Analysis
-
max time kernel
146s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
09-03-2022 20:22
Static task
static1
Behavioral task
behavioral1
Sample
686b40dcb167653cb7a8463928c26af1.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
General
-
Target
686b40dcb167653cb7a8463928c26af1.exe
-
Size
9.5MB
-
MD5
686b40dcb167653cb7a8463928c26af1
-
SHA1
d6146b6fdf516223735e4e881fa797432dff3923
-
SHA256
595e1545c53d27fb1315e70b241e66f44b28a49be59a717ca4936d167e121470
-
SHA512
c40d9c17e1b6d1100425b15d0f800562579b935a83e1c9b8f4099d8a4262b7287f545f4c0a00ab040c92e239fe946416242461dd712d4cb63deca5f651558f8f
Malware Config
Extracted
Family
systembc
C2
5.101.78.2:4127
192.53.123.202:4127
Signatures
-
Babadeda Crypter 3 IoCs
resource yara_rule behavioral2/files/0x000600000002211e-162.dat family_babadeda behavioral2/memory/2852-164-0x0000000004880000-0x0000000008A80000-memory.dmp family_babadeda behavioral2/memory/3784-178-0x00000000025F0000-0x00000000067F0000-memory.dmp family_babadeda -
Executes dropped EXE 5 IoCs
pid Process 3704 686b40dcb167653cb7a8463928c26af1.tmp 652 686b40dcb167653cb7a8463928c26af1.tmp 620 tracegen.exe 2852 PDapp.exe 3784 PDapp.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation 686b40dcb167653cb7a8463928c26af1.tmp Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation 686b40dcb167653cb7a8463928c26af1.tmp -
Loads dropped DLL 16 IoCs
pid Process 2852 PDapp.exe 2852 PDapp.exe 2852 PDapp.exe 2852 PDapp.exe 2852 PDapp.exe 2852 PDapp.exe 2852 PDapp.exe 2852 PDapp.exe 2852 PDapp.exe 3784 PDapp.exe 3784 PDapp.exe 3784 PDapp.exe 3784 PDapp.exe 3784 PDapp.exe 3784 PDapp.exe 3784 PDapp.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\wow64.job PDapp.exe File opened for modification C:\Windows\Tasks\wow64.job PDapp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 652 686b40dcb167653cb7a8463928c26af1.tmp 652 686b40dcb167653cb7a8463928c26af1.tmp -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 3448 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3448 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 652 686b40dcb167653cb7a8463928c26af1.tmp -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2952 wrote to memory of 3704 2952 686b40dcb167653cb7a8463928c26af1.exe 55 PID 2952 wrote to memory of 3704 2952 686b40dcb167653cb7a8463928c26af1.exe 55 PID 2952 wrote to memory of 3704 2952 686b40dcb167653cb7a8463928c26af1.exe 55 PID 3704 wrote to memory of 2028 3704 686b40dcb167653cb7a8463928c26af1.tmp 59 PID 3704 wrote to memory of 2028 3704 686b40dcb167653cb7a8463928c26af1.tmp 59 PID 3704 wrote to memory of 2028 3704 686b40dcb167653cb7a8463928c26af1.tmp 59 PID 2028 wrote to memory of 652 2028 686b40dcb167653cb7a8463928c26af1.exe 60 PID 2028 wrote to memory of 652 2028 686b40dcb167653cb7a8463928c26af1.exe 60 PID 2028 wrote to memory of 652 2028 686b40dcb167653cb7a8463928c26af1.exe 60 PID 652 wrote to memory of 620 652 686b40dcb167653cb7a8463928c26af1.tmp 64 PID 652 wrote to memory of 620 652 686b40dcb167653cb7a8463928c26af1.tmp 64 PID 652 wrote to memory of 620 652 686b40dcb167653cb7a8463928c26af1.tmp 64 PID 652 wrote to memory of 2852 652 686b40dcb167653cb7a8463928c26af1.tmp 66 PID 652 wrote to memory of 2852 652 686b40dcb167653cb7a8463928c26af1.tmp 66 PID 652 wrote to memory of 2852 652 686b40dcb167653cb7a8463928c26af1.tmp 66
Processes
-
C:\Users\Admin\AppData\Local\Temp\686b40dcb167653cb7a8463928c26af1.exe"C:\Users\Admin\AppData\Local\Temp\686b40dcb167653cb7a8463928c26af1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\is-OEDAI.tmp\686b40dcb167653cb7a8463928c26af1.tmp"C:\Users\Admin\AppData\Local\Temp\is-OEDAI.tmp\686b40dcb167653cb7a8463928c26af1.tmp" /SL5="$50116,9084029,780800,C:\Users\Admin\AppData\Local\Temp\686b40dcb167653cb7a8463928c26af1.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Users\Admin\AppData\Local\Temp\686b40dcb167653cb7a8463928c26af1.exe"C:\Users\Admin\AppData\Local\Temp\686b40dcb167653cb7a8463928c26af1.exe" /VERYSILENT3⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\is-JCBE9.tmp\686b40dcb167653cb7a8463928c26af1.tmp"C:\Users\Admin\AppData\Local\Temp\is-JCBE9.tmp\686b40dcb167653cb7a8463928c26af1.tmp" /SL5="$E002A,9084029,780800,C:\Users\Admin\AppData\Local\Temp\686b40dcb167653cb7a8463928c26af1.exe" /VERYSILENT4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Users\Admin\AppData\Roaming\Sure Cuts A Lot 5\tracegen.exe"C:\Users\Admin\AppData\Roaming\Sure Cuts A Lot 5\tracegen.exe"5⤵
- Executes dropped EXE
PID:620
-
-
C:\Users\Admin\AppData\Roaming\Sure Cuts A Lot 5\PDapp.exe"C:\Users\Admin\AppData\Roaming\Sure Cuts A Lot 5\PDapp.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2852
-
-
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x500 0x4fc1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3448
-
C:\Users\Admin\AppData\Roaming\Sure Cuts A Lot 5\PDapp.exe"C:\Users\Admin\AppData\Roaming\Sure Cuts A Lot 5\PDapp.exe" start1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3784