Analysis
-
max time kernel
180s -
max time network
183s -
platform
windows10-2004_x64 -
resource
win10v2004-20220718-en -
resource tags
arch:x64arch:x86image:win10v2004-20220718-enlocale:en-usos:windows10-2004-x64system -
submitted
20-07-2022 17:50
Static task
static1
Behavioral task
behavioral1
Sample
4e5e3f7429f8c54a7846ceff7c6204e475b811ffebd757cab696414dd209079d.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
4e5e3f7429f8c54a7846ceff7c6204e475b811ffebd757cab696414dd209079d.exe
Resource
win10v2004-20220718-en
General
-
Target
4e5e3f7429f8c54a7846ceff7c6204e475b811ffebd757cab696414dd209079d.exe
-
Size
1.6MB
-
MD5
0ccf64103df597108d163158e56ce5e4
-
SHA1
2072a45a7a1e2f438692ea96e5c7116544ab1045
-
SHA256
4e5e3f7429f8c54a7846ceff7c6204e475b811ffebd757cab696414dd209079d
-
SHA512
a727ed94666575739f981dd3371515809aa1315c25b28163b9b197dff47886b8b8eaf1790bf65c9284deede85569904a28f719c26d83db6093d4c32d63823a1a
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
3owyh.exe3owyh.exe3owyh.exepid process 2184 3owyh.exe 2564 3owyh.exe 1572 3owyh.exe -
Processes:
resource yara_rule behavioral2/memory/2756-135-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/memory/2756-136-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/memory/2756-137-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/memory/2756-138-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/memory/2756-140-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/memory/2756-139-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/memory/1572-149-0x0000000001610000-0x000000000171E000-memory.dmp upx behavioral2/memory/1572-150-0x0000000001610000-0x000000000171E000-memory.dmp upx behavioral2/memory/1572-151-0x0000000001610000-0x000000000171E000-memory.dmp upx behavioral2/memory/1572-155-0x0000000001610000-0x000000000171E000-memory.dmp upx behavioral2/memory/1572-156-0x0000000001610000-0x000000000171E000-memory.dmp upx behavioral2/memory/1572-157-0x0000000001610000-0x000000000171E000-memory.dmp upx behavioral2/memory/1572-158-0x0000000001610000-0x000000000171E000-memory.dmp upx behavioral2/memory/2756-161-0x0000000000400000-0x0000000000424000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
4e5e3f7429f8c54a7846ceff7c6204e475b811ffebd757cab696414dd209079d.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2783062828-828903012-4218294845-1000\Control Panel\International\Geo\Nation 4e5e3f7429f8c54a7846ceff7c6204e475b811ffebd757cab696414dd209079d.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
vbc.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2783062828-828903012-4218294845-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ywEHCl = "C:\\ywEHClywEHCl\\ywEHCl.vbs" vbc.exe Key created \REGISTRY\USER\S-1-5-21-2783062828-828903012-4218294845-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce vbc.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
3owyh.exevbc.exe3owyh.exedescription pid process target process PID 2184 set thread context of 2756 2184 3owyh.exe vbc.exe PID 2756 set thread context of 2564 2756 vbc.exe 3owyh.exe PID 2564 set thread context of 1572 2564 3owyh.exe 3owyh.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 4 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
3owyh.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags 3owyh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 3owyh.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags 3owyh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 3owyh.exe -
Suspicious behavior: EnumeratesProcesses 36 IoCs
Processes:
3owyh.exevbc.exe3owyh.exepid process 2184 3owyh.exe 2184 3owyh.exe 2756 vbc.exe 2756 vbc.exe 2756 vbc.exe 2756 vbc.exe 2756 vbc.exe 2756 vbc.exe 2756 vbc.exe 2756 vbc.exe 2756 vbc.exe 2756 vbc.exe 2756 vbc.exe 2756 vbc.exe 2756 vbc.exe 2756 vbc.exe 2756 vbc.exe 2756 vbc.exe 2756 vbc.exe 2756 vbc.exe 2756 vbc.exe 2756 vbc.exe 2756 vbc.exe 2756 vbc.exe 2756 vbc.exe 2756 vbc.exe 2756 vbc.exe 2756 vbc.exe 1572 3owyh.exe 1572 3owyh.exe 2756 vbc.exe 2756 vbc.exe 2756 vbc.exe 2756 vbc.exe 2756 vbc.exe 2756 vbc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
3owyh.exe3owyh.exepid process 2564 3owyh.exe 1572 3owyh.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
4e5e3f7429f8c54a7846ceff7c6204e475b811ffebd757cab696414dd209079d.exe3owyh.exevbc.exe3owyh.exedescription pid process target process PID 4572 wrote to memory of 2184 4572 4e5e3f7429f8c54a7846ceff7c6204e475b811ffebd757cab696414dd209079d.exe 3owyh.exe PID 4572 wrote to memory of 2184 4572 4e5e3f7429f8c54a7846ceff7c6204e475b811ffebd757cab696414dd209079d.exe 3owyh.exe PID 4572 wrote to memory of 2184 4572 4e5e3f7429f8c54a7846ceff7c6204e475b811ffebd757cab696414dd209079d.exe 3owyh.exe PID 2184 wrote to memory of 2756 2184 3owyh.exe vbc.exe PID 2184 wrote to memory of 2756 2184 3owyh.exe vbc.exe PID 2184 wrote to memory of 2756 2184 3owyh.exe vbc.exe PID 2184 wrote to memory of 2756 2184 3owyh.exe vbc.exe PID 2184 wrote to memory of 2756 2184 3owyh.exe vbc.exe PID 2184 wrote to memory of 2756 2184 3owyh.exe vbc.exe PID 2184 wrote to memory of 2756 2184 3owyh.exe vbc.exe PID 2184 wrote to memory of 2756 2184 3owyh.exe vbc.exe PID 2756 wrote to memory of 2564 2756 vbc.exe 3owyh.exe PID 2756 wrote to memory of 2564 2756 vbc.exe 3owyh.exe PID 2756 wrote to memory of 2564 2756 vbc.exe 3owyh.exe PID 2756 wrote to memory of 2564 2756 vbc.exe 3owyh.exe PID 2756 wrote to memory of 2564 2756 vbc.exe 3owyh.exe PID 2564 wrote to memory of 1572 2564 3owyh.exe 3owyh.exe PID 2564 wrote to memory of 1572 2564 3owyh.exe 3owyh.exe PID 2564 wrote to memory of 1572 2564 3owyh.exe 3owyh.exe PID 2564 wrote to memory of 1572 2564 3owyh.exe 3owyh.exe PID 2564 wrote to memory of 1572 2564 3owyh.exe 3owyh.exe PID 2564 wrote to memory of 1572 2564 3owyh.exe 3owyh.exe PID 2564 wrote to memory of 1572 2564 3owyh.exe 3owyh.exe PID 2564 wrote to memory of 1572 2564 3owyh.exe 3owyh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e5e3f7429f8c54a7846ceff7c6204e475b811ffebd757cab696414dd209079d.exe"C:\Users\Admin\AppData\Local\Temp\4e5e3f7429f8c54a7846ceff7c6204e475b811ffebd757cab696414dd209079d.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Users\Admin\AppData\Roaming\nl38n\3owyh.exe"C:\Users\Admin\AppData\Roaming\nl38n\3owyh.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"3⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Roaming\nl38n\3owyh.exe"C:\Users\Admin\AppData\Roaming\nl38n\3owyh.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Users\Admin\AppData\Roaming\nl38n\3owyh.exeC:\Users\Admin\AppData\Roaming\nl38n\3owyh.exe5⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1572
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD593e00066d099c0485cfffa1359246d26
SHA1bc69a773f37b2f2071e25f755a66d47b871e5d98
SHA2563b271649a94ad5be4ef46ecbb6a4e7363e8498b7e69b751737bf30df2e0d1dde
SHA512d3dfe508cacae7d36f13908134b5b438b87429fcf93ccb060bcfa346c04633a99e9ca497297418c969537be1da2405171982794055dd0f52e59a82720d3b3d02
-
Filesize
3KB
MD50097ffd3c0d7fee5deb04c5503189995
SHA192a5fc2e5e49b721ff98c6869f164c167fd78e07
SHA256b7b9c173d28df1e581f50c2eb321323afdd8bba308ae01fd23402e15b31941f3
SHA512f38ee1af1c752a0c87633f87673818d822d710dd1ed8b6020951c8df59272d8401228d68973f507a193516b1fcc0f5e28bd9bfb7c3fd5c73c7a3f7dae5d3bcda
-
Filesize
1.5MB
MD5543049a58fe847362b15f8e1aee75721
SHA1b22a1f4731c3123ed9af1d3979930775918a462e
SHA25699afe2ac82bc3efc48cd70ec9acab914989e6e60007400629d3001799ccbb5cf
SHA512fdf84f0738e2ec1503ffc557f07dea550ee48647c51a70c6bad2eb4f5e4514b3681a06511a88451f58e2942f084aa3bef79d9cb13b1b6d37af16ec5a35f6e852
-
Filesize
1.5MB
MD5543049a58fe847362b15f8e1aee75721
SHA1b22a1f4731c3123ed9af1d3979930775918a462e
SHA25699afe2ac82bc3efc48cd70ec9acab914989e6e60007400629d3001799ccbb5cf
SHA512fdf84f0738e2ec1503ffc557f07dea550ee48647c51a70c6bad2eb4f5e4514b3681a06511a88451f58e2942f084aa3bef79d9cb13b1b6d37af16ec5a35f6e852
-
Filesize
1.5MB
MD5543049a58fe847362b15f8e1aee75721
SHA1b22a1f4731c3123ed9af1d3979930775918a462e
SHA25699afe2ac82bc3efc48cd70ec9acab914989e6e60007400629d3001799ccbb5cf
SHA512fdf84f0738e2ec1503ffc557f07dea550ee48647c51a70c6bad2eb4f5e4514b3681a06511a88451f58e2942f084aa3bef79d9cb13b1b6d37af16ec5a35f6e852
-
Filesize
1.5MB
MD5543049a58fe847362b15f8e1aee75721
SHA1b22a1f4731c3123ed9af1d3979930775918a462e
SHA25699afe2ac82bc3efc48cd70ec9acab914989e6e60007400629d3001799ccbb5cf
SHA512fdf84f0738e2ec1503ffc557f07dea550ee48647c51a70c6bad2eb4f5e4514b3681a06511a88451f58e2942f084aa3bef79d9cb13b1b6d37af16ec5a35f6e852
-
Filesize
762KB
MD501a807aea39b73d2192b226291491887
SHA18e08cbb41328addc82fab9747685d8689ce61ceb
SHA25608807a623324f15250520002a731eb6c9385a14cdc47821049a2a2b5bac76148
SHA512abb1dc7a415f5e1358013883d2d69c7888109dcca47fab06312848483fdf7fc78366b5ef8dcfc978bafadd55ac8f24d2b5e9109970e072c5199be4d428912c31