Analysis
-
max time kernel
91s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20220718-en -
resource tags
arch:x64arch:x86image:win10v2004-20220718-enlocale:en-usos:windows10-2004-x64system -
submitted
20-07-2022 15:36
Static task
static1
Behavioral task
behavioral1
Sample
4f115913a68ae3d442205bf35920d2b8431bd7a3995a72a648b682fdd783efd1.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
4f115913a68ae3d442205bf35920d2b8431bd7a3995a72a648b682fdd783efd1.exe
Resource
win10v2004-20220718-en
General
-
Target
4f115913a68ae3d442205bf35920d2b8431bd7a3995a72a648b682fdd783efd1.exe
-
Size
191KB
-
MD5
08bc0f08cbe773666ae684ed81c1763c
-
SHA1
6ef5d42a110a6746d23fe001f2762f31d43c391f
-
SHA256
4f115913a68ae3d442205bf35920d2b8431bd7a3995a72a648b682fdd783efd1
-
SHA512
029e25bdff3b4cd61e98ec37a82b2d1d31eb7b4d03dd467e05f4eacb9e52a73189f2755b0b6906f1b811b0a78c38ddb15e6ced05cb47bd870814f15ef7b6ed17
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
Processes:
4f115913a68ae3d442205bf35920d2b8431bd7a3995a72a648b682fdd783efd1.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts 4f115913a68ae3d442205bf35920d2b8431bd7a3995a72a648b682fdd783efd1.exe -
Executes dropped EXE 1 IoCs
Processes:
dplaysvr.exepid process 4472 dplaysvr.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
4f115913a68ae3d442205bf35920d2b8431bd7a3995a72a648b682fdd783efd1.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1178428168-2939480073-3055857545-1000\Control Panel\International\Geo\Nation 4f115913a68ae3d442205bf35920d2b8431bd7a3995a72a648b682fdd783efd1.exe -
Loads dropped DLL 1 IoCs
Processes:
dplaysvr.exepid process 4472 dplaysvr.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
4f115913a68ae3d442205bf35920d2b8431bd7a3995a72a648b682fdd783efd1.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\dplaysvr = "C:\\Users\\Admin\\AppData\\Local\\dplaysvr.exe" 4f115913a68ae3d442205bf35920d2b8431bd7a3995a72a648b682fdd783efd1.exe Key created \REGISTRY\USER\S-1-5-21-1178428168-2939480073-3055857545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ 4f115913a68ae3d442205bf35920d2b8431bd7a3995a72a648b682fdd783efd1.exe Set value (str) \REGISTRY\USER\S-1-5-21-1178428168-2939480073-3055857545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dplaysvr = "C:\\Users\\Admin\\AppData\\Local\\dplaysvr.exe" 4f115913a68ae3d442205bf35920d2b8431bd7a3995a72a648b682fdd783efd1.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ 4f115913a68ae3d442205bf35920d2b8431bd7a3995a72a648b682fdd783efd1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
4f115913a68ae3d442205bf35920d2b8431bd7a3995a72a648b682fdd783efd1.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 4f115913a68ae3d442205bf35920d2b8431bd7a3995a72a648b682fdd783efd1.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
dplaysvr.exepid process 4472 dplaysvr.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
4f115913a68ae3d442205bf35920d2b8431bd7a3995a72a648b682fdd783efd1.exedescription pid process target process PID 3516 wrote to memory of 4472 3516 4f115913a68ae3d442205bf35920d2b8431bd7a3995a72a648b682fdd783efd1.exe dplaysvr.exe PID 3516 wrote to memory of 4472 3516 4f115913a68ae3d442205bf35920d2b8431bd7a3995a72a648b682fdd783efd1.exe dplaysvr.exe PID 3516 wrote to memory of 4472 3516 4f115913a68ae3d442205bf35920d2b8431bd7a3995a72a648b682fdd783efd1.exe dplaysvr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f115913a68ae3d442205bf35920d2b8431bd7a3995a72a648b682fdd783efd1.exe"C:\Users\Admin\AppData\Local\Temp\4f115913a68ae3d442205bf35920d2b8431bd7a3995a72a648b682fdd783efd1.exe"1⤵
- Drops file in Drivers directory
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Users\Admin\AppData\Local\dplaysvr.exe"C:\Users\Admin\AppData\Local\dplaysvr.exe" C:\Users\Admin\AppData\Local\Temp\4f115913a68ae3d442205bf35920d2b8431bd7a3995a72a648b682fdd783efd1.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4472
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}1⤵PID:1892
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
77KB
MD51ba3e906a6012b5abf2750b445d7f30a
SHA1a2c6ef8aa49c8c2549eadf1d41d0b39850d4a09e
SHA2569fd947eebbd6c83b4d94c39f017a5366ccfef9d6bd2dee41b86ae81a09022d02
SHA512ef69e5abf1445a4d9135d23236c39a149681f5b86b745ff8d7d0041eddc31e90464b2fb1611e2e57c009afe64b004cae0466794c806b2a0b4eb5d52b1afa2c2e
-
Filesize
121KB
MD500fa7a4b8b0daf60f5935b34d7325ce3
SHA10988e042f7df078ac386c3ae1c70ffccda4025a3
SHA25645eb8a8e170e06673bc60be26f9c66509d7af934923e4a643234313ec3dc540b
SHA5123af0d3031bdf7773ab1b0615f45993c4f3e30a405496f4f59c1b4ac4e16ec207e62e54630b314e29963bdb69fedbe71364983f278c2389cf0679d70464448404
-
Filesize
77KB
MD51ba3e906a6012b5abf2750b445d7f30a
SHA1a2c6ef8aa49c8c2549eadf1d41d0b39850d4a09e
SHA2569fd947eebbd6c83b4d94c39f017a5366ccfef9d6bd2dee41b86ae81a09022d02
SHA512ef69e5abf1445a4d9135d23236c39a149681f5b86b745ff8d7d0041eddc31e90464b2fb1611e2e57c009afe64b004cae0466794c806b2a0b4eb5d52b1afa2c2e
-
Filesize
77KB
MD51ba3e906a6012b5abf2750b445d7f30a
SHA1a2c6ef8aa49c8c2549eadf1d41d0b39850d4a09e
SHA2569fd947eebbd6c83b4d94c39f017a5366ccfef9d6bd2dee41b86ae81a09022d02
SHA512ef69e5abf1445a4d9135d23236c39a149681f5b86b745ff8d7d0041eddc31e90464b2fb1611e2e57c009afe64b004cae0466794c806b2a0b4eb5d52b1afa2c2e
-
Filesize
121KB
MD500fa7a4b8b0daf60f5935b34d7325ce3
SHA10988e042f7df078ac386c3ae1c70ffccda4025a3
SHA25645eb8a8e170e06673bc60be26f9c66509d7af934923e4a643234313ec3dc540b
SHA5123af0d3031bdf7773ab1b0615f45993c4f3e30a405496f4f59c1b4ac4e16ec207e62e54630b314e29963bdb69fedbe71364983f278c2389cf0679d70464448404
-
Filesize
121KB
MD500fa7a4b8b0daf60f5935b34d7325ce3
SHA10988e042f7df078ac386c3ae1c70ffccda4025a3
SHA25645eb8a8e170e06673bc60be26f9c66509d7af934923e4a643234313ec3dc540b
SHA5123af0d3031bdf7773ab1b0615f45993c4f3e30a405496f4f59c1b4ac4e16ec207e62e54630b314e29963bdb69fedbe71364983f278c2389cf0679d70464448404