Analysis
-
max time kernel
123s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20220722-en -
resource tags
arch:x64arch:x86image:win10v2004-20220722-enlocale:en-usos:windows10-2004-x64system -
submitted
24-07-2022 02:25
Static task
static1
Behavioral task
behavioral1
Sample
59ebbdf21f80732ee51d8c038fca9306470341d1260751b05626a72a9513a1f0.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
59ebbdf21f80732ee51d8c038fca9306470341d1260751b05626a72a9513a1f0.exe
Resource
win10v2004-20220722-en
General
-
Target
59ebbdf21f80732ee51d8c038fca9306470341d1260751b05626a72a9513a1f0.exe
-
Size
1.6MB
-
MD5
8ba75de55191a7b284c87450d7ec168e
-
SHA1
e8c1481d0a26713f92ef785b8fd998fdd87198c6
-
SHA256
59ebbdf21f80732ee51d8c038fca9306470341d1260751b05626a72a9513a1f0
-
SHA512
1af991aa7a4ec227ab38df95a0f8a0ef1ab6cd84dd7100718de088e00cd8f4e3d545d3dd4ee40e619f246edf7ec23e6c44b195e57242536c11e22aff6799731d
Malware Config
Signatures
-
suricata: ET MALWARE W32/Dinwod.Dropper Win32/Xtrat.B CnC Beacon
suricata: ET MALWARE W32/Dinwod.Dropper Win32/Xtrat.B CnC Beacon
-
Executes dropped EXE 3 IoCs
pid Process 2296 o67oo.exe 1028 o67oo.exe 4896 o67oo.exe -
resource yara_rule behavioral2/memory/5000-137-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/memory/5000-138-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/memory/5000-139-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/memory/5000-140-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/memory/5000-141-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/memory/4896-150-0x0000000001610000-0x000000000171E000-memory.dmp upx behavioral2/memory/4896-151-0x0000000001610000-0x000000000171E000-memory.dmp upx behavioral2/memory/4896-152-0x0000000001610000-0x000000000171E000-memory.dmp upx behavioral2/memory/4896-156-0x0000000001610000-0x000000000171E000-memory.dmp upx behavioral2/memory/4896-157-0x0000000001610000-0x000000000171E000-memory.dmp upx behavioral2/memory/5000-158-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/memory/4896-160-0x0000000001610000-0x000000000171E000-memory.dmp upx behavioral2/memory/4896-159-0x0000000001610000-0x000000000171E000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000\Control Panel\International\Geo\Nation 59ebbdf21f80732ee51d8c038fca9306470341d1260751b05626a72a9513a1f0.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce vbc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ZqshSX = "C:\\ZqshSXZqshSX\\ZqshSX.vbs" vbc.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2296 set thread context of 5000 2296 o67oo.exe 77 PID 5000 set thread context of 1028 5000 vbc.exe 78 PID 1028 set thread context of 4896 1028 o67oo.exe 79 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 8 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom o67oo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 o67oo.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags o67oo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 o67oo.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags o67oo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 o67oo.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom o67oo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 o67oo.exe -
Suspicious behavior: EnumeratesProcesses 36 IoCs
pid Process 2296 o67oo.exe 2296 o67oo.exe 5000 vbc.exe 5000 vbc.exe 5000 vbc.exe 5000 vbc.exe 5000 vbc.exe 5000 vbc.exe 5000 vbc.exe 5000 vbc.exe 5000 vbc.exe 5000 vbc.exe 5000 vbc.exe 5000 vbc.exe 5000 vbc.exe 5000 vbc.exe 5000 vbc.exe 5000 vbc.exe 5000 vbc.exe 5000 vbc.exe 5000 vbc.exe 5000 vbc.exe 5000 vbc.exe 5000 vbc.exe 5000 vbc.exe 5000 vbc.exe 5000 vbc.exe 5000 vbc.exe 5000 vbc.exe 5000 vbc.exe 5000 vbc.exe 5000 vbc.exe 5000 vbc.exe 5000 vbc.exe 4896 o67oo.exe 4896 o67oo.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1028 o67oo.exe 4896 o67oo.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 4364 wrote to memory of 2296 4364 59ebbdf21f80732ee51d8c038fca9306470341d1260751b05626a72a9513a1f0.exe 75 PID 4364 wrote to memory of 2296 4364 59ebbdf21f80732ee51d8c038fca9306470341d1260751b05626a72a9513a1f0.exe 75 PID 4364 wrote to memory of 2296 4364 59ebbdf21f80732ee51d8c038fca9306470341d1260751b05626a72a9513a1f0.exe 75 PID 2296 wrote to memory of 5000 2296 o67oo.exe 77 PID 2296 wrote to memory of 5000 2296 o67oo.exe 77 PID 2296 wrote to memory of 5000 2296 o67oo.exe 77 PID 2296 wrote to memory of 5000 2296 o67oo.exe 77 PID 2296 wrote to memory of 5000 2296 o67oo.exe 77 PID 2296 wrote to memory of 5000 2296 o67oo.exe 77 PID 2296 wrote to memory of 5000 2296 o67oo.exe 77 PID 2296 wrote to memory of 5000 2296 o67oo.exe 77 PID 5000 wrote to memory of 1028 5000 vbc.exe 78 PID 5000 wrote to memory of 1028 5000 vbc.exe 78 PID 5000 wrote to memory of 1028 5000 vbc.exe 78 PID 5000 wrote to memory of 1028 5000 vbc.exe 78 PID 5000 wrote to memory of 1028 5000 vbc.exe 78 PID 1028 wrote to memory of 4896 1028 o67oo.exe 79 PID 1028 wrote to memory of 4896 1028 o67oo.exe 79 PID 1028 wrote to memory of 4896 1028 o67oo.exe 79 PID 1028 wrote to memory of 4896 1028 o67oo.exe 79 PID 1028 wrote to memory of 4896 1028 o67oo.exe 79 PID 1028 wrote to memory of 4896 1028 o67oo.exe 79 PID 1028 wrote to memory of 4896 1028 o67oo.exe 79 PID 1028 wrote to memory of 4896 1028 o67oo.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\59ebbdf21f80732ee51d8c038fca9306470341d1260751b05626a72a9513a1f0.exe"C:\Users\Admin\AppData\Local\Temp\59ebbdf21f80732ee51d8c038fca9306470341d1260751b05626a72a9513a1f0.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Users\Admin\AppData\Roaming\4xmlu\o67oo.exe"C:\Users\Admin\AppData\Roaming\4xmlu\o67oo.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"3⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Users\Admin\AppData\Roaming\4xmlu\o67oo.exe"C:\Users\Admin\AppData\Roaming\4xmlu\o67oo.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Users\Admin\AppData\Roaming\4xmlu\o67oo.exeC:\Users\Admin\AppData\Roaming\4xmlu\o67oo.exe5⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4896
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5543049a58fe847362b15f8e1aee75721
SHA1b22a1f4731c3123ed9af1d3979930775918a462e
SHA25699afe2ac82bc3efc48cd70ec9acab914989e6e60007400629d3001799ccbb5cf
SHA512fdf84f0738e2ec1503ffc557f07dea550ee48647c51a70c6bad2eb4f5e4514b3681a06511a88451f58e2942f084aa3bef79d9cb13b1b6d37af16ec5a35f6e852
-
Filesize
1.5MB
MD5543049a58fe847362b15f8e1aee75721
SHA1b22a1f4731c3123ed9af1d3979930775918a462e
SHA25699afe2ac82bc3efc48cd70ec9acab914989e6e60007400629d3001799ccbb5cf
SHA512fdf84f0738e2ec1503ffc557f07dea550ee48647c51a70c6bad2eb4f5e4514b3681a06511a88451f58e2942f084aa3bef79d9cb13b1b6d37af16ec5a35f6e852
-
Filesize
1.5MB
MD5543049a58fe847362b15f8e1aee75721
SHA1b22a1f4731c3123ed9af1d3979930775918a462e
SHA25699afe2ac82bc3efc48cd70ec9acab914989e6e60007400629d3001799ccbb5cf
SHA512fdf84f0738e2ec1503ffc557f07dea550ee48647c51a70c6bad2eb4f5e4514b3681a06511a88451f58e2942f084aa3bef79d9cb13b1b6d37af16ec5a35f6e852
-
Filesize
1.5MB
MD5543049a58fe847362b15f8e1aee75721
SHA1b22a1f4731c3123ed9af1d3979930775918a462e
SHA25699afe2ac82bc3efc48cd70ec9acab914989e6e60007400629d3001799ccbb5cf
SHA512fdf84f0738e2ec1503ffc557f07dea550ee48647c51a70c6bad2eb4f5e4514b3681a06511a88451f58e2942f084aa3bef79d9cb13b1b6d37af16ec5a35f6e852
-
Filesize
762KB
MD5e0737d3e97b528ff480a4016fb915511
SHA1e3f0ea67cb3019e1663f5462b21009f4e2bc3bd1
SHA2566a25b4d561b71867ad482557278c780501acf8200a72926f27b99cad8cf4e9ed
SHA512a37f5864d452c31820e9a08582e0fcc67c45cf4c74c0a96b256047cbc4b4b7bbaafb1fe7ec5c9211020d98cc4abfa59c75d0fe4344bcbd2f90b8c90abd4b273e
-
Filesize
2B
MD593e00066d099c0485cfffa1359246d26
SHA1bc69a773f37b2f2071e25f755a66d47b871e5d98
SHA2563b271649a94ad5be4ef46ecbb6a4e7363e8498b7e69b751737bf30df2e0d1dde
SHA512d3dfe508cacae7d36f13908134b5b438b87429fcf93ccb060bcfa346c04633a99e9ca497297418c969537be1da2405171982794055dd0f52e59a82720d3b3d02
-
Filesize
3KB
MD50097ffd3c0d7fee5deb04c5503189995
SHA192a5fc2e5e49b721ff98c6869f164c167fd78e07
SHA256b7b9c173d28df1e581f50c2eb321323afdd8bba308ae01fd23402e15b31941f3
SHA512f38ee1af1c752a0c87633f87673818d822d710dd1ed8b6020951c8df59272d8401228d68973f507a193516b1fcc0f5e28bd9bfb7c3fd5c73c7a3f7dae5d3bcda