Analysis
-
max time kernel
147s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
01-07-2022 14:10
Static task
static1
Behavioral task
behavioral1
Sample
3ddf1da783551e626ba3575748eb8bc9d92424a910e6841a05f15079ae605566.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3ddf1da783551e626ba3575748eb8bc9d92424a910e6841a05f15079ae605566.exe
Resource
win10v2004-20220414-en
General
-
Target
3ddf1da783551e626ba3575748eb8bc9d92424a910e6841a05f15079ae605566.exe
-
Size
1.1MB
-
MD5
67602186447c604718f329e4a75efa30
-
SHA1
da92fac48b831c782fe13704c444518dfab9f43f
-
SHA256
3ddf1da783551e626ba3575748eb8bc9d92424a910e6841a05f15079ae605566
-
SHA512
99bc50931bfd4bedacdef49ed52d3270327d6314e661bafeac4c7099f4a95f1c1c555726769898876fafe0fa1c3303797b1a09604bead0795f297c75ff372590
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
plGbK6.exepid process 4952 plGbK6.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cmd.exeWScript.execmd.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation cmd.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
WScript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows\CurrentVersion\Run WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nPSJHqv7sImdXngC = "C:\\Users\\Admin\\AppData\\Roaming\\WXYT4cfXl0u4ZrGW\\0BBJCMxzSLI7uJFL.lnk" WScript.exe -
Drops file in System32 directory 21 IoCs
Processes:
explorer.exedescription ioc process File created C:\Windows\SysWOW64\IE5BAKEX\AcXtrnal.dll explorer.exe File created C:\Windows\SysWOW64\IE5BAKEX\adsldpc.dll explorer.exe File created C:\Windows\SysWOW64\IE5BAKEX\apds.dll explorer.exe File created C:\Windows\SysWOW64\IE5BAKEX\altspace.dll explorer.exe File created C:\Windows\SysWOW64\IE5BAKEX\accessibilitycpl.dll explorer.exe File created C:\Windows\SysWOW64\IE5BAKEX\AcLayers.dll explorer.exe File created C:\Windows\SysWOW64\IE5BAKEX\AcSpecfc.dll explorer.exe File created C:\Windows\SysWOW64\IE5BAKEX\ActionCenter.dll explorer.exe File created C:\Windows\SysWOW64\IE5BAKEX\acwow64.dll explorer.exe File created C:\Windows\SysWOW64\IE5BAKEX\IE5BAKEX.cmd explorer.exe File opened for modification C:\Windows\SysWOW64\IE5BAKEX\IE5BAKEX.cmd explorer.exe File created C:\Windows\SysWOW64\IE5BAKEX\AboveLockAppHost.dll explorer.exe File created C:\Windows\SysWOW64\IE5BAKEX\aeevts.dll explorer.exe File created C:\Windows\SysWOW64\IE5BAKEX\aepic.dll explorer.exe File created C:\Windows\SysWOW64\IE5BAKEX\Apphlpdm.dll explorer.exe File opened for modification C:\Windows\SysWOW64\IE5BAKEX explorer.exe File opened for modification C:\Windows\SysWOW64\IE5BAKEX\AboveLockAppHost.dll explorer.exe File created C:\Windows\SysWOW64\IE5BAKEX\AccountsRt.dll explorer.exe File created C:\Windows\SysWOW64\IE5BAKEX\acppage.dll explorer.exe File created C:\Windows\SysWOW64\IE5BAKEX\adsldp.dll explorer.exe File created C:\Windows\SysWOW64\IE5BAKEX\advpack.dll explorer.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
plGbK6.exedescription pid process target process PID 4952 set thread context of 1996 4952 plGbK6.exe vbc.exe -
Drops file in Program Files directory 5 IoCs
Processes:
plGbK6.exedescription ioc process File created C:\PROGRA~3\plGbK6.backup plGbK6.exe File opened for modification C:\PROGRA~3\plGbK6.backup plGbK6.exe File created C:\PROGRA~3\plGbK61.backup plGbK6.exe File opened for modification C:\PROGRA~3\plGbK6.vbs plGbK6.exe File opened for modification C:\PROGRA~3\Xhlm7tWi plGbK6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3440 4404 WerFault.exe explorer.exe -
Modifies registry class 2 IoCs
Processes:
cmd.execmd.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
plGbK6.exevbc.exepid process 4952 plGbK6.exe 4952 plGbK6.exe 4952 plGbK6.exe 4952 plGbK6.exe 1996 vbc.exe 1996 vbc.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
vbc.exepid process 1996 vbc.exe -
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
3ddf1da783551e626ba3575748eb8bc9d92424a910e6841a05f15079ae605566.execmd.exeWScript.exeplGbK6.exevbc.execmd.exedescription pid process target process PID 4644 wrote to memory of 4556 4644 3ddf1da783551e626ba3575748eb8bc9d92424a910e6841a05f15079ae605566.exe cmd.exe PID 4644 wrote to memory of 4556 4644 3ddf1da783551e626ba3575748eb8bc9d92424a910e6841a05f15079ae605566.exe cmd.exe PID 4644 wrote to memory of 4556 4644 3ddf1da783551e626ba3575748eb8bc9d92424a910e6841a05f15079ae605566.exe cmd.exe PID 4556 wrote to memory of 4908 4556 cmd.exe WScript.exe PID 4556 wrote to memory of 4908 4556 cmd.exe WScript.exe PID 4556 wrote to memory of 4908 4556 cmd.exe WScript.exe PID 4908 wrote to memory of 4952 4908 WScript.exe plGbK6.exe PID 4908 wrote to memory of 4952 4908 WScript.exe plGbK6.exe PID 4908 wrote to memory of 4952 4908 WScript.exe plGbK6.exe PID 4952 wrote to memory of 1996 4952 plGbK6.exe vbc.exe PID 4952 wrote to memory of 1996 4952 plGbK6.exe vbc.exe PID 4952 wrote to memory of 1996 4952 plGbK6.exe vbc.exe PID 4952 wrote to memory of 1996 4952 plGbK6.exe vbc.exe PID 4952 wrote to memory of 1996 4952 plGbK6.exe vbc.exe PID 4952 wrote to memory of 1996 4952 plGbK6.exe vbc.exe PID 4952 wrote to memory of 1996 4952 plGbK6.exe vbc.exe PID 4952 wrote to memory of 1996 4952 plGbK6.exe vbc.exe PID 4952 wrote to memory of 1996 4952 plGbK6.exe vbc.exe PID 4952 wrote to memory of 3772 4952 plGbK6.exe cmd.exe PID 4952 wrote to memory of 3772 4952 plGbK6.exe cmd.exe PID 4952 wrote to memory of 3772 4952 plGbK6.exe cmd.exe PID 1996 wrote to memory of 4404 1996 vbc.exe explorer.exe PID 1996 wrote to memory of 4404 1996 vbc.exe explorer.exe PID 1996 wrote to memory of 4404 1996 vbc.exe explorer.exe PID 3772 wrote to memory of 4288 3772 cmd.exe WScript.exe PID 3772 wrote to memory of 4288 3772 cmd.exe WScript.exe PID 3772 wrote to memory of 4288 3772 cmd.exe WScript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ddf1da783551e626ba3575748eb8bc9d92424a910e6841a05f15079ae605566.exe"C:\Users\Admin\AppData\Local\Temp\3ddf1da783551e626ba3575748eb8bc9d92424a910e6841a05f15079ae605566.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\plGbK61.vbs2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ProgramData\plGbK61.vbs"3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\ProgramData\plGbK6.exe"C:\ProgramData\plGbK6.exe" C:\ProgramData\plGbK6.au34⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SYSTEM32\explorer.exe6⤵
- Drops file in System32 directory
PID:4404 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4404 -s 8047⤵
- Program crash
PID:3440
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\PROGRA~3\plGbK6.vbs5⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\PROGRA~3\plGbK6.vbs"6⤵
- Adds Run key to start application
PID:4288
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4404 -ip 44041⤵PID:5012
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33B
MD533a6417430acf3de0d63ce51ea379446
SHA11edd015375aafbcfb019fbbff2e5f155fdc56bd0
SHA2564fe93a90b2deab9e438b21127815cefebb8c3686c301b0cb110eb8ac18ec403a
SHA5124f1f28fb96463b82403a43cb559b3a8a27d617864995adeb74b34f2d2856e5a9c11c1f562b28a867859cf7f59bf2b303a6434f27474e8d5e3fb9d3b8acb2faa3
-
Filesize
102B
MD596a5701b8802017f8eb5c0b12f2d6648
SHA1bf2674795d2adaf68b4427ea31c06ea8c28c1341
SHA256080979ee8e1989d94b3da1442ae87c25d9ce888b7358daa5a7fc6ba3db24c72b
SHA512924ad1f07b399f01b7268b01b05d2c33b6087551172f39f7d3e381395e8b7a8036774949076cd4109f3e79a7a72c9bdd137eea38b6695d6a47a2dbe3c9546468
-
Filesize
648B
MD5ee5c36bd87008356db08a36bb6657602
SHA1874c97cce3c010a24e3b8817c34c70c04668b42d
SHA256044ae0c0d26bdaa388ae02cf80c945a7ec542aeb34b0de046f2e1590ff530585
SHA512f0169f74b93f2841fe146b1dedc471606511b3bebcd5c4498270cb7cebdb5e68fc5bcf7dc5036bd18ae3b4bea094fcebe9c5b180b9f58384123ddc61ecd2b370
-
Filesize
34KB
MD5f22becbde3aa82e56d20a475a7122670
SHA1f8eb33dd6cc868176048ee552f16e893c6269649
SHA256036181c87137ebebeb51d1462e615cf21c5b8bd75354dea855c35915ab080a7a
SHA512739c008fc414edb56440796235b78799468b1791592600028ea591345cc4245ba35a67452cd54fb5c40e423c9a22a0280ce194755412a905713737c6ada7b4f9
-
Filesize
83KB
MD5d7ae10e0c6e165746d5b6cd960e11835
SHA19011a7efcccad994025cc49a6d33ea8be3f06177
SHA2567fbb4f71146b85919af9166225cd8d87b314bb867b63ab4a0a785d5be8e71dbe
SHA512e26f2a1b24e963d0129bca6de7b98345923121f19227abb7d3f4998f8fd50bf96d96c4264a50cd52f721b0639af79167704d2b4b905e12b969108cad15952f27
-
Filesize
732KB
MD571d8f6d5dc35517275bc38ebcc815f9f
SHA1cae4e8c730de5a01d30aabeb3e5cb2136090ed8d
SHA256fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b
SHA5124826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59
-
Filesize
732KB
MD571d8f6d5dc35517275bc38ebcc815f9f
SHA1cae4e8c730de5a01d30aabeb3e5cb2136090ed8d
SHA256fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b
SHA5124826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59
-
Filesize
102B
MD5cda398717513da50830b084697723e1d
SHA1fe120f38ddce40e9e5dc7a680df87557337ab948
SHA2563252524e7063782846866933b9bb7f30d24c101279905e8cd78a15348f2a4422
SHA5123dfbf16256cc43df34c2c1df1ef1854c77751abe8dec0795fb80b582c8f8832014ba878af30bc986451f5259667f17bd768184e961ac1c924dd1bf701fd2338e