Analysis
-
max time kernel
137s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2022 07:48
Static task
static1
Behavioral task
behavioral1
Sample
2b174addd6e130d66559c95210340cf00114ff083f0477c3a87d3ec4aa9cbf0c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2b174addd6e130d66559c95210340cf00114ff083f0477c3a87d3ec4aa9cbf0c.exe
Resource
win10v2004-20220812-en
General
-
Target
2b174addd6e130d66559c95210340cf00114ff083f0477c3a87d3ec4aa9cbf0c.exe
-
Size
706KB
-
MD5
3ac3494886b2df27ae6acebb36bb5ed5
-
SHA1
5fce26a566de4c07ebb4374b8f7c963b3f12b783
-
SHA256
2b174addd6e130d66559c95210340cf00114ff083f0477c3a87d3ec4aa9cbf0c
-
SHA512
8c824b689b9f8c624edb2d5807ad2d552ae3a9a642895183a5a1acf0ad52ac2b8bdfec5aa036e51a0062a1b4a31fe7f604a1bd9be6950355ecd3a2981034e381
-
SSDEEP
12288:gp/iN/mlVdtvrYeyZJf7kPK+iqBZn+D73iKHeGspEAsekFS37t9lOqa:gpQ/6trYlvYPK+lqD73TeGsp1gFCXi
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3408 ScrBlaze.scr 3784 ScrBlaze.scr -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 2b174addd6e130d66559c95210340cf00114ff083f0477c3a87d3ec4aa9cbf0c.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File created C:\Windows\s18273659 ScrBlaze.scr File opened for modification C:\Windows\s18273659 ScrBlaze.scr File created C:\Windows\s18273659 2b174addd6e130d66559c95210340cf00114ff083f0477c3a87d3ec4aa9cbf0c.exe File opened for modification C:\Windows\s18273659 2b174addd6e130d66559c95210340cf00114ff083f0477c3a87d3ec4aa9cbf0c.exe File created C:\Windows\ScrBlaze.scr 2b174addd6e130d66559c95210340cf00114ff083f0477c3a87d3ec4aa9cbf0c.exe File created C:\Windows\s18273659 ScrBlaze.scr File opened for modification C:\Windows\s18273659 ScrBlaze.scr -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies Control Panel 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\Desktop 2b174addd6e130d66559c95210340cf00114ff083f0477c3a87d3ec4aa9cbf0c.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\ScrBlaze.scr" 2b174addd6e130d66559c95210340cf00114ff083f0477c3a87d3ec4aa9cbf0c.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch ScrBlaze.scr Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" ScrBlaze.scr Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\IESettingSync ScrBlaze.scr Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" ScrBlaze.scr Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\GPU ScrBlaze.scr Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x1414\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"6.2.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" ScrBlaze.scr -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4956 2b174addd6e130d66559c95210340cf00114ff083f0477c3a87d3ec4aa9cbf0c.exe 4956 2b174addd6e130d66559c95210340cf00114ff083f0477c3a87d3ec4aa9cbf0c.exe 3408 ScrBlaze.scr 3408 ScrBlaze.scr 3784 ScrBlaze.scr 3784 ScrBlaze.scr -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4956 wrote to memory of 3408 4956 2b174addd6e130d66559c95210340cf00114ff083f0477c3a87d3ec4aa9cbf0c.exe 80 PID 4956 wrote to memory of 3408 4956 2b174addd6e130d66559c95210340cf00114ff083f0477c3a87d3ec4aa9cbf0c.exe 80 PID 4956 wrote to memory of 3408 4956 2b174addd6e130d66559c95210340cf00114ff083f0477c3a87d3ec4aa9cbf0c.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b174addd6e130d66559c95210340cf00114ff083f0477c3a87d3ec4aa9cbf0c.exe"C:\Users\Admin\AppData\Local\Temp\2b174addd6e130d66559c95210340cf00114ff083f0477c3a87d3ec4aa9cbf0c.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies Control Panel
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\ScrBlaze.scr"C:\Windows\ScrBlaze.scr" /S2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3408
-
-
C:\Windows\ScrBlaze.scrC:\Windows\ScrBlaze.scr /s1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3784
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
706KB
MD53ac3494886b2df27ae6acebb36bb5ed5
SHA15fce26a566de4c07ebb4374b8f7c963b3f12b783
SHA2562b174addd6e130d66559c95210340cf00114ff083f0477c3a87d3ec4aa9cbf0c
SHA5128c824b689b9f8c624edb2d5807ad2d552ae3a9a642895183a5a1acf0ad52ac2b8bdfec5aa036e51a0062a1b4a31fe7f604a1bd9be6950355ecd3a2981034e381
-
Filesize
706KB
MD53ac3494886b2df27ae6acebb36bb5ed5
SHA15fce26a566de4c07ebb4374b8f7c963b3f12b783
SHA2562b174addd6e130d66559c95210340cf00114ff083f0477c3a87d3ec4aa9cbf0c
SHA5128c824b689b9f8c624edb2d5807ad2d552ae3a9a642895183a5a1acf0ad52ac2b8bdfec5aa036e51a0062a1b4a31fe7f604a1bd9be6950355ecd3a2981034e381
-
Filesize
706KB
MD53ac3494886b2df27ae6acebb36bb5ed5
SHA15fce26a566de4c07ebb4374b8f7c963b3f12b783
SHA2562b174addd6e130d66559c95210340cf00114ff083f0477c3a87d3ec4aa9cbf0c
SHA5128c824b689b9f8c624edb2d5807ad2d552ae3a9a642895183a5a1acf0ad52ac2b8bdfec5aa036e51a0062a1b4a31fe7f604a1bd9be6950355ecd3a2981034e381
-
Filesize
1000B
MD5f53528814cf05fefaf90eea8710110ff
SHA1bf26efc8e771081a8f1a56f1a5446c0d06d30ee5
SHA256d6ec127200c1c2e627fbd9462f043118c31e8936031ec0a665101a1f66b37d62
SHA5129985090f4c1e1a30fcb390a4b98159cc70eab76e3fb750b5fe18c98c39853629f15fd41e08601cee6a19c514fe5a3749729658f40fc80ef45b42a2e0d84f4ffa
-
Filesize
1KB
MD5dc30e8bb3b209fc6e750fed94029bfae
SHA149d759ee2d016c407e1defbf876bb417b8fcd7cc
SHA2568fbe171a6a50f3464d214b0897b05e02be6b4715ed334719a3e5a5c622da38df
SHA51239ade3bd86129c22e29330f528a85e929cc89a24c283f13a9c43d1c25ed5839123b00fc55ac6c87085181d03c25be67599b31c71496c4a6447382557bf19f71e