Analysis
-
max time kernel
129s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2022, 01:14
Static task
static1
Behavioral task
behavioral1
Sample
cab5f77fe8fb3e34b085e3d7cfe891ca9e2e3b40619404a6c915d12b311ad86d.exe
Resource
win7-20220901-en
General
-
Target
cab5f77fe8fb3e34b085e3d7cfe891ca9e2e3b40619404a6c915d12b311ad86d.exe
-
Size
70KB
-
MD5
232e49c7ba8391d7161babef4614ab7e
-
SHA1
1dfd835200aac5019938067fce6ef826d0b090ac
-
SHA256
cab5f77fe8fb3e34b085e3d7cfe891ca9e2e3b40619404a6c915d12b311ad86d
-
SHA512
c082d25b0138a86ad2636b7ecea40621495c812a5c5ebe2a44c4ac14d10b08817697cbf1b03d98fc1b765ec6151ded78013d96f45ac55c58e4a30ec1d83c88b5
-
SSDEEP
1536:mAhTyTTFQNC13U4rtnDb4tmJ2mUX7tblpAkQfFvIvQC:LhT2137DYmJJUX7tbbA5uvF
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3988 252.exe 3052 DnfÁúÑÛ6.13.exe -
resource yara_rule behavioral2/files/0x0007000000022e62-133.dat upx behavioral2/files/0x0007000000022e62-134.dat upx behavioral2/memory/3988-140-0x0000000000400000-0x000000000040D000-memory.dmp upx behavioral2/memory/3988-143-0x0000000000400000-0x000000000040D000-memory.dmp upx -
resource yara_rule behavioral2/files/0x0006000000022e65-137.dat vmprotect behavioral2/memory/3988-141-0x0000000010000000-0x000000001000B000-memory.dmp vmprotect -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation cab5f77fe8fb3e34b085e3d7cfe891ca9e2e3b40619404a6c915d12b311ad86d.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 252.exe -
Loads dropped DLL 2 IoCs
pid Process 3988 252.exe 3988 252.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\RasEngine.dat 252.exe File opened for modification C:\Windows\SysWOW64\RasEngine.dat 252.exe File created C:\Windows\SysWOW64\comres.dll 252.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\fonts\JLFDNF.ttf 252.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3972 wrote to memory of 3988 3972 cab5f77fe8fb3e34b085e3d7cfe891ca9e2e3b40619404a6c915d12b311ad86d.exe 80 PID 3972 wrote to memory of 3988 3972 cab5f77fe8fb3e34b085e3d7cfe891ca9e2e3b40619404a6c915d12b311ad86d.exe 80 PID 3972 wrote to memory of 3988 3972 cab5f77fe8fb3e34b085e3d7cfe891ca9e2e3b40619404a6c915d12b311ad86d.exe 80 PID 3972 wrote to memory of 3052 3972 cab5f77fe8fb3e34b085e3d7cfe891ca9e2e3b40619404a6c915d12b311ad86d.exe 81 PID 3972 wrote to memory of 3052 3972 cab5f77fe8fb3e34b085e3d7cfe891ca9e2e3b40619404a6c915d12b311ad86d.exe 81 PID 3972 wrote to memory of 3052 3972 cab5f77fe8fb3e34b085e3d7cfe891ca9e2e3b40619404a6c915d12b311ad86d.exe 81 PID 3988 wrote to memory of 3124 3988 252.exe 82 PID 3988 wrote to memory of 3124 3988 252.exe 82 PID 3988 wrote to memory of 3124 3988 252.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\cab5f77fe8fb3e34b085e3d7cfe891ca9e2e3b40619404a6c915d12b311ad86d.exe"C:\Users\Admin\AppData\Local\Temp\cab5f77fe8fb3e34b085e3d7cfe891ca9e2e3b40619404a6c915d12b311ad86d.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\252.exe"C:\252.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\clear.bat" "3⤵PID:3124
-
-
-
C:\DnfÁúÑÛ6.13.exe"C:\DnfÁúÑÛ6.13.exe"2⤵
- Executes dropped EXE
PID:3052
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD5a9f257805603ed00bb5052016062e824
SHA16006892a85faa8d581c66b2230c85559b8321a38
SHA256d490b4c5707b0f387c3084a45e8e2ed34b7495a66ffb364c4c6ea2ac09a7302d
SHA512eb4f0e9580da238055ba20ac9393b5f6cf063016e111697a5bb35f47c72315d370364c160cba77df690a66257bd4bc40828fb70aebe7381aa61f6ff8667e7200
-
Filesize
16KB
MD5a9f257805603ed00bb5052016062e824
SHA16006892a85faa8d581c66b2230c85559b8321a38
SHA256d490b4c5707b0f387c3084a45e8e2ed34b7495a66ffb364c4c6ea2ac09a7302d
SHA512eb4f0e9580da238055ba20ac9393b5f6cf063016e111697a5bb35f47c72315d370364c160cba77df690a66257bd4bc40828fb70aebe7381aa61f6ff8667e7200
-
Filesize
59KB
MD5db0d0929cc3d6671b7fe1d98fbeff658
SHA17a04a6d8d912b5ed293d160e50a79774df56d041
SHA2561b55f28889cbe07816f50805a173dd12333bfb269787e91f8145cf8d727a91bf
SHA5122d7783ef7aa64e74334c2049a2c17d2e8ae385222e9a9fc6ab0f95703c6818374029bf07e30bcdd45bba3e793e92ec0bbf0561603014cd1296f560d05d1126fb
-
Filesize
59KB
MD5db0d0929cc3d6671b7fe1d98fbeff658
SHA17a04a6d8d912b5ed293d160e50a79774df56d041
SHA2561b55f28889cbe07816f50805a173dd12333bfb269787e91f8145cf8d727a91bf
SHA5122d7783ef7aa64e74334c2049a2c17d2e8ae385222e9a9fc6ab0f95703c6818374029bf07e30bcdd45bba3e793e92ec0bbf0561603014cd1296f560d05d1126fb
-
Filesize
76B
MD5dd268c746af233a812c28d3dbc4fe47c
SHA163b6b9860b7ee528d8fe00404f3c3ec7e407bc2f
SHA256aa8a695d5cc6a68c5f05b403d23ff205bbdf7b8ace7443b67818bc72f929d677
SHA51228907b6db15cc752442a7b32520fa554fc99a10725a98588f4ce7191f7cbd3ce5a757cc4ffe7b01be4062574bf4788224b0bb4ef882839ce757a2d38baf1369c
-
Filesize
26KB
MD527718f9dcf10fb511effb947d2bf793d
SHA15914d008527dff61f2ef496961ec15314fb0a4f0
SHA25681ccdd8114297d947526bdf95dbd70ecd2bd8c087acea7020ac53ea763fe0a4c
SHA5122fb4a9c5f1b9493da16ea8771438af27d7b06a40a7512382d63397b3ede34ee1c23ac79ba94a27e99e82f6ca18b96c9d72d35029ca85be0b708998e0bb0ef117
-
Filesize
48KB
MD598c499fccb739ab23b75c0d8b98e0481
SHA10ef5c464823550d5f53dd485e91dabc5d5a1ba0a
SHA256d9d8ce1b86b3978889466ab1b9f46778942d276922bf7533327a493083913087
SHA5129e64ac13e18ab0a518bb85b6612520645b5ab2c9a5359ced943813ba7344714999f25ba0e52240ad2d0c2fefc76552ff43173adc46334ff0b5dba171fb58e4e6