Analysis
-
max time kernel
148s -
max time network
176s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
04-06-2022 17:42
Static task
static1
Behavioral task
behavioral1
Sample
0ed015da8ed67abfc890ba016803bab62273f06be5454a0dc9c2d7a0a5ba3176.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
0ed015da8ed67abfc890ba016803bab62273f06be5454a0dc9c2d7a0a5ba3176.exe
Resource
win10v2004-20220414-en
General
-
Target
0ed015da8ed67abfc890ba016803bab62273f06be5454a0dc9c2d7a0a5ba3176.exe
-
Size
1.6MB
-
MD5
45e68e5bc35e6b0ac6b49dc0fd7717b4
-
SHA1
4c932687c07008e2e1d08cae540fd71fde403add
-
SHA256
0ed015da8ed67abfc890ba016803bab62273f06be5454a0dc9c2d7a0a5ba3176
-
SHA512
aa1c0651aaa1bd8e3b6073e5feb8338203a5d4e1922ba96240576441c94dbf17ee18b9d8e0d134931a5754b81f76df740766e31dfd49a55df601c88c82732d18
Malware Config
Signatures
-
suricata: ET MALWARE W32/Dinwod.Dropper Win32/Xtrat.B CnC Beacon
suricata: ET MALWARE W32/Dinwod.Dropper Win32/Xtrat.B CnC Beacon
-
Executes dropped EXE 3 IoCs
Processes:
2pz5x.exe2pz5x.exe2pz5x.exepid process 1048 2pz5x.exe 1064 2pz5x.exe 1836 2pz5x.exe -
Processes:
resource yara_rule behavioral1/memory/2032-65-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/2032-67-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/2032-68-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/2032-70-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/2032-72-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/2032-74-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/2032-75-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/2032-76-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/2032-77-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/2032-93-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/1836-96-0x0000000001610000-0x000000000171E000-memory.dmp upx behavioral1/memory/1836-99-0x0000000001610000-0x000000000171E000-memory.dmp upx behavioral1/memory/1836-102-0x0000000001610000-0x000000000171E000-memory.dmp upx behavioral1/memory/1836-106-0x0000000001610000-0x000000000171E000-memory.dmp upx behavioral1/memory/1836-109-0x0000000001610000-0x000000000171E000-memory.dmp upx behavioral1/memory/1836-111-0x0000000001610000-0x000000000171E000-memory.dmp upx behavioral1/memory/1836-113-0x0000000001610000-0x000000000171E000-memory.dmp upx behavioral1/memory/1836-112-0x0000000001610000-0x000000000171E000-memory.dmp upx behavioral1/memory/2032-118-0x0000000000400000-0x0000000000424000-memory.dmp upx -
Loads dropped DLL 7 IoCs
Processes:
0ed015da8ed67abfc890ba016803bab62273f06be5454a0dc9c2d7a0a5ba3176.exevbc.exe2pz5x.exepid process 904 0ed015da8ed67abfc890ba016803bab62273f06be5454a0dc9c2d7a0a5ba3176.exe 904 0ed015da8ed67abfc890ba016803bab62273f06be5454a0dc9c2d7a0a5ba3176.exe 904 0ed015da8ed67abfc890ba016803bab62273f06be5454a0dc9c2d7a0a5ba3176.exe 904 0ed015da8ed67abfc890ba016803bab62273f06be5454a0dc9c2d7a0a5ba3176.exe 2032 vbc.exe 2032 vbc.exe 1064 2pz5x.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
vbc.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce vbc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\NmPNLR = "C:\\NmPNLRNmPNLR\\NmPNLR.vbs" vbc.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
2pz5x.exevbc.exe2pz5x.exedescription pid process target process PID 1048 set thread context of 2032 1048 2pz5x.exe vbc.exe PID 2032 set thread context of 1064 2032 vbc.exe 2pz5x.exe PID 1064 set thread context of 1836 1064 2pz5x.exe 2pz5x.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 19 IoCs
Processes:
2pz5x.exevbc.exe2pz5x.exepid process 1048 2pz5x.exe 1048 2pz5x.exe 2032 vbc.exe 2032 vbc.exe 2032 vbc.exe 2032 vbc.exe 2032 vbc.exe 2032 vbc.exe 2032 vbc.exe 2032 vbc.exe 2032 vbc.exe 2032 vbc.exe 2032 vbc.exe 2032 vbc.exe 2032 vbc.exe 2032 vbc.exe 2032 vbc.exe 1836 2pz5x.exe 2032 vbc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
2pz5x.exe2pz5x.exepid process 1064 2pz5x.exe 1836 2pz5x.exe -
Suspicious use of WriteProcessMemory 38 IoCs
Processes:
0ed015da8ed67abfc890ba016803bab62273f06be5454a0dc9c2d7a0a5ba3176.exe2pz5x.exevbc.exe2pz5x.exedescription pid process target process PID 904 wrote to memory of 1048 904 0ed015da8ed67abfc890ba016803bab62273f06be5454a0dc9c2d7a0a5ba3176.exe 2pz5x.exe PID 904 wrote to memory of 1048 904 0ed015da8ed67abfc890ba016803bab62273f06be5454a0dc9c2d7a0a5ba3176.exe 2pz5x.exe PID 904 wrote to memory of 1048 904 0ed015da8ed67abfc890ba016803bab62273f06be5454a0dc9c2d7a0a5ba3176.exe 2pz5x.exe PID 904 wrote to memory of 1048 904 0ed015da8ed67abfc890ba016803bab62273f06be5454a0dc9c2d7a0a5ba3176.exe 2pz5x.exe PID 904 wrote to memory of 1048 904 0ed015da8ed67abfc890ba016803bab62273f06be5454a0dc9c2d7a0a5ba3176.exe 2pz5x.exe PID 904 wrote to memory of 1048 904 0ed015da8ed67abfc890ba016803bab62273f06be5454a0dc9c2d7a0a5ba3176.exe 2pz5x.exe PID 904 wrote to memory of 1048 904 0ed015da8ed67abfc890ba016803bab62273f06be5454a0dc9c2d7a0a5ba3176.exe 2pz5x.exe PID 1048 wrote to memory of 2032 1048 2pz5x.exe vbc.exe PID 1048 wrote to memory of 2032 1048 2pz5x.exe vbc.exe PID 1048 wrote to memory of 2032 1048 2pz5x.exe vbc.exe PID 1048 wrote to memory of 2032 1048 2pz5x.exe vbc.exe PID 1048 wrote to memory of 2032 1048 2pz5x.exe vbc.exe PID 1048 wrote to memory of 2032 1048 2pz5x.exe vbc.exe PID 1048 wrote to memory of 2032 1048 2pz5x.exe vbc.exe PID 1048 wrote to memory of 2032 1048 2pz5x.exe vbc.exe PID 1048 wrote to memory of 2032 1048 2pz5x.exe vbc.exe PID 1048 wrote to memory of 2032 1048 2pz5x.exe vbc.exe PID 1048 wrote to memory of 2032 1048 2pz5x.exe vbc.exe PID 2032 wrote to memory of 1064 2032 vbc.exe 2pz5x.exe PID 2032 wrote to memory of 1064 2032 vbc.exe 2pz5x.exe PID 2032 wrote to memory of 1064 2032 vbc.exe 2pz5x.exe PID 2032 wrote to memory of 1064 2032 vbc.exe 2pz5x.exe PID 2032 wrote to memory of 1064 2032 vbc.exe 2pz5x.exe PID 2032 wrote to memory of 1064 2032 vbc.exe 2pz5x.exe PID 2032 wrote to memory of 1064 2032 vbc.exe 2pz5x.exe PID 2032 wrote to memory of 1064 2032 vbc.exe 2pz5x.exe PID 2032 wrote to memory of 1064 2032 vbc.exe 2pz5x.exe PID 1064 wrote to memory of 1836 1064 2pz5x.exe 2pz5x.exe PID 1064 wrote to memory of 1836 1064 2pz5x.exe 2pz5x.exe PID 1064 wrote to memory of 1836 1064 2pz5x.exe 2pz5x.exe PID 1064 wrote to memory of 1836 1064 2pz5x.exe 2pz5x.exe PID 1064 wrote to memory of 1836 1064 2pz5x.exe 2pz5x.exe PID 1064 wrote to memory of 1836 1064 2pz5x.exe 2pz5x.exe PID 1064 wrote to memory of 1836 1064 2pz5x.exe 2pz5x.exe PID 1064 wrote to memory of 1836 1064 2pz5x.exe 2pz5x.exe PID 1064 wrote to memory of 1836 1064 2pz5x.exe 2pz5x.exe PID 1064 wrote to memory of 1836 1064 2pz5x.exe 2pz5x.exe PID 1064 wrote to memory of 1836 1064 2pz5x.exe 2pz5x.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ed015da8ed67abfc890ba016803bab62273f06be5454a0dc9c2d7a0a5ba3176.exe"C:\Users\Admin\AppData\Local\Temp\0ed015da8ed67abfc890ba016803bab62273f06be5454a0dc9c2d7a0a5ba3176.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Users\Admin\AppData\Roaming\en4yq\2pz5x.exe"C:\Users\Admin\AppData\Roaming\en4yq\2pz5x.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"3⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Roaming\en4yq\2pz5x.exe"C:\Users\Admin\AppData\Roaming\en4yq\2pz5x.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Users\Admin\AppData\Roaming\en4yq\2pz5x.exeC:\Users\Admin\AppData\Roaming\en4yq\2pz5x.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1836
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD593e00066d099c0485cfffa1359246d26
SHA1bc69a773f37b2f2071e25f755a66d47b871e5d98
SHA2563b271649a94ad5be4ef46ecbb6a4e7363e8498b7e69b751737bf30df2e0d1dde
SHA512d3dfe508cacae7d36f13908134b5b438b87429fcf93ccb060bcfa346c04633a99e9ca497297418c969537be1da2405171982794055dd0f52e59a82720d3b3d02
-
Filesize
3KB
MD50097ffd3c0d7fee5deb04c5503189995
SHA192a5fc2e5e49b721ff98c6869f164c167fd78e07
SHA256b7b9c173d28df1e581f50c2eb321323afdd8bba308ae01fd23402e15b31941f3
SHA512f38ee1af1c752a0c87633f87673818d822d710dd1ed8b6020951c8df59272d8401228d68973f507a193516b1fcc0f5e28bd9bfb7c3fd5c73c7a3f7dae5d3bcda
-
Filesize
1.5MB
MD5543049a58fe847362b15f8e1aee75721
SHA1b22a1f4731c3123ed9af1d3979930775918a462e
SHA25699afe2ac82bc3efc48cd70ec9acab914989e6e60007400629d3001799ccbb5cf
SHA512fdf84f0738e2ec1503ffc557f07dea550ee48647c51a70c6bad2eb4f5e4514b3681a06511a88451f58e2942f084aa3bef79d9cb13b1b6d37af16ec5a35f6e852
-
Filesize
1.5MB
MD5543049a58fe847362b15f8e1aee75721
SHA1b22a1f4731c3123ed9af1d3979930775918a462e
SHA25699afe2ac82bc3efc48cd70ec9acab914989e6e60007400629d3001799ccbb5cf
SHA512fdf84f0738e2ec1503ffc557f07dea550ee48647c51a70c6bad2eb4f5e4514b3681a06511a88451f58e2942f084aa3bef79d9cb13b1b6d37af16ec5a35f6e852
-
Filesize
1.5MB
MD5543049a58fe847362b15f8e1aee75721
SHA1b22a1f4731c3123ed9af1d3979930775918a462e
SHA25699afe2ac82bc3efc48cd70ec9acab914989e6e60007400629d3001799ccbb5cf
SHA512fdf84f0738e2ec1503ffc557f07dea550ee48647c51a70c6bad2eb4f5e4514b3681a06511a88451f58e2942f084aa3bef79d9cb13b1b6d37af16ec5a35f6e852
-
Filesize
1.5MB
MD5543049a58fe847362b15f8e1aee75721
SHA1b22a1f4731c3123ed9af1d3979930775918a462e
SHA25699afe2ac82bc3efc48cd70ec9acab914989e6e60007400629d3001799ccbb5cf
SHA512fdf84f0738e2ec1503ffc557f07dea550ee48647c51a70c6bad2eb4f5e4514b3681a06511a88451f58e2942f084aa3bef79d9cb13b1b6d37af16ec5a35f6e852
-
Filesize
762KB
MD5574f3976617f60eff49a38b8a952fa2a
SHA1d4f09569044080b749c9cb017af1689ab15a679c
SHA2567437cbc2caaec2ff59c2fc428ea40fb6f9ebbec4c31aff5dbfa49c1d93b046a3
SHA5127854390bba70c8d6fa790c1ff18cdeca53cd998615577ce8f08fa92f66c2e741c9cefacb4d7c42c58952dca640b50429cf1e741bf9be14d4b5c0bc546d555270
-
Filesize
1.5MB
MD5543049a58fe847362b15f8e1aee75721
SHA1b22a1f4731c3123ed9af1d3979930775918a462e
SHA25699afe2ac82bc3efc48cd70ec9acab914989e6e60007400629d3001799ccbb5cf
SHA512fdf84f0738e2ec1503ffc557f07dea550ee48647c51a70c6bad2eb4f5e4514b3681a06511a88451f58e2942f084aa3bef79d9cb13b1b6d37af16ec5a35f6e852
-
Filesize
1.5MB
MD5543049a58fe847362b15f8e1aee75721
SHA1b22a1f4731c3123ed9af1d3979930775918a462e
SHA25699afe2ac82bc3efc48cd70ec9acab914989e6e60007400629d3001799ccbb5cf
SHA512fdf84f0738e2ec1503ffc557f07dea550ee48647c51a70c6bad2eb4f5e4514b3681a06511a88451f58e2942f084aa3bef79d9cb13b1b6d37af16ec5a35f6e852
-
Filesize
1.5MB
MD5543049a58fe847362b15f8e1aee75721
SHA1b22a1f4731c3123ed9af1d3979930775918a462e
SHA25699afe2ac82bc3efc48cd70ec9acab914989e6e60007400629d3001799ccbb5cf
SHA512fdf84f0738e2ec1503ffc557f07dea550ee48647c51a70c6bad2eb4f5e4514b3681a06511a88451f58e2942f084aa3bef79d9cb13b1b6d37af16ec5a35f6e852
-
Filesize
1.5MB
MD5543049a58fe847362b15f8e1aee75721
SHA1b22a1f4731c3123ed9af1d3979930775918a462e
SHA25699afe2ac82bc3efc48cd70ec9acab914989e6e60007400629d3001799ccbb5cf
SHA512fdf84f0738e2ec1503ffc557f07dea550ee48647c51a70c6bad2eb4f5e4514b3681a06511a88451f58e2942f084aa3bef79d9cb13b1b6d37af16ec5a35f6e852
-
Filesize
1.5MB
MD5543049a58fe847362b15f8e1aee75721
SHA1b22a1f4731c3123ed9af1d3979930775918a462e
SHA25699afe2ac82bc3efc48cd70ec9acab914989e6e60007400629d3001799ccbb5cf
SHA512fdf84f0738e2ec1503ffc557f07dea550ee48647c51a70c6bad2eb4f5e4514b3681a06511a88451f58e2942f084aa3bef79d9cb13b1b6d37af16ec5a35f6e852
-
Filesize
1.5MB
MD5543049a58fe847362b15f8e1aee75721
SHA1b22a1f4731c3123ed9af1d3979930775918a462e
SHA25699afe2ac82bc3efc48cd70ec9acab914989e6e60007400629d3001799ccbb5cf
SHA512fdf84f0738e2ec1503ffc557f07dea550ee48647c51a70c6bad2eb4f5e4514b3681a06511a88451f58e2942f084aa3bef79d9cb13b1b6d37af16ec5a35f6e852
-
Filesize
1.5MB
MD5543049a58fe847362b15f8e1aee75721
SHA1b22a1f4731c3123ed9af1d3979930775918a462e
SHA25699afe2ac82bc3efc48cd70ec9acab914989e6e60007400629d3001799ccbb5cf
SHA512fdf84f0738e2ec1503ffc557f07dea550ee48647c51a70c6bad2eb4f5e4514b3681a06511a88451f58e2942f084aa3bef79d9cb13b1b6d37af16ec5a35f6e852