Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2022 15:29
Static task
static1
Behavioral task
behavioral1
Sample
61f9d2b055b4c6b2fcd157f73ae63cd1.exe
Resource
win7-20220812-en
General
-
Target
61f9d2b055b4c6b2fcd157f73ae63cd1.exe
-
Size
1.5MB
-
MD5
61f9d2b055b4c6b2fcd157f73ae63cd1
-
SHA1
f4e42225c42c5378ccd4e03b7ccb465d79797388
-
SHA256
4119afdd7fb25978a0f7fa74cdb6be97df0a67ddc3607efbce5de855d9a765d2
-
SHA512
58e321c0d746ed4da8f7bbe19c4524544449a67f1f84b5cb87b3c64107bf6639ed0f163d5f5f8cfa58cbd7dbfacb12439cfea5376dc052f271df124e09fe2c3e
-
SSDEEP
24576:277xjRO4/1gy4+aDckmi7DaC+V+aqaGI5KMADy2n1Cpp4c7cxXZh:c7xjRJgywDCyDSWaCM0y2ngHdm7
Malware Config
Extracted
systembc
89.22.225.242:4193
195.2.93.22:4193
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Dotay forikiyi bibaja.exepid process 2664 Dotay forikiyi bibaja.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
61f9d2b055b4c6b2fcd157f73ae63cd1.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 61f9d2b055b4c6b2fcd157f73ae63cd1.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Dotay forikiyi bibaja.exedescription pid process target process PID 2664 set thread context of 3876 2664 Dotay forikiyi bibaja.exe InstallUtil.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
61f9d2b055b4c6b2fcd157f73ae63cd1.exeDotay forikiyi bibaja.exepid process 4156 61f9d2b055b4c6b2fcd157f73ae63cd1.exe 4156 61f9d2b055b4c6b2fcd157f73ae63cd1.exe 4156 61f9d2b055b4c6b2fcd157f73ae63cd1.exe 4156 61f9d2b055b4c6b2fcd157f73ae63cd1.exe 4156 61f9d2b055b4c6b2fcd157f73ae63cd1.exe 4156 61f9d2b055b4c6b2fcd157f73ae63cd1.exe 4156 61f9d2b055b4c6b2fcd157f73ae63cd1.exe 4156 61f9d2b055b4c6b2fcd157f73ae63cd1.exe 4156 61f9d2b055b4c6b2fcd157f73ae63cd1.exe 4156 61f9d2b055b4c6b2fcd157f73ae63cd1.exe 2664 Dotay forikiyi bibaja.exe 2664 Dotay forikiyi bibaja.exe 2664 Dotay forikiyi bibaja.exe 2664 Dotay forikiyi bibaja.exe 2664 Dotay forikiyi bibaja.exe 2664 Dotay forikiyi bibaja.exe 2664 Dotay forikiyi bibaja.exe 2664 Dotay forikiyi bibaja.exe 2664 Dotay forikiyi bibaja.exe 2664 Dotay forikiyi bibaja.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
61f9d2b055b4c6b2fcd157f73ae63cd1.execmd.exeDotay forikiyi bibaja.exedescription pid process target process PID 4156 wrote to memory of 364 4156 61f9d2b055b4c6b2fcd157f73ae63cd1.exe schtasks.exe PID 4156 wrote to memory of 364 4156 61f9d2b055b4c6b2fcd157f73ae63cd1.exe schtasks.exe PID 4156 wrote to memory of 364 4156 61f9d2b055b4c6b2fcd157f73ae63cd1.exe schtasks.exe PID 4156 wrote to memory of 2664 4156 61f9d2b055b4c6b2fcd157f73ae63cd1.exe Dotay forikiyi bibaja.exe PID 4156 wrote to memory of 2664 4156 61f9d2b055b4c6b2fcd157f73ae63cd1.exe Dotay forikiyi bibaja.exe PID 4156 wrote to memory of 2664 4156 61f9d2b055b4c6b2fcd157f73ae63cd1.exe Dotay forikiyi bibaja.exe PID 4156 wrote to memory of 176 4156 61f9d2b055b4c6b2fcd157f73ae63cd1.exe cmd.exe PID 4156 wrote to memory of 176 4156 61f9d2b055b4c6b2fcd157f73ae63cd1.exe cmd.exe PID 4156 wrote to memory of 176 4156 61f9d2b055b4c6b2fcd157f73ae63cd1.exe cmd.exe PID 176 wrote to memory of 2088 176 cmd.exe chcp.com PID 176 wrote to memory of 2088 176 cmd.exe chcp.com PID 176 wrote to memory of 2088 176 cmd.exe chcp.com PID 176 wrote to memory of 1684 176 cmd.exe PING.EXE PID 176 wrote to memory of 1684 176 cmd.exe PING.EXE PID 176 wrote to memory of 1684 176 cmd.exe PING.EXE PID 2664 wrote to memory of 3876 2664 Dotay forikiyi bibaja.exe InstallUtil.exe PID 2664 wrote to memory of 3876 2664 Dotay forikiyi bibaja.exe InstallUtil.exe PID 2664 wrote to memory of 3876 2664 Dotay forikiyi bibaja.exe InstallUtil.exe PID 2664 wrote to memory of 3876 2664 Dotay forikiyi bibaja.exe InstallUtil.exe PID 2664 wrote to memory of 3876 2664 Dotay forikiyi bibaja.exe InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\61f9d2b055b4c6b2fcd157f73ae63cd1.exe"C:\Users\Admin\AppData\Local\Temp\61f9d2b055b4c6b2fcd157f73ae63cd1.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /tn COMSurrogate /f /sc onlogon /rl highest /tr "C:\Users\Admin\Quabo gij cogoke pasofe melo jayiwala gohirih quocelad nocalati\Dotay forikiyi bibaja.exe"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\Quabo gij cogoke pasofe melo jayiwala gohirih quocelad nocalati\Dotay forikiyi bibaja.exe"C:\Users\Admin\Quabo gij cogoke pasofe melo jayiwala gohirih quocelad nocalati\Dotay forikiyi bibaja.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\61f9d2b055b4c6b2fcd157f73ae63cd1.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650013⤵
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\Quabo gij cogoke pasofe melo jayiwala gohirih quocelad nocalati\Dotay forikiyi bibaja.exeFilesize
605.2MB
MD5e942856581a46d01030308ff6c85c42f
SHA17c37f2116a372419d163d05839b0989b9782fa3a
SHA256ef58b794bddb24ae00ffc30e0ffb444c4f7b210d22da74e89691e9253e9c690d
SHA512ec1eebb9a179a39debd5d2228c381085f97357db88ca13aaf6be6a64a8259ae906610a69b52600cdd4ce5bc120b806eb9366d2f86dd20baf11bdf201ed40d7d5
-
C:\Users\Admin\Quabo gij cogoke pasofe melo jayiwala gohirih quocelad nocalati\Dotay forikiyi bibaja.exeFilesize
562.4MB
MD5e996114b568f6222935a912b9295ecff
SHA186aa371b54c40def21dd831ff614ad2492bcd33f
SHA256bdc21425286a92a96ff76aaf6e203e6a0739137f4cddf8955f1056be2dc260e4
SHA51229cc0f874c992749e68be30e6efbdbb3baf114d9ef1408d89269149ab796f9063e15ad4415ff035d51d2431b11a440d0eb084b7fbf5f8ae8dc907efed3a851ca
-
memory/176-140-0x0000000000000000-mapping.dmp
-
memory/364-136-0x0000000000000000-mapping.dmp
-
memory/1684-143-0x0000000000000000-mapping.dmp
-
memory/2088-142-0x0000000000000000-mapping.dmp
-
memory/2664-137-0x0000000000000000-mapping.dmp
-
memory/2664-146-0x0000000002202000-0x000000000291A000-memory.dmpFilesize
7.1MB
-
memory/2664-155-0x000000000292B000-0x0000000002A93000-memory.dmpFilesize
1.4MB
-
memory/2664-149-0x000000000E6A0000-0x000000000E715000-memory.dmpFilesize
468KB
-
memory/2664-148-0x000000000E6A0000-0x000000000E715000-memory.dmpFilesize
468KB
-
memory/2664-147-0x000000000292B000-0x0000000002A93000-memory.dmpFilesize
1.4MB
-
memory/2664-144-0x0000000002202000-0x000000000291A000-memory.dmpFilesize
7.1MB
-
memory/2664-145-0x000000000292B000-0x0000000002A93000-memory.dmpFilesize
1.4MB
-
memory/3876-151-0x0000000000400000-0x0000000000407000-memory.dmpFilesize
28KB
-
memory/3876-150-0x0000000000000000-mapping.dmp
-
memory/3876-153-0x0000000000400000-0x0000000000407000-memory.dmpFilesize
28KB
-
memory/3876-156-0x0000000000400000-0x0000000000407000-memory.dmpFilesize
28KB
-
memory/4156-133-0x0000000002D30000-0x0000000002E98000-memory.dmpFilesize
1.4MB
-
memory/4156-134-0x0000000002612000-0x0000000002D2A000-memory.dmpFilesize
7.1MB
-
memory/4156-141-0x0000000002D30000-0x0000000002E98000-memory.dmpFilesize
1.4MB
-
memory/4156-132-0x0000000002612000-0x0000000002D2A000-memory.dmpFilesize
7.1MB
-
memory/4156-135-0x0000000002D30000-0x0000000002E98000-memory.dmpFilesize
1.4MB