Analysis
-
max time kernel
142s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
29-03-2022 18:48
Static task
static1
Behavioral task
behavioral1
Sample
0ffc68fbcfbbe41a6953e4fec099c7082c8fa733273dadd0c197a600be6db5e8.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
0ffc68fbcfbbe41a6953e4fec099c7082c8fa733273dadd0c197a600be6db5e8.exe
Resource
win10v2004-en-20220113
General
-
Target
0ffc68fbcfbbe41a6953e4fec099c7082c8fa733273dadd0c197a600be6db5e8.exe
-
Size
125KB
-
MD5
1672081c9a9a80b4f2f31e311958fa2c
-
SHA1
def154edfe4cb8465677ed3fd9fffe506a307caf
-
SHA256
0ffc68fbcfbbe41a6953e4fec099c7082c8fa733273dadd0c197a600be6db5e8
-
SHA512
ca292e87ec1b297e0e9bf5f8f270e67a13e20b78c0784fc80da421ba039a89104fe7792bc771acd024f48381979688febeffe65cfbbd1e19b52df768b04a50ca
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
igfxTy.exepid process 2072 igfxTy.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
0ffc68fbcfbbe41a6953e4fec099c7082c8fa733273dadd0c197a600be6db5e8.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation 0ffc68fbcfbbe41a6953e4fec099c7082c8fa733273dadd0c197a600be6db5e8.exe -
Drops startup file 1 IoCs
Processes:
vbc.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\igfxTry.exe vbc.exe -
Uses the VBS compiler for execution 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
0ffc68fbcfbbe41a6953e4fec099c7082c8fa733273dadd0c197a600be6db5e8.exeigfxTy.exedescription pid process Token: SeDebugPrivilege 1268 0ffc68fbcfbbe41a6953e4fec099c7082c8fa733273dadd0c197a600be6db5e8.exe Token: SeDebugPrivilege 2072 igfxTy.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
0ffc68fbcfbbe41a6953e4fec099c7082c8fa733273dadd0c197a600be6db5e8.exeigfxTy.exevbc.exedescription pid process target process PID 1268 wrote to memory of 2072 1268 0ffc68fbcfbbe41a6953e4fec099c7082c8fa733273dadd0c197a600be6db5e8.exe igfxTy.exe PID 1268 wrote to memory of 2072 1268 0ffc68fbcfbbe41a6953e4fec099c7082c8fa733273dadd0c197a600be6db5e8.exe igfxTy.exe PID 2072 wrote to memory of 3548 2072 igfxTy.exe vbc.exe PID 2072 wrote to memory of 3548 2072 igfxTy.exe vbc.exe PID 3548 wrote to memory of 3112 3548 vbc.exe cvtres.exe PID 3548 wrote to memory of 3112 3548 vbc.exe cvtres.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ffc68fbcfbbe41a6953e4fec099c7082c8fa733273dadd0c197a600be6db5e8.exe"C:\Users\Admin\AppData\Local\Temp\0ffc68fbcfbbe41a6953e4fec099c7082c8fa733273dadd0c197a600be6db5e8.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Roaming\igfxTy.exe"C:\Users\Admin\AppData\Roaming\igfxTy.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ook35q2j\ook35q2j.cmdline"3⤵
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES5F98.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc2B36169BE62D4B739DD7C36AB7EBB361.TMP"4⤵PID:3112
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\RES5F98.tmpFilesize
1KB
MD5adba8068f0845acf0014d0d3168ee88a
SHA1571722b975773acb6e9717970fea3f00ba2b2df8
SHA256a91e1fffe36f5c9b2a7debf531150e9ea129783a30b0e351087de567e45ad2f7
SHA512ca6a4658d2c024bfd97743412aa56fff78d37b2444858d01f29e778dbe2ba4ffd09701767d9f701a74a8f472141e950fc226d14f2a1111f7f5bc4f2d8543d6ca
-
C:\Users\Admin\AppData\Local\Temp\ook35q2j\ook35q2j.0.vbFilesize
150B
MD5de1cb7931f167cba871c26b1b87cfc57
SHA1d0b314bb3c956581507b9e77e5ba79ce1a66f83b
SHA25645210f7fb5d10fc4f290fb955c01155b5f06afd25032ac659441ecfc77eaaa63
SHA5129b0701087661f8e1873a57f06b7b730331439b4ff8e5aa71023e41fec2642b766b27c703ebdaafd268963e4c1f0a832989bad9f5e14e7f38acd5ed4a8bb4e474
-
C:\Users\Admin\AppData\Local\Temp\ook35q2j\ook35q2j.cmdlineFilesize
204B
MD5c328b75cd35fa47813874b4fa347bc8c
SHA1ed55e1d3b6cb1869475718b990bd67e61e22e040
SHA256c6e5adf6f131c955c5d5abd8efa80276f8ad0320713098c52d8e3ffd3be3f89e
SHA51257a5d3fe6ae3522b5da97ba5fb6cfaf7de4dac6e7ab7ce31814841ffdd8fcc91a07afce7eb667539f9d72eadc41d3da5f7d9b37b7da820a502e1e0615c88e178
-
C:\Users\Admin\AppData\Local\Temp\vbc2B36169BE62D4B739DD7C36AB7EBB361.TMPFilesize
1KB
MD504602bf0a81f601887f55a9fabcfb1bf
SHA1bb2dd4f4f6f5e8e9fafac6ad6a030c89bdc80817
SHA2566725a8648301a9a9a40eda6b7ce2bdbaa908117bebe3f847792a76eaea15c334
SHA512fdf211ac6a7830a6f067e387ad0ec382ae30d4cff09322365a26236654678b57317cf96beb2037f45886e66fd82a09925d92edc3d67c649992a510597578703b
-
C:\Users\Admin\AppData\Roaming\igfxTy.exeFilesize
125KB
MD51672081c9a9a80b4f2f31e311958fa2c
SHA1def154edfe4cb8465677ed3fd9fffe506a307caf
SHA2560ffc68fbcfbbe41a6953e4fec099c7082c8fa733273dadd0c197a600be6db5e8
SHA512ca292e87ec1b297e0e9bf5f8f270e67a13e20b78c0784fc80da421ba039a89104fe7792bc771acd024f48381979688febeffe65cfbbd1e19b52df768b04a50ca
-
C:\Users\Admin\AppData\Roaming\igfxTy.exeFilesize
125KB
MD51672081c9a9a80b4f2f31e311958fa2c
SHA1def154edfe4cb8465677ed3fd9fffe506a307caf
SHA2560ffc68fbcfbbe41a6953e4fec099c7082c8fa733273dadd0c197a600be6db5e8
SHA512ca292e87ec1b297e0e9bf5f8f270e67a13e20b78c0784fc80da421ba039a89104fe7792bc771acd024f48381979688febeffe65cfbbd1e19b52df768b04a50ca
-
memory/1268-131-0x00007FFE89630000-0x00007FFE8A0F1000-memory.dmpFilesize
10.8MB
-
memory/1268-132-0x000000001B6A0000-0x000000001B6A2000-memory.dmpFilesize
8KB
-
memory/1268-130-0x0000000000160000-0x0000000000186000-memory.dmpFilesize
152KB
-
memory/2072-133-0x0000000000000000-mapping.dmp
-
memory/2072-136-0x00007FFE89630000-0x00007FFE8A0F1000-memory.dmpFilesize
10.8MB
-
memory/2072-137-0x0000000001580000-0x0000000001582000-memory.dmpFilesize
8KB
-
memory/3112-141-0x0000000000000000-mapping.dmp
-
memory/3548-138-0x0000000000000000-mapping.dmp