Analysis
-
max time kernel
152s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
25-06-2022 10:32
Static task
static1
Behavioral task
behavioral1
Sample
396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.exe
Resource
win7-20220414-en
General
-
Target
396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.exe
-
Size
1.9MB
-
MD5
20b489eaf040e049a47c082170acc9b8
-
SHA1
185eabfdd755f94c8eaa80baed99b5a4e06b3ca2
-
SHA256
396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875
-
SHA512
1af4b40a3572aa0fdbd4c8b8cd974d0bff85d5c99203057e09abe222f24fce7e160d2155b8ec3b697bdd2efb65d1701a658c8d0f485ed0461af5a852561a6f3f
Malware Config
Extracted
socelars
http://www.zhxxjs.pw/Info/
http://www.allinfo.pw/
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.tmpDiskScan.exepid process 4980 396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.tmp 4928 DiskScan.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.tmpdescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation 396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.tmp -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5080 4928 WerFault.exe DiskScan.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.tmppid process 4980 396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.tmp 4980 396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.tmppid process 4980 396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.tmp -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.exe396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.tmpdescription pid process target process PID 4228 wrote to memory of 4980 4228 396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.exe 396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.tmp PID 4228 wrote to memory of 4980 4228 396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.exe 396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.tmp PID 4228 wrote to memory of 4980 4228 396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.exe 396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.tmp PID 4980 wrote to memory of 4928 4980 396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.tmp DiskScan.exe PID 4980 wrote to memory of 4928 4980 396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.tmp DiskScan.exe PID 4980 wrote to memory of 4928 4980 396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.tmp DiskScan.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.exe"C:\Users\Admin\AppData\Local\Temp\396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-4JLJ4.tmp\396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.tmp"C:\Users\Admin\AppData\Local\Temp\is-4JLJ4.tmp\396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.tmp" /SL5="$901CE,1244772,784384,C:\Users\Admin\AppData\Local\Temp\396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\DiskProtect190001\DiskScan.exe"C:\Users\Admin\AppData\Local\Temp\DiskProtect190001\DiskScan.exe"3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4928 -s 12124⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4928 -ip 49281⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\DiskProtect190001\DiskScan.exeFilesize
1.1MB
MD546d380dc43a98463afcdf562f55416bd
SHA1c92edab2128908f8c86f6ed6e971db4b8b2aa77d
SHA256f28d5f9277e2c0ee3cdee500666991e02dc8040e4790ab3d837dcf3b432ca4cc
SHA5126736239217beb91b257954ccd1d170a596fcf3a06cf40b99133f18519e5713310113a5d21aded0f78392f1565b544b63c977e17f861101e9640074049195e100
-
C:\Users\Admin\AppData\Local\Temp\DiskProtect190001\DiskScan.exeFilesize
1.1MB
MD546d380dc43a98463afcdf562f55416bd
SHA1c92edab2128908f8c86f6ed6e971db4b8b2aa77d
SHA256f28d5f9277e2c0ee3cdee500666991e02dc8040e4790ab3d837dcf3b432ca4cc
SHA5126736239217beb91b257954ccd1d170a596fcf3a06cf40b99133f18519e5713310113a5d21aded0f78392f1565b544b63c977e17f861101e9640074049195e100
-
C:\Users\Admin\AppData\Local\Temp\is-4JLJ4.tmp\396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.tmpFilesize
2.5MB
MD55f28081693a97336a2d7df877044fcde
SHA19d710db6c618906d9b2e355bb8b2e0b5ab014bad
SHA2565751a4c9713b058ba5cd757c405865702bee0926d5086efbaa4add627984362d
SHA51248a8f91d57456409d82e8c5277a494e44e6d71d315cf1d5cfe9bea0ad8797d20a587d2fa7a123cbc4439eb74e6411f7d39743ddf4780abf3826cc7072276fb2f
-
C:\Users\Admin\AppData\Local\Temp\is-4JLJ4.tmp\396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.tmpFilesize
2.5MB
MD55f28081693a97336a2d7df877044fcde
SHA19d710db6c618906d9b2e355bb8b2e0b5ab014bad
SHA2565751a4c9713b058ba5cd757c405865702bee0926d5086efbaa4add627984362d
SHA51248a8f91d57456409d82e8c5277a494e44e6d71d315cf1d5cfe9bea0ad8797d20a587d2fa7a123cbc4439eb74e6411f7d39743ddf4780abf3826cc7072276fb2f
-
memory/4228-130-0x0000000000400000-0x00000000004CD000-memory.dmpFilesize
820KB
-
memory/4228-134-0x0000000000400000-0x00000000004CD000-memory.dmpFilesize
820KB
-
memory/4228-139-0x0000000000400000-0x00000000004CD000-memory.dmpFilesize
820KB
-
memory/4228-140-0x0000000000400000-0x00000000004CD000-memory.dmpFilesize
820KB
-
memory/4928-136-0x0000000000000000-mapping.dmp
-
memory/4980-132-0x0000000000000000-mapping.dmp