Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2022, 14:05
Static task
static1
Behavioral task
behavioral1
Sample
1cf515f3703846fc5f83ab053ab501e126fc4171d57cff4f53d7b8e489fb5d6a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1cf515f3703846fc5f83ab053ab501e126fc4171d57cff4f53d7b8e489fb5d6a.exe
Resource
win10v2004-20220901-en
General
-
Target
1cf515f3703846fc5f83ab053ab501e126fc4171d57cff4f53d7b8e489fb5d6a.exe
-
Size
122KB
-
MD5
53ebe3efa9bdad1a2af74252ccf19bd2
-
SHA1
74e3bea45a504edd34ac009c5abcc56f477617b9
-
SHA256
1cf515f3703846fc5f83ab053ab501e126fc4171d57cff4f53d7b8e489fb5d6a
-
SHA512
6f8ff09930a0f8502c93ce4cfc2f92d526e7aa348848e5df23e021aa419cea06dbc3ddcf6cceae92c8f14416cda3a43bf3b82e539ef2f57637e160e60c51455b
-
SSDEEP
3072:TAY9SuJNW8CZ+zTyxvJ530A3RAVavmyKoSiZBtJ:TPX69ZMyxx5kA3RAVauZoSiZ7
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 3428 eHBOuTw3.exe 3364 eHBOuTw3.exe 4684 eHBOuTw3.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 1cf515f3703846fc5f83ab053ab501e126fc4171d57cff4f53d7b8e489fb5d6a.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 1cf515f3703846fc5f83ab053ab501e126fc4171d57cff4f53d7b8e489fb5d6a.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 1cf515f3703846fc5f83ab053ab501e126fc4171d57cff4f53d7b8e489fb5d6a.exe -
Unexpected DNS network traffic destination 10 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 188.190.98.22 Destination IP 188.190.98.22 Destination IP 188.190.98.22 Destination IP 188.190.98.22 Destination IP 188.190.98.22 Destination IP 188.190.98.22 Destination IP 188.190.98.22 Destination IP 188.190.98.22 Destination IP 188.190.98.22 Destination IP 188.190.98.22 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies Internet Explorer Protected Mode 1 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" 1cf515f3703846fc5f83ab053ab501e126fc4171d57cff4f53d7b8e489fb5d6a.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" eHBOuTw3.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" 1cf515f3703846fc5f83ab053ab501e126fc4171d57cff4f53d7b8e489fb5d6a.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" eHBOuTw3.exe -
Modifies Internet Explorer Protected Mode Banner 1 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" 1cf515f3703846fc5f83ab053ab501e126fc4171d57cff4f53d7b8e489fb5d6a.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" eHBOuTw3.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" 1cf515f3703846fc5f83ab053ab501e126fc4171d57cff4f53d7b8e489fb5d6a.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" eHBOuTw3.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\DisableScriptDebuggerIE = "yes" eHBOuTw3.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Error Dlg Displayed On Every Error = "no" eHBOuTw3.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\DisableScriptDebuggerIE = "yes" 1cf515f3703846fc5f83ab053ab501e126fc4171d57cff4f53d7b8e489fb5d6a.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Error Dlg Displayed On Every Error = "no" 1cf515f3703846fc5f83ab053ab501e126fc4171d57cff4f53d7b8e489fb5d6a.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\DisableScriptDebuggerIE = "yes" eHBOuTw3.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Error Dlg Displayed On Every Error = "no" eHBOuTw3.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\DisableScriptDebuggerIE = "yes" 1cf515f3703846fc5f83ab053ab501e126fc4171d57cff4f53d7b8e489fb5d6a.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Error Dlg Displayed On Every Error = "no" 1cf515f3703846fc5f83ab053ab501e126fc4171d57cff4f53d7b8e489fb5d6a.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4368 1cf515f3703846fc5f83ab053ab501e126fc4171d57cff4f53d7b8e489fb5d6a.exe 4368 1cf515f3703846fc5f83ab053ab501e126fc4171d57cff4f53d7b8e489fb5d6a.exe 4368 1cf515f3703846fc5f83ab053ab501e126fc4171d57cff4f53d7b8e489fb5d6a.exe 4368 1cf515f3703846fc5f83ab053ab501e126fc4171d57cff4f53d7b8e489fb5d6a.exe 4592 1cf515f3703846fc5f83ab053ab501e126fc4171d57cff4f53d7b8e489fb5d6a.exe 4592 1cf515f3703846fc5f83ab053ab501e126fc4171d57cff4f53d7b8e489fb5d6a.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4368 wrote to memory of 3428 4368 1cf515f3703846fc5f83ab053ab501e126fc4171d57cff4f53d7b8e489fb5d6a.exe 90 PID 4368 wrote to memory of 3428 4368 1cf515f3703846fc5f83ab053ab501e126fc4171d57cff4f53d7b8e489fb5d6a.exe 90 PID 4368 wrote to memory of 3428 4368 1cf515f3703846fc5f83ab053ab501e126fc4171d57cff4f53d7b8e489fb5d6a.exe 90 PID 4368 wrote to memory of 4592 4368 1cf515f3703846fc5f83ab053ab501e126fc4171d57cff4f53d7b8e489fb5d6a.exe 106 PID 4368 wrote to memory of 4592 4368 1cf515f3703846fc5f83ab053ab501e126fc4171d57cff4f53d7b8e489fb5d6a.exe 106 PID 4368 wrote to memory of 4592 4368 1cf515f3703846fc5f83ab053ab501e126fc4171d57cff4f53d7b8e489fb5d6a.exe 106 PID 4592 wrote to memory of 3364 4592 1cf515f3703846fc5f83ab053ab501e126fc4171d57cff4f53d7b8e489fb5d6a.exe 107 PID 4592 wrote to memory of 3364 4592 1cf515f3703846fc5f83ab053ab501e126fc4171d57cff4f53d7b8e489fb5d6a.exe 107 PID 4592 wrote to memory of 3364 4592 1cf515f3703846fc5f83ab053ab501e126fc4171d57cff4f53d7b8e489fb5d6a.exe 107 PID 4592 wrote to memory of 3240 4592 1cf515f3703846fc5f83ab053ab501e126fc4171d57cff4f53d7b8e489fb5d6a.exe 110 PID 4592 wrote to memory of 3240 4592 1cf515f3703846fc5f83ab053ab501e126fc4171d57cff4f53d7b8e489fb5d6a.exe 110 PID 4592 wrote to memory of 3240 4592 1cf515f3703846fc5f83ab053ab501e126fc4171d57cff4f53d7b8e489fb5d6a.exe 110 PID 3240 wrote to memory of 4684 3240 1cf515f3703846fc5f83ab053ab501e126fc4171d57cff4f53d7b8e489fb5d6a.exe 111 PID 3240 wrote to memory of 4684 3240 1cf515f3703846fc5f83ab053ab501e126fc4171d57cff4f53d7b8e489fb5d6a.exe 111 PID 3240 wrote to memory of 4684 3240 1cf515f3703846fc5f83ab053ab501e126fc4171d57cff4f53d7b8e489fb5d6a.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\1cf515f3703846fc5f83ab053ab501e126fc4171d57cff4f53d7b8e489fb5d6a.exe"C:\Users\Admin\AppData\Local\Temp\1cf515f3703846fc5f83ab053ab501e126fc4171d57cff4f53d7b8e489fb5d6a.exe"1⤵
- Checks computer location settings
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\ProgramData\eHBOuTw3.exe"C:\ProgramData\eHBOuTw3.exe"2⤵
- Executes dropped EXE
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
PID:3428
-
-
C:\Users\Admin\AppData\Local\Temp\1cf515f3703846fc5f83ab053ab501e126fc4171d57cff4f53d7b8e489fb5d6a.exe"C:\Users\Admin\AppData\Local\Temp\1cf515f3703846fc5f83ab053ab501e126fc4171d57cff4f53d7b8e489fb5d6a.exe"2⤵
- Checks computer location settings
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\ProgramData\eHBOuTw3.exe"C:\ProgramData\eHBOuTw3.exe"3⤵
- Executes dropped EXE
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
PID:3364
-
-
C:\Users\Admin\AppData\Local\Temp\1cf515f3703846fc5f83ab053ab501e126fc4171d57cff4f53d7b8e489fb5d6a.exe"C:\Users\Admin\AppData\Local\Temp\1cf515f3703846fc5f83ab053ab501e126fc4171d57cff4f53d7b8e489fb5d6a.exe"3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\ProgramData\eHBOuTw3.exe"C:\ProgramData\eHBOuTw3.exe"4⤵
- Executes dropped EXE
PID:4684
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
122KB
MD553ebe3efa9bdad1a2af74252ccf19bd2
SHA174e3bea45a504edd34ac009c5abcc56f477617b9
SHA2561cf515f3703846fc5f83ab053ab501e126fc4171d57cff4f53d7b8e489fb5d6a
SHA5126f8ff09930a0f8502c93ce4cfc2f92d526e7aa348848e5df23e021aa419cea06dbc3ddcf6cceae92c8f14416cda3a43bf3b82e539ef2f57637e160e60c51455b
-
Filesize
122KB
MD553ebe3efa9bdad1a2af74252ccf19bd2
SHA174e3bea45a504edd34ac009c5abcc56f477617b9
SHA2561cf515f3703846fc5f83ab053ab501e126fc4171d57cff4f53d7b8e489fb5d6a
SHA5126f8ff09930a0f8502c93ce4cfc2f92d526e7aa348848e5df23e021aa419cea06dbc3ddcf6cceae92c8f14416cda3a43bf3b82e539ef2f57637e160e60c51455b
-
Filesize
122KB
MD553ebe3efa9bdad1a2af74252ccf19bd2
SHA174e3bea45a504edd34ac009c5abcc56f477617b9
SHA2561cf515f3703846fc5f83ab053ab501e126fc4171d57cff4f53d7b8e489fb5d6a
SHA5126f8ff09930a0f8502c93ce4cfc2f92d526e7aa348848e5df23e021aa419cea06dbc3ddcf6cceae92c8f14416cda3a43bf3b82e539ef2f57637e160e60c51455b
-
Filesize
122KB
MD553ebe3efa9bdad1a2af74252ccf19bd2
SHA174e3bea45a504edd34ac009c5abcc56f477617b9
SHA2561cf515f3703846fc5f83ab053ab501e126fc4171d57cff4f53d7b8e489fb5d6a
SHA5126f8ff09930a0f8502c93ce4cfc2f92d526e7aa348848e5df23e021aa419cea06dbc3ddcf6cceae92c8f14416cda3a43bf3b82e539ef2f57637e160e60c51455b
-
Filesize
122KB
MD553ebe3efa9bdad1a2af74252ccf19bd2
SHA174e3bea45a504edd34ac009c5abcc56f477617b9
SHA2561cf515f3703846fc5f83ab053ab501e126fc4171d57cff4f53d7b8e489fb5d6a
SHA5126f8ff09930a0f8502c93ce4cfc2f92d526e7aa348848e5df23e021aa419cea06dbc3ddcf6cceae92c8f14416cda3a43bf3b82e539ef2f57637e160e60c51455b