Analysis
-
max time kernel
123s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2022, 13:19
Static task
static1
Behavioral task
behavioral1
Sample
4a68d3660cf2f5519cedd039e7725f337b084fe611947a0215e35fd3bd769163.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4a68d3660cf2f5519cedd039e7725f337b084fe611947a0215e35fd3bd769163.exe
Resource
win10v2004-20220812-en
General
-
Target
4a68d3660cf2f5519cedd039e7725f337b084fe611947a0215e35fd3bd769163.exe
-
Size
231KB
-
MD5
86faab4cd1815f6bba432b40a887835e
-
SHA1
89bdb36880520a8474eca11a8b44dbe3d7a87b3e
-
SHA256
4a68d3660cf2f5519cedd039e7725f337b084fe611947a0215e35fd3bd769163
-
SHA512
543d713b0fde339eed3d286991aa18511997a80e0bb1aae4f3461f32fae75f3376ab3eb11fcee91f9f8523ec44ffdb2760a891c50b4fbb6262465807e8136032
-
SSDEEP
6144:GcWMJJhqryYP/SasC7RV+/i/fccJaRt2VUJEJTZyW0lqyE:GczJJhqrVPaoNVqOfJJaT2rgrlrE
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1604 server_et.exe 852 mservice32_t.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 4a68d3660cf2f5519cedd039e7725f337b084fe611947a0215e35fd3bd769163.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce mservice32_t.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Update mservice32_t.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\UpdateT = "C:\\Users\\Admin\\AppData\\Roaming\\mservice32_t.exe" mservice32_t.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5052 wrote to memory of 1604 5052 4a68d3660cf2f5519cedd039e7725f337b084fe611947a0215e35fd3bd769163.exe 82 PID 5052 wrote to memory of 1604 5052 4a68d3660cf2f5519cedd039e7725f337b084fe611947a0215e35fd3bd769163.exe 82 PID 5052 wrote to memory of 1604 5052 4a68d3660cf2f5519cedd039e7725f337b084fe611947a0215e35fd3bd769163.exe 82 PID 1604 wrote to memory of 852 1604 server_et.exe 83 PID 1604 wrote to memory of 852 1604 server_et.exe 83 PID 1604 wrote to memory of 852 1604 server_et.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a68d3660cf2f5519cedd039e7725f337b084fe611947a0215e35fd3bd769163.exe"C:\Users\Admin\AppData\Local\Temp\4a68d3660cf2f5519cedd039e7725f337b084fe611947a0215e35fd3bd769163.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\server_et.exe"C:\Users\Admin\AppData\Local\Temp\server_et.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Users\Admin\AppData\Roaming\mservice32_t.exe"C:\Users\Admin\AppData\Roaming\mservice32_t.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:852
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
445KB
MD58e37d564ab6ca7cba641a99d50963241
SHA1ba984e7f3ecadb639d53a450d297c11273ae4f54
SHA256a366a79453c802c03dce39c9324f505c15149833e19d9ebb82b609a3990b2ee6
SHA512389f909a7b1747da5af2cb48de3f59e4196342efd2ec8d941c6dce6e91c319e1816ab3d67128fa678be81df98ba5fc99e0b7c94c751a6df1c43a5b231c49bf69
-
Filesize
445KB
MD58e37d564ab6ca7cba641a99d50963241
SHA1ba984e7f3ecadb639d53a450d297c11273ae4f54
SHA256a366a79453c802c03dce39c9324f505c15149833e19d9ebb82b609a3990b2ee6
SHA512389f909a7b1747da5af2cb48de3f59e4196342efd2ec8d941c6dce6e91c319e1816ab3d67128fa678be81df98ba5fc99e0b7c94c751a6df1c43a5b231c49bf69
-
Filesize
445KB
MD58e37d564ab6ca7cba641a99d50963241
SHA1ba984e7f3ecadb639d53a450d297c11273ae4f54
SHA256a366a79453c802c03dce39c9324f505c15149833e19d9ebb82b609a3990b2ee6
SHA512389f909a7b1747da5af2cb48de3f59e4196342efd2ec8d941c6dce6e91c319e1816ab3d67128fa678be81df98ba5fc99e0b7c94c751a6df1c43a5b231c49bf69
-
Filesize
445KB
MD58e37d564ab6ca7cba641a99d50963241
SHA1ba984e7f3ecadb639d53a450d297c11273ae4f54
SHA256a366a79453c802c03dce39c9324f505c15149833e19d9ebb82b609a3990b2ee6
SHA512389f909a7b1747da5af2cb48de3f59e4196342efd2ec8d941c6dce6e91c319e1816ab3d67128fa678be81df98ba5fc99e0b7c94c751a6df1c43a5b231c49bf69