Analysis
-
max time kernel
139s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2022, 06:34
Static task
static1
Behavioral task
behavioral1
Sample
c1bde58f971eb367e8872c703dd0456273efc4922eb0d2da558a67ec599e7cc8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c1bde58f971eb367e8872c703dd0456273efc4922eb0d2da558a67ec599e7cc8.exe
Resource
win10v2004-20220812-en
General
-
Target
c1bde58f971eb367e8872c703dd0456273efc4922eb0d2da558a67ec599e7cc8.exe
-
Size
26KB
-
MD5
8f999bc022a3b43e421413c8fe56a50d
-
SHA1
9613ad87734ef93f4beda19677e9aa039695886c
-
SHA256
c1bde58f971eb367e8872c703dd0456273efc4922eb0d2da558a67ec599e7cc8
-
SHA512
70ff48630105f6f8980f0a5065489a86348e26f776e0a15d5d6e36c2442965ca8781973360c4b9022e65f2d22a3ba4cb212ce858435aa207eeabbd9e580e39d3
-
SSDEEP
768:EdS/C4/VfxyLb3k28DQ3KFkDBYmpJrOtLKRz7D:5KAVSkmBOtK
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x0007000000022e4e-137.dat acprotect behavioral2/files/0x0007000000022e4e-138.dat acprotect -
resource yara_rule behavioral2/files/0x0007000000022e4e-137.dat upx behavioral2/files/0x0007000000022e4e-138.dat upx behavioral2/memory/1208-140-0x0000000010000000-0x0000000010011000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation c1bde58f971eb367e8872c703dd0456273efc4922eb0d2da558a67ec599e7cc8.exe -
Loads dropped DLL 1 IoCs
pid Process 1208 rundll32.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SfcDisable = "4294967197" rundll32.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\rescom.dll c1bde58f971eb367e8872c703dd0456273efc4922eb0d2da558a67ec599e7cc8.exe File created C:\Windows\SysWOW64\MacSys.dll c1bde58f971eb367e8872c703dd0456273efc4922eb0d2da558a67ec599e7cc8.exe File created C:\Windows\SysWOW64\bitmap.bat c1bde58f971eb367e8872c703dd0456273efc4922eb0d2da558a67ec599e7cc8.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files\Ê¢´óÍøÂç\ðÏÕµºonline\comres.dll c1bde58f971eb367e8872c703dd0456273efc4922eb0d2da558a67ec599e7cc8.exe File created C:\Program Files\Ê¢´óÍøÂç\ðÏÕµºonline\MacSys.dll c1bde58f971eb367e8872c703dd0456273efc4922eb0d2da558a67ec599e7cc8.exe File created C:\Program Files\Ê¢´óÍøÂç\ðÏÕµºonline\SysComs.dll c1bde58f971eb367e8872c703dd0456273efc4922eb0d2da558a67ec599e7cc8.exe File created C:\Program Files\Ê¢´óÍøÂç\ðÏÕµºonline\comres.dll c1bde58f971eb367e8872c703dd0456273efc4922eb0d2da558a67ec599e7cc8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4856 1208 WerFault.exe 82 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4132 c1bde58f971eb367e8872c703dd0456273efc4922eb0d2da558a67ec599e7cc8.exe 4132 c1bde58f971eb367e8872c703dd0456273efc4922eb0d2da558a67ec599e7cc8.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4132 wrote to memory of 2752 4132 c1bde58f971eb367e8872c703dd0456273efc4922eb0d2da558a67ec599e7cc8.exe 80 PID 4132 wrote to memory of 2752 4132 c1bde58f971eb367e8872c703dd0456273efc4922eb0d2da558a67ec599e7cc8.exe 80 PID 4132 wrote to memory of 2752 4132 c1bde58f971eb367e8872c703dd0456273efc4922eb0d2da558a67ec599e7cc8.exe 80 PID 4132 wrote to memory of 1208 4132 c1bde58f971eb367e8872c703dd0456273efc4922eb0d2da558a67ec599e7cc8.exe 82 PID 4132 wrote to memory of 1208 4132 c1bde58f971eb367e8872c703dd0456273efc4922eb0d2da558a67ec599e7cc8.exe 82 PID 4132 wrote to memory of 1208 4132 c1bde58f971eb367e8872c703dd0456273efc4922eb0d2da558a67ec599e7cc8.exe 82 PID 4132 wrote to memory of 2992 4132 c1bde58f971eb367e8872c703dd0456273efc4922eb0d2da558a67ec599e7cc8.exe 83 PID 4132 wrote to memory of 2992 4132 c1bde58f971eb367e8872c703dd0456273efc4922eb0d2da558a67ec599e7cc8.exe 83 PID 4132 wrote to memory of 2992 4132 c1bde58f971eb367e8872c703dd0456273efc4922eb0d2da558a67ec599e7cc8.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1bde58f971eb367e8872c703dd0456273efc4922eb0d2da558a67ec599e7cc8.exe"C:\Users\Admin\AppData\Local\Temp\c1bde58f971eb367e8872c703dd0456273efc4922eb0d2da558a67ec599e7cc8.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Windows\SysWOW64\sfc.exeC:\Windows\system32\sfc.exe /REVERT2⤵PID:2752
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\MacSys.dll,init2⤵
- Loads dropped DLL
- Modifies WinLogon
PID:1208 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1208 -s 6643⤵
- Program crash
PID:4856
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\system32\bitmap.bat2⤵PID:2992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1208 -ip 12081⤵PID:4936
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5911fc8da19a0d0384d831a0b80067fc7
SHA190395638c542c94491f19b331218085e887d660d
SHA25604dab09e334c04ff70a21d8b6d0f1315d545d8852ce7068821c4ccb14748f4e2
SHA5129c6395eeb5d5c4cf5ec87ac93a4cd3fa7195116a00b00b03ca92e9a977945d28a829780f4c6698bbaea59877b8c59b3d1d4d3f42b06956054200af7d5bce9b4e
-
Filesize
14KB
MD5911fc8da19a0d0384d831a0b80067fc7
SHA190395638c542c94491f19b331218085e887d660d
SHA25604dab09e334c04ff70a21d8b6d0f1315d545d8852ce7068821c4ccb14748f4e2
SHA5129c6395eeb5d5c4cf5ec87ac93a4cd3fa7195116a00b00b03ca92e9a977945d28a829780f4c6698bbaea59877b8c59b3d1d4d3f42b06956054200af7d5bce9b4e
-
Filesize
257B
MD53c07867d69f784f3bff28a14d3754fc3
SHA14b208c8eb2ee12df033acae720f3d4c64ce7a77b
SHA25658b580cba985b22b38d9a38c758f17fc688f798457a5e15c82ee1da78c89868c
SHA51238ae1ff3bbe741691b35b096c48fd28fbf9c92cc76ffe38c8f73f56e426cf4b2840e7eba041138887a0b498b2a8f3b62ad55cd1cfa9037250039e0b32d42f491