Analysis
-
max time kernel
179s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
09-03-2022 04:30
Static task
static1
Behavioral task
behavioral1
Sample
dac68e2f9df041aacd69b3f29a37c5d2de0c38638772b9ab973d0f242febc4c8.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
dac68e2f9df041aacd69b3f29a37c5d2de0c38638772b9ab973d0f242febc4c8.exe
Resource
win10v2004-en-20220113
General
-
Target
dac68e2f9df041aacd69b3f29a37c5d2de0c38638772b9ab973d0f242febc4c8.exe
-
Size
16.3MB
-
MD5
e43ee6c5054feb07a7ff7d218e50b5f4
-
SHA1
349856aaa3a026768369e0d0a113ffa2287c2852
-
SHA256
dac68e2f9df041aacd69b3f29a37c5d2de0c38638772b9ab973d0f242febc4c8
-
SHA512
8f43cb072fe37eb859d9f4b019dd45d441b3f9421a8d931c1d6e4d76c1f81eda56bfc8d70996b3dab4e5d54e6cb978943e9f5643b0ffe90e4a98ed9798d5de46
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4700 Host.exe 3792 HostSys.exe -
Stops running service(s) 3 TTPs
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation dac68e2f9df041aacd69b3f29a37c5d2de0c38638772b9ab973d0f242febc4c8.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Run dac68e2f9df041aacd69b3f29a37c5d2de0c38638772b9ab973d0f242febc4c8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Host = "C:\\Windows\\host\\Host.exe /start" dac68e2f9df041aacd69b3f29a37c5d2de0c38638772b9ab973d0f242febc4c8.exe -
Drops file in Windows directory 17 IoCs
description ioc Process File created C:\Windows\host\regid.reg Host.exe File created C:\Windows\host\HostSys.exe.decript Host.exe File created C:\Windows\host\vp8decoder.dll.decript Host.exe File created C:\Windows\host\vp8encoder.dll.decript Host.exe File opened for modification C:\Windows\host\Host.exe dac68e2f9df041aacd69b3f29a37c5d2de0c38638772b9ab973d0f242febc4c8.exe File created C:\Windows\host\HostServer.exe.decript Host.exe File created C:\Windows\host\HostSys.exe Host.exe File created C:\Windows\host\regemail.reg Host.exe File opened for modification C:\Windows\host\RCXAAA5.tmp dac68e2f9df041aacd69b3f29a37c5d2de0c38638772b9ab973d0f242febc4c8.exe File opened for modification C:\Windows\host dac68e2f9df041aacd69b3f29a37c5d2de0c38638772b9ab973d0f242febc4c8.exe File created C:\Windows\host\Host.exe dac68e2f9df041aacd69b3f29a37c5d2de0c38638772b9ab973d0f242febc4c8.exe File created C:\Windows\host\Host.ico dac68e2f9df041aacd69b3f29a37c5d2de0c38638772b9ab973d0f242febc4c8.exe File created C:\Windows\host\HostServer.exe Host.exe File created C:\Windows\host\vp8decoder.dll Host.exe File created C:\Windows\host\vp8encoder.dll Host.exe File created C:\Windows\host\regset.reg Host.exe File created C:\Windows\Msvcr71.dll dac68e2f9df041aacd69b3f29a37c5d2de0c38638772b9ab973d0f242febc4c8.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings dac68e2f9df041aacd69b3f29a37c5d2de0c38638772b9ab973d0f242febc4c8.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1596 dac68e2f9df041aacd69b3f29a37c5d2de0c38638772b9ab973d0f242febc4c8.exe 1596 dac68e2f9df041aacd69b3f29a37c5d2de0c38638772b9ab973d0f242febc4c8.exe 1596 dac68e2f9df041aacd69b3f29a37c5d2de0c38638772b9ab973d0f242febc4c8.exe 1596 dac68e2f9df041aacd69b3f29a37c5d2de0c38638772b9ab973d0f242febc4c8.exe 4700 Host.exe 4700 Host.exe 4700 Host.exe 4700 Host.exe 4700 Host.exe 4700 Host.exe 4700 Host.exe 4700 Host.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1596 wrote to memory of 4700 1596 dac68e2f9df041aacd69b3f29a37c5d2de0c38638772b9ab973d0f242febc4c8.exe 83 PID 1596 wrote to memory of 4700 1596 dac68e2f9df041aacd69b3f29a37c5d2de0c38638772b9ab973d0f242febc4c8.exe 83 PID 1596 wrote to memory of 4700 1596 dac68e2f9df041aacd69b3f29a37c5d2de0c38638772b9ab973d0f242febc4c8.exe 83 PID 1596 wrote to memory of 4552 1596 dac68e2f9df041aacd69b3f29a37c5d2de0c38638772b9ab973d0f242febc4c8.exe 84 PID 1596 wrote to memory of 4552 1596 dac68e2f9df041aacd69b3f29a37c5d2de0c38638772b9ab973d0f242febc4c8.exe 84 PID 1596 wrote to memory of 4552 1596 dac68e2f9df041aacd69b3f29a37c5d2de0c38638772b9ab973d0f242febc4c8.exe 84 PID 4700 wrote to memory of 1980 4700 Host.exe 86 PID 4700 wrote to memory of 1980 4700 Host.exe 86 PID 4700 wrote to memory of 1980 4700 Host.exe 86 PID 4552 wrote to memory of 1456 4552 WScript.exe 88 PID 4552 wrote to memory of 1456 4552 WScript.exe 88 PID 4552 wrote to memory of 1456 4552 WScript.exe 88 PID 1456 wrote to memory of 1040 1456 cmd.exe 90 PID 1456 wrote to memory of 1040 1456 cmd.exe 90 PID 1456 wrote to memory of 1040 1456 cmd.exe 90 PID 4700 wrote to memory of 3792 4700 Host.exe 100 PID 4700 wrote to memory of 3792 4700 Host.exe 100 PID 4700 wrote to memory of 3792 4700 Host.exe 100 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System dac68e2f9df041aacd69b3f29a37c5d2de0c38638772b9ab973d0f242febc4c8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dac68e2f9df041aacd69b3f29a37c5d2de0c38638772b9ab973d0f242febc4c8.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System Host.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dac68e2f9df041aacd69b3f29a37c5d2de0c38638772b9ab973d0f242febc4c8.exe"C:\Users\Admin\AppData\Local\Temp\dac68e2f9df041aacd69b3f29a37c5d2de0c38638772b9ab973d0f242febc4c8.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1596 -
C:\Windows\host\Host.exe"C:\Windows\host\Host.exe" /install2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4700 -
C:\Windows\SysWOW64\sc.exesc delete HostServer3⤵PID:1980
-
-
C:\Windows\host\HostSys.exeC:\Windows\host\HostSys.exe /silentinstall3⤵
- Executes dropped EXE
PID:3792
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\dac68e2f9df041aacd69b3f29a37c5d2de0c38638772b9ab973d0f242febc4c8.vbs"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\dac68e2f9df041aacd69b3f29a37c5d2de0c38638772b9ab973d0f242febc4c8.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:1040
-
-
-