Analysis
-
max time kernel
142s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2022, 09:25
Static task
static1
Behavioral task
behavioral1
Sample
085a9a7b49fdf4c755ee901db57c45b8701a59ff41a09cf8a64dcd38c9427a77.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
085a9a7b49fdf4c755ee901db57c45b8701a59ff41a09cf8a64dcd38c9427a77.exe
Resource
win10v2004-20220901-en
General
-
Target
085a9a7b49fdf4c755ee901db57c45b8701a59ff41a09cf8a64dcd38c9427a77.exe
-
Size
272KB
-
MD5
67d24324016c87757fc16492a006a130
-
SHA1
b82edc17e5c75f5858614439e3c713db95783ae7
-
SHA256
085a9a7b49fdf4c755ee901db57c45b8701a59ff41a09cf8a64dcd38c9427a77
-
SHA512
2aa361454ad6fc7ae337106150675fbfedae6cf3a8080ba761eb73e2e54ad22e37d9d28ca9a23c1ba8ad9314a71bd6412a5811d3ee86bb7a7b29443dee680d3b
-
SSDEEP
6144:2GqtMAGDrVlcSjUdymn7bug1hASdnoz6Za6uDRrqx:2QAGDrV9MbNhJdcDAx
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1584 eidolon.exe 4792 085a9a7b49fdf4c755ee901db57c45b8701a59ff41a09cf8a64dcd38c9427a77.exe 2596 USBServers32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 085a9a7b49fdf4c755ee901db57c45b8701a59ff41a09cf8a64dcd38c9427a77.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\windows\currentVersion\run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\USBServers32 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\USBServers32.exe" reg.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\shell32.dll eidolon.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4492 wrote to memory of 1584 4492 085a9a7b49fdf4c755ee901db57c45b8701a59ff41a09cf8a64dcd38c9427a77.exe 84 PID 4492 wrote to memory of 1584 4492 085a9a7b49fdf4c755ee901db57c45b8701a59ff41a09cf8a64dcd38c9427a77.exe 84 PID 4492 wrote to memory of 1584 4492 085a9a7b49fdf4c755ee901db57c45b8701a59ff41a09cf8a64dcd38c9427a77.exe 84 PID 4492 wrote to memory of 3140 4492 085a9a7b49fdf4c755ee901db57c45b8701a59ff41a09cf8a64dcd38c9427a77.exe 85 PID 4492 wrote to memory of 3140 4492 085a9a7b49fdf4c755ee901db57c45b8701a59ff41a09cf8a64dcd38c9427a77.exe 85 PID 4492 wrote to memory of 3140 4492 085a9a7b49fdf4c755ee901db57c45b8701a59ff41a09cf8a64dcd38c9427a77.exe 85 PID 4492 wrote to memory of 1280 4492 085a9a7b49fdf4c755ee901db57c45b8701a59ff41a09cf8a64dcd38c9427a77.exe 86 PID 4492 wrote to memory of 1280 4492 085a9a7b49fdf4c755ee901db57c45b8701a59ff41a09cf8a64dcd38c9427a77.exe 86 PID 4492 wrote to memory of 1280 4492 085a9a7b49fdf4c755ee901db57c45b8701a59ff41a09cf8a64dcd38c9427a77.exe 86 PID 1280 wrote to memory of 4792 1280 cmd.exe 89 PID 1280 wrote to memory of 4792 1280 cmd.exe 89 PID 1280 wrote to memory of 4792 1280 cmd.exe 89 PID 1280 wrote to memory of 2596 1280 cmd.exe 90 PID 1280 wrote to memory of 2596 1280 cmd.exe 90 PID 1280 wrote to memory of 2596 1280 cmd.exe 90 PID 2596 wrote to memory of 4592 2596 USBServers32.exe 91 PID 2596 wrote to memory of 4592 2596 USBServers32.exe 91 PID 2596 wrote to memory of 4592 2596 USBServers32.exe 91 PID 4592 wrote to memory of 1068 4592 cmd.exe 93 PID 4592 wrote to memory of 1068 4592 cmd.exe 93 PID 4592 wrote to memory of 1068 4592 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\085a9a7b49fdf4c755ee901db57c45b8701a59ff41a09cf8a64dcd38c9427a77.exe"C:\Users\Admin\AppData\Local\Temp\085a9a7b49fdf4c755ee901db57c45b8701a59ff41a09cf8a64dcd38c9427a77.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\eidolon.exe"C:\Users\Admin\AppData\Local\Temp\eidolon.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1584
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Windows\temp\tttdelzzz.bat" "2⤵PID:3140
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Windows\temp\tttbrozzz.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\085a9a7b49fdf4c755ee901db57c45b8701a59ff41a09cf8a64dcd38c9427a77.exe"C:\Users\Admin\AppData\Local\Temp\085a9a7b49fdf4c755ee901db57c45b8701a59ff41a09cf8a64dcd38c9427a77.exe"3⤵
- Executes dropped EXE
PID:4792
-
-
C:\Users\Admin\AppData\Local\Temp\USBServers32.exe"C:\Users\Admin\AppData\Local\Temp\USBServers32.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c reg add HKEY_CURRENT_USER\Software\Microsoft\windows\currentVersion\run /v USBServers32 /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\USBServers32.exe" /f4⤵
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Windows\SysWOW64\reg.exereg add HKEY_CURRENT_USER\Software\Microsoft\windows\currentVersion\run /v USBServers32 /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\USBServers32.exe" /f5⤵
- Adds Run key to start application
PID:1068
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\085a9a7b49fdf4c755ee901db57c45b8701a59ff41a09cf8a64dcd38c9427a77.exe
Filesize190KB
MD5fd85aa96145dca4e1ba6caeb833551cd
SHA10ed765cf03ca8d54a7abac31c54d957761a8174e
SHA25615dde1ed3d845168290e8ea1372ca271eaaad32fd5a2e8b15efed3ef94993fe8
SHA512800121f6fb0ac570c3c3d8eeb237f0a73da42c5353c6ac37def3c3440f50e86e51f37d6536907d5ea28e86caed4d42cb4d21f02235496c5aed416afcb9c9c546
-
C:\Users\Admin\AppData\Local\Temp\085a9a7b49fdf4c755ee901db57c45b8701a59ff41a09cf8a64dcd38c9427a77.exe
Filesize190KB
MD5fd85aa96145dca4e1ba6caeb833551cd
SHA10ed765cf03ca8d54a7abac31c54d957761a8174e
SHA25615dde1ed3d845168290e8ea1372ca271eaaad32fd5a2e8b15efed3ef94993fe8
SHA512800121f6fb0ac570c3c3d8eeb237f0a73da42c5353c6ac37def3c3440f50e86e51f37d6536907d5ea28e86caed4d42cb4d21f02235496c5aed416afcb9c9c546
-
Filesize
54KB
MD56428b1de8971e837926de5b464725f64
SHA119d7ce6fff617b790f9de7bf99406e61061f0594
SHA2568f53ab3cd172f685568e0cbb51eb7dfd2389a5fe6aaf47d0aa7d823253e673ee
SHA5127938b01ce48bcdd3276c83f82fc71407d101f2e884b3f271a17fcf4c60af642faf57047edab97906351217f79847107757283af3fbfc3059cf4eb8e8d778d026
-
Filesize
54KB
MD56428b1de8971e837926de5b464725f64
SHA119d7ce6fff617b790f9de7bf99406e61061f0594
SHA2568f53ab3cd172f685568e0cbb51eb7dfd2389a5fe6aaf47d0aa7d823253e673ee
SHA5127938b01ce48bcdd3276c83f82fc71407d101f2e884b3f271a17fcf4c60af642faf57047edab97906351217f79847107757283af3fbfc3059cf4eb8e8d778d026
-
Filesize
24KB
MD5f3858fb30c8ddb74a11e85381009c438
SHA1ab388dbb45109acd543d28030daf065e50e20a1b
SHA256a1bf9bc23f97fee5a83ddcb3ba4d8fbbcc70fb2d871b325261be0ded72196fe9
SHA5126aeb783c6ed7108480f956fd5b54a39a26d6257dc1c472d4d16700eb76be4276690596702fbc9a078662627673965584accf90449cd08dec461806ae3d57c0d1
-
Filesize
24KB
MD5f3858fb30c8ddb74a11e85381009c438
SHA1ab388dbb45109acd543d28030daf065e50e20a1b
SHA256a1bf9bc23f97fee5a83ddcb3ba4d8fbbcc70fb2d871b325261be0ded72196fe9
SHA5126aeb783c6ed7108480f956fd5b54a39a26d6257dc1c472d4d16700eb76be4276690596702fbc9a078662627673965584accf90449cd08dec461806ae3d57c0d1
-
Filesize
190KB
MD5fd85aa96145dca4e1ba6caeb833551cd
SHA10ed765cf03ca8d54a7abac31c54d957761a8174e
SHA25615dde1ed3d845168290e8ea1372ca271eaaad32fd5a2e8b15efed3ef94993fe8
SHA512800121f6fb0ac570c3c3d8eeb237f0a73da42c5353c6ac37def3c3440f50e86e51f37d6536907d5ea28e86caed4d42cb4d21f02235496c5aed416afcb9c9c546
-
Filesize
619B
MD5c3cb0db6ce0d8022d1dad396a3ceb9aa
SHA1fb9814642f10f197a49b57d93a3221d1ee1f8824
SHA2564d82d342962dacafe4562e7f9e0622aad28a289f5f4aec8947daffd8f7917db0
SHA512c03d1909984c01bf90cf4d16362897df10f25370534aeec0f293917865ff6067cf2401b289b146efbf5d53e094dfc59f9649f8a4bbb1b74cf688cb4244341b73
-
Filesize
327B
MD57422f906af11b0e261d0aa0e4a19c6f1
SHA16d4d19832dcf9b7fc327deda248bc5d1c937919b
SHA25660ed6615694d32216404d76c8707cf52845a34c6e56bb7f4edcc6464760b1f94
SHA512d5b3a380ee1beb75ff2a36fc5550b11004475edc79ff508d195b7ce7c616425648ff88074f2cd103bda626c9630e2c2247ec5fc1381551717a5283624a469afb