Analysis
-
max time kernel
152s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2022, 22:04
Static task
static1
Behavioral task
behavioral1
Sample
0d6474856eebb3ec9eb9f184f478a8aefd555518a3b4ea289a61405d89b0dbe8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0d6474856eebb3ec9eb9f184f478a8aefd555518a3b4ea289a61405d89b0dbe8.exe
Resource
win10v2004-20220812-en
General
-
Target
0d6474856eebb3ec9eb9f184f478a8aefd555518a3b4ea289a61405d89b0dbe8.exe
-
Size
196KB
-
MD5
659aa7d6112b55a836a6af08b70423cc
-
SHA1
4b035149848517a47a07ebb2f055bb0daf21b0a6
-
SHA256
0d6474856eebb3ec9eb9f184f478a8aefd555518a3b4ea289a61405d89b0dbe8
-
SHA512
50474498f8cc73ae7ee85bcb8c6f1949179f572d3d468498d369d054c06fec4a917a94df7b45f0eb1e84fae338858f47fbd7e7998774d2b5f7f2f23fd658da62
-
SSDEEP
1536:RvQJyBgIWoPwVXL0LzyFf4kbal/PnVPs9hO16RCpc8MiWVWv7tEOPd5/Frd9cqCH:q0gIWoUwLmLGPs9v3Wv7FPdvJVyl3lJ
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 19 2492 Rundll32.exe -
Executes dropped EXE 2 IoCs
pid Process 1476 system.exe 3984 0d6474856eebb3ec9eb9f184f478a8aefd555518a3b4ea289a61405d89b0dbe8.exe -
Stops running service(s) 3 TTPs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation Rundll32.exe -
Loads dropped DLL 3 IoCs
pid Process 5076 Rundll32.exe 2492 Rundll32.exe 2492 Rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\system = "C:\\Windows\\system32\\system.exe" Rundll32.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: Rundll32.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\system.exe 0d6474856eebb3ec9eb9f184f478a8aefd555518a3b4ea289a61405d89b0dbe8.exe File created C:\Windows\SysWOW64\lueoifaa.dll system.exe File created C:\Windows\SysWOW64\mgrqifaa.dll system.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files\AAV\CDriver.sys Rundll32.exe -
Launches sc.exe 7 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 808 sc.exe 3556 sc.exe 2076 sc.exe 4784 sc.exe 4568 sc.exe 4488 sc.exe 732 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 5076 Rundll32.exe 5076 Rundll32.exe 5076 Rundll32.exe 5076 Rundll32.exe 5076 Rundll32.exe 5076 Rundll32.exe 5076 Rundll32.exe 5076 Rundll32.exe 5076 Rundll32.exe 5076 Rundll32.exe 5076 Rundll32.exe 5076 Rundll32.exe 5076 Rundll32.exe 5076 Rundll32.exe 2492 Rundll32.exe 2492 Rundll32.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 656 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3752 0d6474856eebb3ec9eb9f184f478a8aefd555518a3b4ea289a61405d89b0dbe8.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 3752 wrote to memory of 1476 3752 0d6474856eebb3ec9eb9f184f478a8aefd555518a3b4ea289a61405d89b0dbe8.exe 83 PID 3752 wrote to memory of 1476 3752 0d6474856eebb3ec9eb9f184f478a8aefd555518a3b4ea289a61405d89b0dbe8.exe 83 PID 3752 wrote to memory of 1476 3752 0d6474856eebb3ec9eb9f184f478a8aefd555518a3b4ea289a61405d89b0dbe8.exe 83 PID 3752 wrote to memory of 3984 3752 0d6474856eebb3ec9eb9f184f478a8aefd555518a3b4ea289a61405d89b0dbe8.exe 84 PID 3752 wrote to memory of 3984 3752 0d6474856eebb3ec9eb9f184f478a8aefd555518a3b4ea289a61405d89b0dbe8.exe 84 PID 3752 wrote to memory of 3984 3752 0d6474856eebb3ec9eb9f184f478a8aefd555518a3b4ea289a61405d89b0dbe8.exe 84 PID 1476 wrote to memory of 5076 1476 system.exe 85 PID 1476 wrote to memory of 5076 1476 system.exe 85 PID 1476 wrote to memory of 5076 1476 system.exe 85 PID 5076 wrote to memory of 5012 5076 Rundll32.exe 86 PID 5076 wrote to memory of 5012 5076 Rundll32.exe 86 PID 5076 wrote to memory of 5012 5076 Rundll32.exe 86 PID 5076 wrote to memory of 4928 5076 Rundll32.exe 87 PID 5076 wrote to memory of 4928 5076 Rundll32.exe 87 PID 5076 wrote to memory of 4928 5076 Rundll32.exe 87 PID 5076 wrote to memory of 732 5076 Rundll32.exe 90 PID 5076 wrote to memory of 732 5076 Rundll32.exe 90 PID 5076 wrote to memory of 732 5076 Rundll32.exe 90 PID 5076 wrote to memory of 4784 5076 Rundll32.exe 97 PID 5076 wrote to memory of 4784 5076 Rundll32.exe 97 PID 5076 wrote to memory of 4784 5076 Rundll32.exe 97 PID 5076 wrote to memory of 808 5076 Rundll32.exe 92 PID 5076 wrote to memory of 808 5076 Rundll32.exe 92 PID 5076 wrote to memory of 808 5076 Rundll32.exe 92 PID 5076 wrote to memory of 3556 5076 Rundll32.exe 93 PID 5076 wrote to memory of 3556 5076 Rundll32.exe 93 PID 5076 wrote to memory of 3556 5076 Rundll32.exe 93 PID 5076 wrote to memory of 2076 5076 Rundll32.exe 94 PID 5076 wrote to memory of 2076 5076 Rundll32.exe 94 PID 5076 wrote to memory of 2076 5076 Rundll32.exe 94 PID 5076 wrote to memory of 4568 5076 Rundll32.exe 98 PID 5076 wrote to memory of 4568 5076 Rundll32.exe 98 PID 5076 wrote to memory of 4568 5076 Rundll32.exe 98 PID 5076 wrote to memory of 1476 5076 Rundll32.exe 83 PID 5076 wrote to memory of 1476 5076 Rundll32.exe 83 PID 5076 wrote to memory of 5012 5076 Rundll32.exe 86 PID 5076 wrote to memory of 5012 5076 Rundll32.exe 86 PID 5076 wrote to memory of 4928 5076 Rundll32.exe 87 PID 5076 wrote to memory of 4928 5076 Rundll32.exe 87 PID 5076 wrote to memory of 732 5076 Rundll32.exe 90 PID 5076 wrote to memory of 732 5076 Rundll32.exe 90 PID 5076 wrote to memory of 4784 5076 Rundll32.exe 97 PID 5076 wrote to memory of 4784 5076 Rundll32.exe 97 PID 5076 wrote to memory of 808 5076 Rundll32.exe 92 PID 5076 wrote to memory of 808 5076 Rundll32.exe 92 PID 5076 wrote to memory of 3556 5076 Rundll32.exe 93 PID 5076 wrote to memory of 3556 5076 Rundll32.exe 93 PID 5076 wrote to memory of 2076 5076 Rundll32.exe 94 PID 5076 wrote to memory of 2076 5076 Rundll32.exe 94 PID 5076 wrote to memory of 4568 5076 Rundll32.exe 98 PID 5076 wrote to memory of 4568 5076 Rundll32.exe 98 PID 5012 wrote to memory of 628 5012 net.exe 102 PID 5012 wrote to memory of 628 5012 net.exe 102 PID 5012 wrote to memory of 628 5012 net.exe 102 PID 4928 wrote to memory of 2732 4928 net.exe 103 PID 4928 wrote to memory of 2732 4928 net.exe 103 PID 4928 wrote to memory of 2732 4928 net.exe 103 PID 5076 wrote to memory of 4488 5076 Rundll32.exe 104 PID 5076 wrote to memory of 4488 5076 Rundll32.exe 104 PID 5076 wrote to memory of 4488 5076 Rundll32.exe 104 PID 1476 wrote to memory of 2492 1476 system.exe 106 PID 1476 wrote to memory of 2492 1476 system.exe 106 PID 1476 wrote to memory of 2492 1476 system.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d6474856eebb3ec9eb9f184f478a8aefd555518a3b4ea289a61405d89b0dbe8.exe"C:\Users\Admin\AppData\Local\Temp\0d6474856eebb3ec9eb9f184f478a8aefd555518a3b4ea289a61405d89b0dbe8.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\SysWOW64\Rundll32.exeRundll32 C:\Windows\system32\lueoifaa.dll Exxcute3⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\SysWOW64\net.exenet stop WinDefend4⤵
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend5⤵PID:628
-
-
-
C:\Windows\SysWOW64\net.exenet stop MpsSvc4⤵
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc5⤵PID:2732
-
-
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled4⤵
- Launches sc.exe
PID:732
-
-
C:\Windows\SysWOW64\sc.exesc stop ZhuDongFangYu4⤵
- Launches sc.exe
PID:808
-
-
C:\Windows\SysWOW64\sc.exesc delete ZhuDongFangYu4⤵
- Launches sc.exe
PID:3556
-
-
C:\Windows\SysWOW64\sc.exesc stop 360rp4⤵
- Launches sc.exe
PID:2076
-
-
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled4⤵
- Launches sc.exe
PID:4784
-
-
C:\Windows\SysWOW64\sc.exesc delete 360rp4⤵
- Launches sc.exe
PID:4568
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" stop PolicyAgent4⤵
- Launches sc.exe
PID:4488
-
-
-
C:\Windows\SysWOW64\Rundll32.exeRundll32 C:\Windows\system32\mgrqifaa.dll Exucute3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
PID:2492
-
-
-
C:\Users\Admin\AppData\Local\Temp\0d6474856eebb3ec9eb9f184f478a8aefd555518a3b4ea289a61405d89b0dbe8.exeC:\Users\Admin\AppData\Local\Temp\0d6474856eebb3ec9eb9f184f478a8aefd555518a3b4ea289a61405d89b0dbe8.exe2⤵
- Executes dropped EXE
PID:3984
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\0d6474856eebb3ec9eb9f184f478a8aefd555518a3b4ea289a61405d89b0dbe8.exe
Filesize48KB
MD51dbc417928fb253236d9c759662ddffc
SHA13207e750a7e813122d14e40e5d6250971be0213c
SHA25663f129eec6d284298420892776c41b6ad88c1c5a0cae79fa5ee6fa3ab1acc0f8
SHA5125e90fdb51b521cd6d6fadfe7fd2d0a6baf16691f680f138cda2f2e94b6ac847b53ad63322d58577ab963db1b66df4195891f9edb1b99047b5052365e9b202473
-
Filesize
4.3MB
MD56c7cdd25c2cb0073306eb22aebfc663f
SHA1a1eba8ab49272b9852fe6a543677e8af36271248
SHA25658280e3572333f97a7cf9f33e8d31dc26a98b6535965ebd0bde82249fc9bf705
SHA51217344e07b9e9b2cd6ae4237d7f310732462f9cbb8656883607d7a1a4090e869265f92a6da1718dee50b1375b91583de60c6bd9e7e8db6b6e45e33f4b894365d6
-
Filesize
75KB
MD5d15bce781b57100f494bde31dd457b0d
SHA174cbb52c3a6158c1212fa768a976c4e37d8027c8
SHA256fe79071c980d755d6fb1d920cb6502285b452fecedafddded7fba078fd849d0f
SHA51284d98b3b74de99bf2e169dd8d117427cb4fc783b509f3ec53e68b01cea7d98029359243a8b31947a0676af480aba3169a1ff1e25ff031815b710579b7411229a
-
Filesize
75KB
MD5d15bce781b57100f494bde31dd457b0d
SHA174cbb52c3a6158c1212fa768a976c4e37d8027c8
SHA256fe79071c980d755d6fb1d920cb6502285b452fecedafddded7fba078fd849d0f
SHA51284d98b3b74de99bf2e169dd8d117427cb4fc783b509f3ec53e68b01cea7d98029359243a8b31947a0676af480aba3169a1ff1e25ff031815b710579b7411229a
-
Filesize
22KB
MD5f12c28f2a2114ec3de5f8f8f3016d0e7
SHA1222cf179a1c166b9ac7edd1764cbf13ad2bbcff3
SHA25637ce328a0c04a5de1606a55088abf71abc0c86fcd113bdc3f1956b3d1882130b
SHA512975c5eeb1ceca48cac01d05649991c5b4160c6970a93f1c8c3a38c3f29345023ffa5b95c4f0f86be6fa431ab98ce25116234dd7eeda5f80bd7e035317eba32cf
-
Filesize
22KB
MD5f12c28f2a2114ec3de5f8f8f3016d0e7
SHA1222cf179a1c166b9ac7edd1764cbf13ad2bbcff3
SHA25637ce328a0c04a5de1606a55088abf71abc0c86fcd113bdc3f1956b3d1882130b
SHA512975c5eeb1ceca48cac01d05649991c5b4160c6970a93f1c8c3a38c3f29345023ffa5b95c4f0f86be6fa431ab98ce25116234dd7eeda5f80bd7e035317eba32cf
-
Filesize
140KB
MD5573f07e84c503c1139a346d99d7ab876
SHA1a81a5477710cf93e67fc6cd46a2846f7c7290a0d
SHA256d2af0696b318e78b7cb7560ecfe99fce7efd7bd0e2568f439074431c34bb3ecf
SHA51262b9257693ea2d937c1d1bc6aeb8886e8471cdadbb2afd14118de248e39bef3f8315c3196178ea2a60b386bf0ff78f9bc971f54f3984938aca660eaa78797249
-
Filesize
140KB
MD5573f07e84c503c1139a346d99d7ab876
SHA1a81a5477710cf93e67fc6cd46a2846f7c7290a0d
SHA256d2af0696b318e78b7cb7560ecfe99fce7efd7bd0e2568f439074431c34bb3ecf
SHA51262b9257693ea2d937c1d1bc6aeb8886e8471cdadbb2afd14118de248e39bef3f8315c3196178ea2a60b386bf0ff78f9bc971f54f3984938aca660eaa78797249