Analysis

  • max time kernel
    96s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    24-05-2022 21:29

General

  • Target

    bbedadea5939a3485a101a7aa0acc28b9295f492741c2b9edff8672b755c0af1.exe

  • Size

    3.2MB

  • MD5

    c52f5ca43480573ed5d4b5366fad2be0

  • SHA1

    b3bec5af80d4f81f823a339229a6f4d5059498b7

  • SHA256

    bbedadea5939a3485a101a7aa0acc28b9295f492741c2b9edff8672b755c0af1

  • SHA512

    1a57f394f1399da752592972a45790db00afdaed4b5e0d0e3f0ac371bb23a7706ad87849198ad57263ce4f67c1496a737eb333427f87d0e0c562387f1fa0f096

Malware Config

Signatures

  • ASPack v2.12-2.42 2 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 1 IoCs
  • Unexpected DNS network traffic destination 30 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bbedadea5939a3485a101a7aa0acc28b9295f492741c2b9edff8672b755c0af1.exe
    "C:\Users\Admin\AppData\Local\Temp\bbedadea5939a3485a101a7aa0acc28b9295f492741c2b9edff8672b755c0af1.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4628
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4628 -s 556
      2⤵
      • Program crash
      PID:5008
    • \??\c:\Éñ;\bihustc.exe
      "c:\Éñ;\bihustc.exe" MOV 4628 C:\Users\Admin\AppData\Local\Temp\bbedadea5939a3485a101a7aa0acc28b9295f492741c2b9edff8672b755c0af1.exe
      2⤵
      • Executes dropped EXE
      • Writes to the Master Boot Record (MBR)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:1992
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1992 -s 556
        3⤵
        • Program crash
        PID:1296
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4628 -ip 4628
    1⤵
      PID:4500
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1992 -ip 1992
      1⤵
        PID:340

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Éñ;\±Ú»¢Éñ;C.lnk
        MD5

        d41d8cd98f00b204e9800998ecf8427e

        SHA1

        da39a3ee5e6b4b0d3255bfef95601890afd80709

        SHA256

        e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

        SHA512

        cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

      • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Éñ;\жÔرڻ¢Éñ;C.lnk
        Filesize

        639B

        MD5

        0ddd1443fa162626d761f1ada8605f5d

        SHA1

        c07044e5e3042ea33dc20852844c870fecaaae55

        SHA256

        d33368d625624615c40c7446e2dac4e98c2707928e5a45b7dbb0c4e80a3983eb

        SHA512

        381c39179f599b6beb996167f3edf04ae596fd6ff821bf2e32ff736d22e617ae074d07400705fa1687767d7eabd8c4bebef1b4f0ed7d41c69dade1b60b4b8caf

      • C:\Users\Public\Desktop\±Ú»¢Éñ;C.lnk
        Filesize

        377B

        MD5

        aa00db81bc6104ef448a9fd00279748e

        SHA1

        59512bc8020e06ab7c0a8cf0b2629e805c649b70

        SHA256

        7f6c69913ee77adcafd90a37827c62a4213d71ce986c625bd3de9d278bc32d81

        SHA512

        b974a88cc2588fae720c58a4f55639532886b1579f0d2f223833a0e85c5d3f845e685769650145f9c78c0d668bbb585a4934187b82e7a5122a08dcf17799bbd0

      • C:\Éñ;\bihustc.exe
        Filesize

        3.2MB

        MD5

        c52f5ca43480573ed5d4b5366fad2be0

        SHA1

        b3bec5af80d4f81f823a339229a6f4d5059498b7

        SHA256

        bbedadea5939a3485a101a7aa0acc28b9295f492741c2b9edff8672b755c0af1

        SHA512

        1a57f394f1399da752592972a45790db00afdaed4b5e0d0e3f0ac371bb23a7706ad87849198ad57263ce4f67c1496a737eb333427f87d0e0c562387f1fa0f096

      • \??\c:\Éñ;\DownloadTemp\LoginServerList.xml
        Filesize

        7KB

        MD5

        c39b6868c3dfdd813db1804d71d1b4ca

        SHA1

        ecd4dc6be0e4919adcd0370b4062fa3a840a576f

        SHA256

        055a8abebe2f2fc6bd9cf2d87bdcfcffdbf3c6563cddabb09840a4d126e361f6

        SHA512

        13beaa0edbe24f0c5a73b45be6c43e65b54f07443d8e234908e5fb06d7d24485c6a5d89366b15398dfd065fbc072c35957d2c635068ebc227707237b4f8effa7

      • \??\c:\Éñ;\DownloadTemp\mtdl_OEMSVRLIST0_tmp.dat
        Filesize

        7KB

        MD5

        c39b6868c3dfdd813db1804d71d1b4ca

        SHA1

        ecd4dc6be0e4919adcd0370b4062fa3a840a576f

        SHA256

        055a8abebe2f2fc6bd9cf2d87bdcfcffdbf3c6563cddabb09840a4d126e361f6

        SHA512

        13beaa0edbe24f0c5a73b45be6c43e65b54f07443d8e234908e5fb06d7d24485c6a5d89366b15398dfd065fbc072c35957d2c635068ebc227707237b4f8effa7

      • \??\c:\Éñ;\DownloadTemp\mtdl_OEMSVRLIST1_tmp.dat
        Filesize

        7KB

        MD5

        c39b6868c3dfdd813db1804d71d1b4ca

        SHA1

        ecd4dc6be0e4919adcd0370b4062fa3a840a576f

        SHA256

        055a8abebe2f2fc6bd9cf2d87bdcfcffdbf3c6563cddabb09840a4d126e361f6

        SHA512

        13beaa0edbe24f0c5a73b45be6c43e65b54f07443d8e234908e5fb06d7d24485c6a5d89366b15398dfd065fbc072c35957d2c635068ebc227707237b4f8effa7

      • \??\c:\Éñ;\DownloadTemp\mtdl_OEMSVRLIST4_tmp.dat
        Filesize

        7KB

        MD5

        c39b6868c3dfdd813db1804d71d1b4ca

        SHA1

        ecd4dc6be0e4919adcd0370b4062fa3a840a576f

        SHA256

        055a8abebe2f2fc6bd9cf2d87bdcfcffdbf3c6563cddabb09840a4d126e361f6

        SHA512

        13beaa0edbe24f0c5a73b45be6c43e65b54f07443d8e234908e5fb06d7d24485c6a5d89366b15398dfd065fbc072c35957d2c635068ebc227707237b4f8effa7

      • \??\c:\Éñ;\Setting\GameStartSetting.xml
        Filesize

        1KB

        MD5

        cb675e6b2f7085ba2af2b1c17fc0b4f0

        SHA1

        df50a8be72652acf399e1c50ac1fcce019c6ade5

        SHA256

        b59c9bc5f35ca2e747a5a67267ee3c467b3319262e9f51219e537f09562fcc65

        SHA512

        85e72a0554ff70d0233249bf4dd8509585ded52c4a6348fb6aa3144e2a14fc7750a65354e4614e917d8c7e9e483d1705ea674867fe09dc114e17f8a79054a6bb

      • \??\c:\Éñ;\bihustc.exe
        Filesize

        3.2MB

        MD5

        c52f5ca43480573ed5d4b5366fad2be0

        SHA1

        b3bec5af80d4f81f823a339229a6f4d5059498b7

        SHA256

        bbedadea5939a3485a101a7aa0acc28b9295f492741c2b9edff8672b755c0af1

        SHA512

        1a57f394f1399da752592972a45790db00afdaed4b5e0d0e3f0ac371bb23a7706ad87849198ad57263ce4f67c1496a737eb333427f87d0e0c562387f1fa0f096

      • memory/1992-139-0x0000000000400000-0x00000000008BB000-memory.dmp
        Filesize

        4.7MB

      • memory/1992-138-0x0000000000400000-0x00000000008BB000-memory.dmp
        Filesize

        4.7MB

      • memory/1992-137-0x0000000000400000-0x00000000008BB000-memory.dmp
        Filesize

        4.7MB

      • memory/1992-133-0x0000000000000000-mapping.dmp
      • memory/1992-148-0x0000000000400000-0x00000000008BB000-memory.dmp
        Filesize

        4.7MB

      • memory/4628-136-0x0000000000400000-0x00000000008BB000-memory.dmp
        Filesize

        4.7MB

      • memory/4628-130-0x0000000000400000-0x00000000008BB000-memory.dmp
        Filesize

        4.7MB

      • memory/4628-132-0x0000000000400000-0x00000000008BB000-memory.dmp
        Filesize

        4.7MB

      • memory/4628-131-0x0000000000400000-0x00000000008BB000-memory.dmp
        Filesize

        4.7MB