Analysis
-
max time kernel
30s -
max time network
66s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
24-04-2022 13:12
Static task
static1
Behavioral task
behavioral1
Sample
main.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
main.exe
Resource
win10v2004-20220414-en
General
-
Target
main.exe
-
Size
33.9MB
-
MD5
4d3712c7e5c35bf7ec8a74b171389a4f
-
SHA1
8f1e5ecdafb2ca68ee48b065ecd38f6790dfef3d
-
SHA256
ba591d8b11be9b59dfa8fb5fdc6ba9c9e5f96db4d2be323d7a3cdf9c04f935bb
-
SHA512
31939f394536d8912eed9267b1b09fc65f461c25d5343b6eabeb7638749be36945dd2e907bcd6766a17a83ee285ea1e8afa86fac4fc3a6379837e12c7acf0fbd
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule C:\Windows\SysWOW64\ExtraDll.dll acprotect -
Executes dropped EXE 1 IoCs
Processes:
main.exepid process 2996 main.exe -
Processes:
resource yara_rule C:\Windows\SysWOW64\ExtraDll.dll upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
main.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation main.exe -
Loads dropped DLL 5 IoCs
Processes:
main.exerundll32.exepid process 2996 main.exe 2996 main.exe 2996 main.exe 2468 rundll32.exe 2468 rundll32.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
rundll32.exedescription ioc process File opened for modification \??\PhysicalDrive0 rundll32.exe -
Drops file in System32 directory 7 IoCs
Processes:
main.exerundll32.exedescription ioc process File created C:\Windows\SysWOW64\main.dll main.exe File opened for modification C:\Windows\SysWOW64\main.dll main.exe File created C:\Windows\SysWOW64\ExtraDll.dll rundll32.exe File created C:\Windows\SysWOW64\TerminatorFrame.dll rundll32.exe File created C:\Windows\SysWOW64\a.txt rundll32.exe File created C:\Windows\SysWOW64\del_file.bat rundll32.exe File created C:\Windows\SysWOW64\3.exe rundll32.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Roaming\\hehe.bmp" rundll32.exe -
Drops file in Windows directory 4 IoCs
Processes:
attrib.exemain.exerundll32.exedescription ioc process File opened for modification C:\Windows\GTCY attrib.exe File created C:\Windows\GTCY\main.dll main.exe File created C:\Windows\GTCY\3.exe rundll32.exe File opened for modification C:\Windows\GTCY\3.exe rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies Control Panel 2 IoCs
Processes:
rundll32.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\Desktop\WallpaperStyle = "2" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\Desktop\TileWallpaper = "2" rundll32.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
rundll32.exepid process 2468 rundll32.exe 2468 rundll32.exe 2468 rundll32.exe -
Suspicious use of SetWindowsHookEx 23 IoCs
Processes:
main.exerundll32.exepid process 2996 main.exe 2996 main.exe 2996 main.exe 2996 main.exe 2996 main.exe 2996 main.exe 2996 main.exe 2996 main.exe 2996 main.exe 2996 main.exe 2996 main.exe 2996 main.exe 2996 main.exe 2996 main.exe 2996 main.exe 2996 main.exe 2996 main.exe 2996 main.exe 2996 main.exe 2996 main.exe 2996 main.exe 2996 main.exe 2468 rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
main.execmd.exemain.exerundll32.exedescription pid process target process PID 4084 wrote to memory of 2344 4084 main.exe cmd.exe PID 4084 wrote to memory of 2344 4084 main.exe cmd.exe PID 2344 wrote to memory of 2996 2344 cmd.exe main.exe PID 2344 wrote to memory of 2996 2344 cmd.exe main.exe PID 2344 wrote to memory of 2996 2344 cmd.exe main.exe PID 2996 wrote to memory of 4676 2996 main.exe attrib.exe PID 2996 wrote to memory of 4676 2996 main.exe attrib.exe PID 2996 wrote to memory of 4676 2996 main.exe attrib.exe PID 2996 wrote to memory of 2468 2996 main.exe rundll32.exe PID 2996 wrote to memory of 2468 2996 main.exe rundll32.exe PID 2996 wrote to memory of 2468 2996 main.exe rundll32.exe PID 2468 wrote to memory of 4416 2468 rundll32.exe notepad.exe PID 2468 wrote to memory of 4416 2468 rundll32.exe notepad.exe PID 2468 wrote to memory of 4416 2468 rundll32.exe notepad.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\main.exe"C:\Users\Admin\AppData\Local\Temp\main.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\6508.tmp\6509.tmp\650A.bat C:\Users\Admin\AppData\Local\Temp\main.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\main.exemain.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib C:\Windows\GTCY +S +H4⤵
- Drops file in Windows directory
- Views/modifies file attributes
-
C:\Windows\SysWOW64\rundll32.exerundll32 main.jpg main4⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- Modifies Control Panel
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\notepad.exenotepad.exe a.txt5⤵
-
C:\Windows\SysWOW64\rundll32.exerundll32 TerminatorFrame.dll,ClearSectorAndESP5⤵
-
C:\Windows\system32\rundll32.exerundll32 TerminatorFrame.dll,ClearSectorAndESP6⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s camsvc1⤵
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3a26055 /state1:0x41c64e6d1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\6508.tmp\6509.tmp\650A.batFilesize
42B
MD536ee24058af6f016194737abc855c0ff
SHA170ba47ce52330fe2ccae4a64d8f925486c80d3d2
SHA256e7c36d8464f76e1996089f7ff0768c6918ddca562020d179cf69bf546bdb86d0
SHA512023fa8339b5cc8bb70dff98bf50e7c88abfe13a2854d9d1580cf2b583087bb866b7151e05bc55484c5faed16956022263c5aa94063981199c6c4354c03567570
-
C:\Users\Admin\AppData\Local\Temp\E_N60005\iext.fnrFilesize
204KB
MD5856495a1605bfc7f62086d482b502c6f
SHA186ecc67a784bc69157d664850d489aab64f5f912
SHA2568c8254cb49f7287b97c7f952c81edabc9f11f3fa3f02f265e67d5741998cf0bf
SHA51235a6e580cd362c64f1e1f9c3439660bd980ec437bd8cabbdc49479ceb833cd8cb6c82d2fb747516d5cfcf2af0ba540bc01640171fbe3b4d0e0a3eeeaa69dd1d9
-
C:\Users\Admin\AppData\Local\Temp\E_N60005\iext.fnrFilesize
204KB
MD5856495a1605bfc7f62086d482b502c6f
SHA186ecc67a784bc69157d664850d489aab64f5f912
SHA2568c8254cb49f7287b97c7f952c81edabc9f11f3fa3f02f265e67d5741998cf0bf
SHA51235a6e580cd362c64f1e1f9c3439660bd980ec437bd8cabbdc49479ceb833cd8cb6c82d2fb747516d5cfcf2af0ba540bc01640171fbe3b4d0e0a3eeeaa69dd1d9
-
C:\Users\Admin\AppData\Local\Temp\E_N60005\krnln.fnrFilesize
1.2MB
MD51eece63319e7c5f6718562129b1572f1
SHA1089ea3a605639eb1292f6a2a9720f0b2801b0b6e
SHA2564bed8a6e4e1548fddee40927b438132b47ef2aca6e9beb06b89fcf7714726310
SHA51213537d1dd80fa87b6b908361957e8c434ca547a575c8c8aab43423063e60cb5523fb1843a467ae73db4a64d278c06b831551e78ae6d895201f7ef0c5b162c1ab
-
C:\Users\Admin\AppData\Roaming\main.exeFilesize
35.5MB
MD562c8475d111bc96d1c0cccce7b52fbdd
SHA1826cf3be24354ea803778389bbe225f9794fc296
SHA25642d9cbb0e0ee3c866e5557dfdb85e1157b658f3b481e2606ec43b1562a82019f
SHA5127c98f7d9f750fd251776752ba47e3d5cd3ce957207dee7bf012bc0456d3142c2aeddf55cc0060fbf2f5cb981594aef39d3e939add5013f1eb5aaf44c3a35a3b1
-
C:\Users\Admin\AppData\Roaming\main.exeFilesize
35.5MB
MD562c8475d111bc96d1c0cccce7b52fbdd
SHA1826cf3be24354ea803778389bbe225f9794fc296
SHA25642d9cbb0e0ee3c866e5557dfdb85e1157b658f3b481e2606ec43b1562a82019f
SHA5127c98f7d9f750fd251776752ba47e3d5cd3ce957207dee7bf012bc0456d3142c2aeddf55cc0060fbf2f5cb981594aef39d3e939add5013f1eb5aaf44c3a35a3b1
-
C:\Users\Admin\AppData\Roaming\main.jpgFilesize
34.6MB
MD504fd6752910cf0bdd66ebdc0f3fb996c
SHA1834bb096c2d586cb11f5990e21da46eb9ad224e6
SHA25622dd56f4c54635dd0f1626431e8bdc07b21ef025aadbc96292ddac69497ad425
SHA51268ac226b0ce6e45ec4cd24538bb86779c25cb8e683082a33abf174e5360537f50289a20d626781b725a9760b5f202036c29624253bc250254a3fd650b4fd74ac
-
C:\Users\Admin\AppData\Roaming\main.jpgFilesize
34.6MB
MD504fd6752910cf0bdd66ebdc0f3fb996c
SHA1834bb096c2d586cb11f5990e21da46eb9ad224e6
SHA25622dd56f4c54635dd0f1626431e8bdc07b21ef025aadbc96292ddac69497ad425
SHA51268ac226b0ce6e45ec4cd24538bb86779c25cb8e683082a33abf174e5360537f50289a20d626781b725a9760b5f202036c29624253bc250254a3fd650b4fd74ac
-
C:\Windows\SysWOW64\ExtraDll.dllFilesize
97KB
MD5c35425ad1f0c32225d307310deccc335
SHA1b2e347b244e40ffa113dffaffd1895777e3ac30a
SHA25648773d597155dc39dd172c26867972da89dd61fcee0d138433eda26a2d8633b7
SHA51247b6a7447fcc4f9f21018f608fcbdb5650f16cbd869cae5d4ed5d9b88ca1e944de1cac10e9a252aa7b210f1a31456c0ed91728b8a7e24def99d7e3f9683e2bae
-
C:\Windows\SysWOW64\TerminatorFrame.dllFilesize
124KB
MD52ea1b5c1c3588590459e47f080863d0e
SHA1115ed159f95b569a9ae66dc1ff479fedb35af945
SHA256fc98308900c4b94273b0f61cba62985532605ccd639b1c5767d04dafad1c5602
SHA51240f2bbf514a2e9b2c79bef2c74de546dd1c8e33a74c66c3ee71431df4e22bfba20f0781f06bb0748ea486955dddee07624c6e49b94a0d24e017a37ff80d7f925
-
C:\Windows\SysWOW64\TerminatorFrame.dllFilesize
124KB
MD52ea1b5c1c3588590459e47f080863d0e
SHA1115ed159f95b569a9ae66dc1ff479fedb35af945
SHA256fc98308900c4b94273b0f61cba62985532605ccd639b1c5767d04dafad1c5602
SHA51240f2bbf514a2e9b2c79bef2c74de546dd1c8e33a74c66c3ee71431df4e22bfba20f0781f06bb0748ea486955dddee07624c6e49b94a0d24e017a37ff80d7f925
-
C:\Windows\SysWOW64\TerminatorFrame.dllFilesize
124KB
MD52ea1b5c1c3588590459e47f080863d0e
SHA1115ed159f95b569a9ae66dc1ff479fedb35af945
SHA256fc98308900c4b94273b0f61cba62985532605ccd639b1c5767d04dafad1c5602
SHA51240f2bbf514a2e9b2c79bef2c74de546dd1c8e33a74c66c3ee71431df4e22bfba20f0781f06bb0748ea486955dddee07624c6e49b94a0d24e017a37ff80d7f925
-
C:\Windows\SysWOW64\TerminatorFrame.dllFilesize
124KB
MD52ea1b5c1c3588590459e47f080863d0e
SHA1115ed159f95b569a9ae66dc1ff479fedb35af945
SHA256fc98308900c4b94273b0f61cba62985532605ccd639b1c5767d04dafad1c5602
SHA51240f2bbf514a2e9b2c79bef2c74de546dd1c8e33a74c66c3ee71431df4e22bfba20f0781f06bb0748ea486955dddee07624c6e49b94a0d24e017a37ff80d7f925
-
C:\Windows\SysWOW64\TerminatorFrame.dllFilesize
124KB
MD52ea1b5c1c3588590459e47f080863d0e
SHA1115ed159f95b569a9ae66dc1ff479fedb35af945
SHA256fc98308900c4b94273b0f61cba62985532605ccd639b1c5767d04dafad1c5602
SHA51240f2bbf514a2e9b2c79bef2c74de546dd1c8e33a74c66c3ee71431df4e22bfba20f0781f06bb0748ea486955dddee07624c6e49b94a0d24e017a37ff80d7f925
-
C:\Windows\SysWOW64\TerminatorFrame.dllFilesize
124KB
MD52ea1b5c1c3588590459e47f080863d0e
SHA1115ed159f95b569a9ae66dc1ff479fedb35af945
SHA256fc98308900c4b94273b0f61cba62985532605ccd639b1c5767d04dafad1c5602
SHA51240f2bbf514a2e9b2c79bef2c74de546dd1c8e33a74c66c3ee71431df4e22bfba20f0781f06bb0748ea486955dddee07624c6e49b94a0d24e017a37ff80d7f925
-
C:\Windows\SysWOW64\WinIo32.dllFilesize
44KB
MD53d6d4fc73df2bc1cb980737db7251cdd
SHA10991e15fde440736fa430e4dffd831ee47a0bd88
SHA256bac149f1a558920abe36f93a6e2fe7337f04b0222b86d49296b29a899a795099
SHA512bcb73020fcb1304dfa17ea247be6a43c95f10121c685ae5e4ff4644b456d67618fa38e78b6ffe3c8c9265ca5dba025e8f4ae324e2510f8a14ec1258d41bfb7c3
-
C:\Windows\SysWOW64\WinIo32.dllFilesize
44KB
MD53d6d4fc73df2bc1cb980737db7251cdd
SHA10991e15fde440736fa430e4dffd831ee47a0bd88
SHA256bac149f1a558920abe36f93a6e2fe7337f04b0222b86d49296b29a899a795099
SHA512bcb73020fcb1304dfa17ea247be6a43c95f10121c685ae5e4ff4644b456d67618fa38e78b6ffe3c8c9265ca5dba025e8f4ae324e2510f8a14ec1258d41bfb7c3
-
C:\Windows\SysWOW64\a.txtFilesize
225B
MD5eef729da9ce86bb8729de561fa9fa7c9
SHA1ae172eecb15c595e9a5d79262d79d274afdba06d
SHA25676ee455843a398114437e92714529665a6bf5acc575811232e419cf8076fb9c9
SHA512d46b109021a196987e374253988fd3f1d56586a25fde0898b667a756bf7637c057366fbeebc91533740e3783bed6bc1dcd306192240fe6fd35b853568879f766
-
memory/8-147-0x0000000000000000-mapping.dmp
-
memory/2344-130-0x0000000000000000-mapping.dmp
-
memory/2468-141-0x0000000000000000-mapping.dmp
-
memory/2468-157-0x0000000003000000-0x000000000301E000-memory.dmpFilesize
120KB
-
memory/2996-132-0x0000000000000000-mapping.dmp
-
memory/2996-138-0x0000000004710000-0x0000000004751000-memory.dmpFilesize
260KB
-
memory/3948-153-0x0000000000000000-mapping.dmp
-
memory/4416-145-0x0000000000000000-mapping.dmp
-
memory/4676-140-0x0000000000000000-mapping.dmp