Analysis
-
max time kernel
190s -
max time network
217s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
04-06-2022 17:42
Static task
static1
Behavioral task
behavioral1
Sample
0ed015da8ed67abfc890ba016803bab62273f06be5454a0dc9c2d7a0a5ba3176.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
0ed015da8ed67abfc890ba016803bab62273f06be5454a0dc9c2d7a0a5ba3176.exe
Resource
win10v2004-20220414-en
General
-
Target
0ed015da8ed67abfc890ba016803bab62273f06be5454a0dc9c2d7a0a5ba3176.exe
-
Size
1.6MB
-
MD5
45e68e5bc35e6b0ac6b49dc0fd7717b4
-
SHA1
4c932687c07008e2e1d08cae540fd71fde403add
-
SHA256
0ed015da8ed67abfc890ba016803bab62273f06be5454a0dc9c2d7a0a5ba3176
-
SHA512
aa1c0651aaa1bd8e3b6073e5feb8338203a5d4e1922ba96240576441c94dbf17ee18b9d8e0d134931a5754b81f76df740766e31dfd49a55df601c88c82732d18
Malware Config
Signatures
-
suricata: ET MALWARE W32/Dinwod.Dropper Win32/Xtrat.B CnC Beacon
suricata: ET MALWARE W32/Dinwod.Dropper Win32/Xtrat.B CnC Beacon
-
Executes dropped EXE 3 IoCs
Processes:
2pz5x.exe2pz5x.exe2pz5x.exepid process 2132 2pz5x.exe 216 2pz5x.exe 3944 2pz5x.exe -
Processes:
resource yara_rule behavioral2/memory/868-135-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/memory/868-136-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/memory/868-137-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/memory/868-138-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/memory/868-139-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/memory/3944-151-0x0000000001610000-0x000000000171E000-memory.dmp upx behavioral2/memory/3944-152-0x0000000001610000-0x000000000171E000-memory.dmp upx behavioral2/memory/3944-153-0x0000000001610000-0x000000000171E000-memory.dmp upx behavioral2/memory/3944-157-0x0000000001610000-0x000000000171E000-memory.dmp upx behavioral2/memory/3944-158-0x0000000001610000-0x000000000171E000-memory.dmp upx behavioral2/memory/3944-159-0x0000000001610000-0x000000000171E000-memory.dmp upx behavioral2/memory/3944-160-0x0000000001610000-0x000000000171E000-memory.dmp upx behavioral2/memory/868-163-0x0000000000400000-0x0000000000424000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
0ed015da8ed67abfc890ba016803bab62273f06be5454a0dc9c2d7a0a5ba3176.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation 0ed015da8ed67abfc890ba016803bab62273f06be5454a0dc9c2d7a0a5ba3176.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
vbc.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce vbc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\NmPNLR = "C:\\NmPNLRNmPNLR\\NmPNLR.vbs" vbc.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
2pz5x.exevbc.exe2pz5x.exedescription pid process target process PID 2132 set thread context of 868 2132 2pz5x.exe vbc.exe PID 868 set thread context of 216 868 vbc.exe 2pz5x.exe PID 216 set thread context of 3944 216 2pz5x.exe 2pz5x.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 4 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
2pz5x.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags 2pz5x.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 2pz5x.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags 2pz5x.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 2pz5x.exe -
Suspicious behavior: EnumeratesProcesses 36 IoCs
Processes:
2pz5x.exevbc.exe2pz5x.exepid process 2132 2pz5x.exe 2132 2pz5x.exe 868 vbc.exe 868 vbc.exe 868 vbc.exe 868 vbc.exe 868 vbc.exe 868 vbc.exe 868 vbc.exe 868 vbc.exe 868 vbc.exe 868 vbc.exe 868 vbc.exe 868 vbc.exe 868 vbc.exe 868 vbc.exe 868 vbc.exe 868 vbc.exe 868 vbc.exe 868 vbc.exe 868 vbc.exe 868 vbc.exe 868 vbc.exe 868 vbc.exe 868 vbc.exe 868 vbc.exe 868 vbc.exe 868 vbc.exe 868 vbc.exe 868 vbc.exe 868 vbc.exe 868 vbc.exe 868 vbc.exe 868 vbc.exe 3944 2pz5x.exe 3944 2pz5x.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
2pz5x.exe2pz5x.exepid process 216 2pz5x.exe 3944 2pz5x.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
0ed015da8ed67abfc890ba016803bab62273f06be5454a0dc9c2d7a0a5ba3176.exe2pz5x.exevbc.exe2pz5x.exedescription pid process target process PID 3320 wrote to memory of 2132 3320 0ed015da8ed67abfc890ba016803bab62273f06be5454a0dc9c2d7a0a5ba3176.exe 2pz5x.exe PID 3320 wrote to memory of 2132 3320 0ed015da8ed67abfc890ba016803bab62273f06be5454a0dc9c2d7a0a5ba3176.exe 2pz5x.exe PID 3320 wrote to memory of 2132 3320 0ed015da8ed67abfc890ba016803bab62273f06be5454a0dc9c2d7a0a5ba3176.exe 2pz5x.exe PID 2132 wrote to memory of 868 2132 2pz5x.exe vbc.exe PID 2132 wrote to memory of 868 2132 2pz5x.exe vbc.exe PID 2132 wrote to memory of 868 2132 2pz5x.exe vbc.exe PID 2132 wrote to memory of 868 2132 2pz5x.exe vbc.exe PID 2132 wrote to memory of 868 2132 2pz5x.exe vbc.exe PID 2132 wrote to memory of 868 2132 2pz5x.exe vbc.exe PID 2132 wrote to memory of 868 2132 2pz5x.exe vbc.exe PID 2132 wrote to memory of 868 2132 2pz5x.exe vbc.exe PID 868 wrote to memory of 216 868 vbc.exe 2pz5x.exe PID 868 wrote to memory of 216 868 vbc.exe 2pz5x.exe PID 868 wrote to memory of 216 868 vbc.exe 2pz5x.exe PID 868 wrote to memory of 216 868 vbc.exe 2pz5x.exe PID 868 wrote to memory of 216 868 vbc.exe 2pz5x.exe PID 216 wrote to memory of 3944 216 2pz5x.exe 2pz5x.exe PID 216 wrote to memory of 3944 216 2pz5x.exe 2pz5x.exe PID 216 wrote to memory of 3944 216 2pz5x.exe 2pz5x.exe PID 216 wrote to memory of 3944 216 2pz5x.exe 2pz5x.exe PID 216 wrote to memory of 3944 216 2pz5x.exe 2pz5x.exe PID 216 wrote to memory of 3944 216 2pz5x.exe 2pz5x.exe PID 216 wrote to memory of 3944 216 2pz5x.exe 2pz5x.exe PID 216 wrote to memory of 3944 216 2pz5x.exe 2pz5x.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ed015da8ed67abfc890ba016803bab62273f06be5454a0dc9c2d7a0a5ba3176.exe"C:\Users\Admin\AppData\Local\Temp\0ed015da8ed67abfc890ba016803bab62273f06be5454a0dc9c2d7a0a5ba3176.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Users\Admin\AppData\Roaming\en4yq\2pz5x.exe"C:\Users\Admin\AppData\Roaming\en4yq\2pz5x.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"3⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Users\Admin\AppData\Roaming\en4yq\2pz5x.exe"C:\Users\Admin\AppData\Roaming\en4yq\2pz5x.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Users\Admin\AppData\Roaming\en4yq\2pz5x.exeC:\Users\Admin\AppData\Roaming\en4yq\2pz5x.exe5⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3944
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD593e00066d099c0485cfffa1359246d26
SHA1bc69a773f37b2f2071e25f755a66d47b871e5d98
SHA2563b271649a94ad5be4ef46ecbb6a4e7363e8498b7e69b751737bf30df2e0d1dde
SHA512d3dfe508cacae7d36f13908134b5b438b87429fcf93ccb060bcfa346c04633a99e9ca497297418c969537be1da2405171982794055dd0f52e59a82720d3b3d02
-
Filesize
3KB
MD50097ffd3c0d7fee5deb04c5503189995
SHA192a5fc2e5e49b721ff98c6869f164c167fd78e07
SHA256b7b9c173d28df1e581f50c2eb321323afdd8bba308ae01fd23402e15b31941f3
SHA512f38ee1af1c752a0c87633f87673818d822d710dd1ed8b6020951c8df59272d8401228d68973f507a193516b1fcc0f5e28bd9bfb7c3fd5c73c7a3f7dae5d3bcda
-
Filesize
1.5MB
MD5543049a58fe847362b15f8e1aee75721
SHA1b22a1f4731c3123ed9af1d3979930775918a462e
SHA25699afe2ac82bc3efc48cd70ec9acab914989e6e60007400629d3001799ccbb5cf
SHA512fdf84f0738e2ec1503ffc557f07dea550ee48647c51a70c6bad2eb4f5e4514b3681a06511a88451f58e2942f084aa3bef79d9cb13b1b6d37af16ec5a35f6e852
-
Filesize
1.5MB
MD5543049a58fe847362b15f8e1aee75721
SHA1b22a1f4731c3123ed9af1d3979930775918a462e
SHA25699afe2ac82bc3efc48cd70ec9acab914989e6e60007400629d3001799ccbb5cf
SHA512fdf84f0738e2ec1503ffc557f07dea550ee48647c51a70c6bad2eb4f5e4514b3681a06511a88451f58e2942f084aa3bef79d9cb13b1b6d37af16ec5a35f6e852
-
Filesize
1.5MB
MD5543049a58fe847362b15f8e1aee75721
SHA1b22a1f4731c3123ed9af1d3979930775918a462e
SHA25699afe2ac82bc3efc48cd70ec9acab914989e6e60007400629d3001799ccbb5cf
SHA512fdf84f0738e2ec1503ffc557f07dea550ee48647c51a70c6bad2eb4f5e4514b3681a06511a88451f58e2942f084aa3bef79d9cb13b1b6d37af16ec5a35f6e852
-
Filesize
1.5MB
MD5543049a58fe847362b15f8e1aee75721
SHA1b22a1f4731c3123ed9af1d3979930775918a462e
SHA25699afe2ac82bc3efc48cd70ec9acab914989e6e60007400629d3001799ccbb5cf
SHA512fdf84f0738e2ec1503ffc557f07dea550ee48647c51a70c6bad2eb4f5e4514b3681a06511a88451f58e2942f084aa3bef79d9cb13b1b6d37af16ec5a35f6e852
-
Filesize
762KB
MD5574f3976617f60eff49a38b8a952fa2a
SHA1d4f09569044080b749c9cb017af1689ab15a679c
SHA2567437cbc2caaec2ff59c2fc428ea40fb6f9ebbec4c31aff5dbfa49c1d93b046a3
SHA5127854390bba70c8d6fa790c1ff18cdeca53cd998615577ce8f08fa92f66c2e741c9cefacb4d7c42c58952dca640b50429cf1e741bf9be14d4b5c0bc546d555270