Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
15-09-2022 16:02
Static task
static1
Behavioral task
behavioral1
Sample
Circular de Resolución No. 2901..exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Circular de Resolución No. 2901..exe
Resource
win10v2004-20220901-en
General
-
Target
Circular de Resolución No. 2901..exe
-
Size
3.1MB
-
MD5
ef60fcaf6ddedd0a3fdb93732cca0902
-
SHA1
e71d10f577df8a6d111f3571079bdfb583f30f62
-
SHA256
9015e5c60b8bd504c8fb6eff20e85f022ab7bdef3209c8743d328f23c864ec39
-
SHA512
1435bb539c6156b4e7d9000fa4f4a64403a70397d18c17f74cd1be5eac0570e44e92df4edcc48ea2a20487c8cccfe71fa374b5c2a8e55e5df0e9c7c6d7fe7afc
-
SSDEEP
98304:l9QHRIEF7KhO2fZzDnUEZ3QiVkc8JcDv:QHvUuO6c8JcD
Malware Config
Extracted
bitrat
1.38
bendicion777.con-ip.com:7777
-
communication_password
202cb962ac59075b964b07152d234b70
-
tor_process
tor
Signatures
-
Processes:
resource yara_rule behavioral2/memory/1140-146-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/1140-147-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/1140-145-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/1140-149-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/1140-148-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/1140-152-0x0000000000400000-0x00000000007E4000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Circular de Resolución No. 2901..exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Circular de Resolución No. 2901..exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Circular de Resolución No. 2901..exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\chrome = "\"C:\\Users\\Admin\\AppData\\Roaming\\Ljqcjwv\\chrome.exe\"" Circular de Resolución No. 2901..exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
InstallUtil.exepid process 1140 InstallUtil.exe 1140 InstallUtil.exe 1140 InstallUtil.exe 1140 InstallUtil.exe 1140 InstallUtil.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Circular de Resolución No. 2901..exedescription pid process target process PID 1220 set thread context of 1140 1220 Circular de Resolución No. 2901..exe InstallUtil.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
powershell.exeCircular de Resolución No. 2901..exepid process 1292 powershell.exe 1292 powershell.exe 1220 Circular de Resolución No. 2901..exe 1220 Circular de Resolución No. 2901..exe 1220 Circular de Resolución No. 2901..exe 1220 Circular de Resolución No. 2901..exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
Circular de Resolución No. 2901..exepowershell.exeInstallUtil.exedescription pid process Token: SeDebugPrivilege 1220 Circular de Resolución No. 2901..exe Token: SeDebugPrivilege 1292 powershell.exe Token: SeShutdownPrivilege 1140 InstallUtil.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
InstallUtil.exepid process 1140 InstallUtil.exe 1140 InstallUtil.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
Circular de Resolución No. 2901..exedescription pid process target process PID 1220 wrote to memory of 1292 1220 Circular de Resolución No. 2901..exe powershell.exe PID 1220 wrote to memory of 1292 1220 Circular de Resolución No. 2901..exe powershell.exe PID 1220 wrote to memory of 1292 1220 Circular de Resolución No. 2901..exe powershell.exe PID 1220 wrote to memory of 4824 1220 Circular de Resolución No. 2901..exe InstallUtil.exe PID 1220 wrote to memory of 4824 1220 Circular de Resolución No. 2901..exe InstallUtil.exe PID 1220 wrote to memory of 4824 1220 Circular de Resolución No. 2901..exe InstallUtil.exe PID 1220 wrote to memory of 2416 1220 Circular de Resolución No. 2901..exe InstallUtil.exe PID 1220 wrote to memory of 2416 1220 Circular de Resolución No. 2901..exe InstallUtil.exe PID 1220 wrote to memory of 2416 1220 Circular de Resolución No. 2901..exe InstallUtil.exe PID 1220 wrote to memory of 1140 1220 Circular de Resolución No. 2901..exe InstallUtil.exe PID 1220 wrote to memory of 1140 1220 Circular de Resolución No. 2901..exe InstallUtil.exe PID 1220 wrote to memory of 1140 1220 Circular de Resolución No. 2901..exe InstallUtil.exe PID 1220 wrote to memory of 1140 1220 Circular de Resolución No. 2901..exe InstallUtil.exe PID 1220 wrote to memory of 1140 1220 Circular de Resolución No. 2901..exe InstallUtil.exe PID 1220 wrote to memory of 1140 1220 Circular de Resolución No. 2901..exe InstallUtil.exe PID 1220 wrote to memory of 1140 1220 Circular de Resolución No. 2901..exe InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Circular de Resolución No. 2901..exe"C:\Users\Admin\AppData\Local\Temp\Circular de Resolución No. 2901..exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1292 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵PID:4824
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵PID:2416
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1140