Analysis
-
max time kernel
131s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
24-05-2022 14:56
Static task
static1
Behavioral task
behavioral1
Sample
31302655af916d773479844df1a3565aeb86de8ef1f23310e888bd436a16bba4.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
31302655af916d773479844df1a3565aeb86de8ef1f23310e888bd436a16bba4.exe
Resource
win10v2004-20220414-en
General
-
Target
31302655af916d773479844df1a3565aeb86de8ef1f23310e888bd436a16bba4.exe
-
Size
534KB
-
MD5
9873d96e49ac54a35710a82cda6d002a
-
SHA1
0f8f5675ffbbc73489dcda0580455557f6d12dc7
-
SHA256
31302655af916d773479844df1a3565aeb86de8ef1f23310e888bd436a16bba4
-
SHA512
bdca9a62d296a41c85bef949d293cb4f597a64699e9c12869f6c25116e8330d7b2313578d27e763aafaff86f32cdba8a6c6428665dec778209bc5017fc6ace97
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
MBRWRWIN.EXEpid process 4904 MBRWRWIN.EXE -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
31302655af916d773479844df1a3565aeb86de8ef1f23310e888bd436a16bba4.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation 31302655af916d773479844df1a3565aeb86de8ef1f23310e888bd436a16bba4.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
MBRWRWIN.EXEdescription ioc process File opened for modification \??\PHYSICALDRIVE0 MBRWRWIN.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
31302655af916d773479844df1a3565aeb86de8ef1f23310e888bd436a16bba4.execmd.exedescription pid process target process PID 4072 wrote to memory of 2644 4072 31302655af916d773479844df1a3565aeb86de8ef1f23310e888bd436a16bba4.exe cmd.exe PID 4072 wrote to memory of 2644 4072 31302655af916d773479844df1a3565aeb86de8ef1f23310e888bd436a16bba4.exe cmd.exe PID 4072 wrote to memory of 2644 4072 31302655af916d773479844df1a3565aeb86de8ef1f23310e888bd436a16bba4.exe cmd.exe PID 2644 wrote to memory of 4904 2644 cmd.exe MBRWRWIN.EXE PID 2644 wrote to memory of 4904 2644 cmd.exe MBRWRWIN.EXE PID 2644 wrote to memory of 4904 2644 cmd.exe MBRWRWIN.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\31302655af916d773479844df1a3565aeb86de8ef1f23310e888bd436a16bba4.exe"C:\Users\Admin\AppData\Local\Temp\31302655af916d773479844df1a3565aeb86de8ef1f23310e888bd436a16bba4.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\temp\mbrw7.cmd" "2⤵
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\temp\MBRWRWIN.EXEC:\temp\mbrwrwin install overwrite C:\temp\rtmbr2.bin3⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:4904
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD58e01acb653132551547539c991f6b6f3
SHA1334c96df03dba68b16ee8680e5592ef5e16a0531
SHA256a21e6621a5ce7180e5ba8a98686ee5a3d5ef4d54c84e34992a725cc2fe7c4b46
SHA512edb7f1ffe772ff11ece5409a01b9bab295d6d0141162c09f19ae4ccc70c84fa67b98a3f40a5ae15aec4b01c439431d6849aaacfb218402e3fa5d351f7f8e37f8
-
Filesize
68KB
MD58e01acb653132551547539c991f6b6f3
SHA1334c96df03dba68b16ee8680e5592ef5e16a0531
SHA256a21e6621a5ce7180e5ba8a98686ee5a3d5ef4d54c84e34992a725cc2fe7c4b46
SHA512edb7f1ffe772ff11ece5409a01b9bab295d6d0141162c09f19ae4ccc70c84fa67b98a3f40a5ae15aec4b01c439431d6849aaacfb218402e3fa5d351f7f8e37f8
-
Filesize
431B
MD5fea96be7347f35cef12adeb79c14f376
SHA11282409cbcb6072422c67da84ac5701770e4547f
SHA2565190558ac981b1754b8f51f32fa8ed826821dbff0655825bba6ff5114f6a8043
SHA512a9e49436aa4c4602a1bb39a32cc64b0e91a1c9359fb7e9b0a94b77cc6733f0109b7dfd8661ed35052106825ce4186e90abd41356462f9b34e2ff8704627896cc
-
Filesize
512B
MD5a2300a68bb40d2be206ede2f3b8f938e
SHA199d40599c4cbb615700513b63a3845d5a38ce525
SHA256395fb8d48eef4bcecf59678fb37f9c8629c8eb146d6769209a853411fbc4a241
SHA512c1613e81d4630ae8733c7409cc2793319d41d333a3ce16ab4f4cffeb746167a8930220c102f9824a8b1fb90d6a0aa0fe56323acf841b0db5fd0ff5c5790ed734