d0db28afea9250ecc56f2fc31925184134c2e52af2cdcd8e85bce3103f1475731a664af100287a877816863af7ca3601decfc2c0f