Analysis
-
max time kernel
146s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2022 06:45
Static task
static1
Behavioral task
behavioral1
Sample
37903e1d9f8876ee33f42eb2d4d507cc35a37fb4de5408d95be31f3b5a319aec.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
37903e1d9f8876ee33f42eb2d4d507cc35a37fb4de5408d95be31f3b5a319aec.exe
Resource
win10v2004-20220812-en
General
-
Target
37903e1d9f8876ee33f42eb2d4d507cc35a37fb4de5408d95be31f3b5a319aec.exe
-
Size
740KB
-
MD5
67ef6a3258121c5c085080180698a2e0
-
SHA1
9ed5f1c51d5609b1b1402a41f2121676af9e5103
-
SHA256
37903e1d9f8876ee33f42eb2d4d507cc35a37fb4de5408d95be31f3b5a319aec
-
SHA512
b66b367b6c12f195c6b32f665b5bb25d9af9ed96224444236031b5fd9d0306294415dab3f3a489cc63dc0bf5191862485e359f453ff804138b6eb9215e61f803
-
SSDEEP
12288:+w80KZh/N1tcD1/OVQNvRtYuupRA9gN5UQXGcuWEw/+PxBTApHqxhyjY1NEAIvO+:+w80Kx1SR/Jb8T+QqWGcNXqxdApHYysU
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 5060 servers.exe 5012 niubo_setup_1581.exe 4620 irsetup.exe -
resource yara_rule behavioral2/files/0x0006000000022e07-138.dat upx behavioral2/files/0x0006000000022e07-139.dat upx behavioral2/memory/4620-140-0x0000000000400000-0x0000000000527000-memory.dmp upx behavioral2/memory/4620-141-0x0000000000400000-0x0000000000527000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 37903e1d9f8876ee33f42eb2d4d507cc35a37fb4de5408d95be31f3b5a319aec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4620 irsetup.exe 4620 irsetup.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2012 wrote to memory of 5060 2012 37903e1d9f8876ee33f42eb2d4d507cc35a37fb4de5408d95be31f3b5a319aec.exe 82 PID 2012 wrote to memory of 5060 2012 37903e1d9f8876ee33f42eb2d4d507cc35a37fb4de5408d95be31f3b5a319aec.exe 82 PID 2012 wrote to memory of 5060 2012 37903e1d9f8876ee33f42eb2d4d507cc35a37fb4de5408d95be31f3b5a319aec.exe 82 PID 2012 wrote to memory of 5012 2012 37903e1d9f8876ee33f42eb2d4d507cc35a37fb4de5408d95be31f3b5a319aec.exe 83 PID 2012 wrote to memory of 5012 2012 37903e1d9f8876ee33f42eb2d4d507cc35a37fb4de5408d95be31f3b5a319aec.exe 83 PID 2012 wrote to memory of 5012 2012 37903e1d9f8876ee33f42eb2d4d507cc35a37fb4de5408d95be31f3b5a319aec.exe 83 PID 5012 wrote to memory of 4620 5012 niubo_setup_1581.exe 84 PID 5012 wrote to memory of 4620 5012 niubo_setup_1581.exe 84 PID 5012 wrote to memory of 4620 5012 niubo_setup_1581.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\37903e1d9f8876ee33f42eb2d4d507cc35a37fb4de5408d95be31f3b5a319aec.exe"C:\Users\Admin\AppData\Local\Temp\37903e1d9f8876ee33f42eb2d4d507cc35a37fb4de5408d95be31f3b5a319aec.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\servers.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\servers.exe"2⤵
- Executes dropped EXE
PID:5060
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\niubo_setup_1581.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\niubo_setup_1581.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\_ir_sf7_temp_0\irsetup.exe__IRAOFF:500236 "__IRAFN:C:\Users\Admin\AppData\Local\Temp\RarSFX0\niubo_setup_1581.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4620
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
644KB
MD5b77cc3a61118ce5909a97fe98496dd9c
SHA172e7902317d13f5c9df4966e350b432459075f7f
SHA256eda21d56f93441d8ee26dee6aab9d174ae8e01e8a0b5b0516f0cc11bc39881cc
SHA512fd7296b77c9bbbaecf635a89b1dd1f74e1b7caaf3b1b7c2d1ba53e47814edb4381403b26c8bfb292f3f1dd2f5a0c81242282c6e275bfb34ac8eb4b829f8641bf
-
Filesize
644KB
MD5b77cc3a61118ce5909a97fe98496dd9c
SHA172e7902317d13f5c9df4966e350b432459075f7f
SHA256eda21d56f93441d8ee26dee6aab9d174ae8e01e8a0b5b0516f0cc11bc39881cc
SHA512fd7296b77c9bbbaecf635a89b1dd1f74e1b7caaf3b1b7c2d1ba53e47814edb4381403b26c8bfb292f3f1dd2f5a0c81242282c6e275bfb34ac8eb4b829f8641bf
-
Filesize
59KB
MD5c0929836a21a2816ce47232f2816041b
SHA11a16faf63d2c08bbb019e8fb1524b8027b802b58
SHA256e5817e9b0c41053150e2b98aa8cca4420545563604ddb82d4dfe56e5e2710307
SHA512b5cc450f1c4add00557eb3c2bdc42e82ba15a05e98954103490c5ad32b274d729a04112354e2bb6eee2ec03070761285d1a3c0684ebfb01e04539270dd560fe8
-
Filesize
440KB
MD575ca7ff96bf5a316c3af2de6a412bd54
SHA10a093950790ff0dddff6f5f29c6b02c10997e0c5
SHA256d95b5bf9ca97c1900de5357743282bab655d61d616606485088e1708559b7cf1
SHA512b8da86f2f1e908955254e5168d0447f479cec7815a8b081a7b38eb87187cb2eb992109c67e006361b96bc1529ee8abc9dc477d78e9ca565e43f5415b492771d4
-
Filesize
440KB
MD575ca7ff96bf5a316c3af2de6a412bd54
SHA10a093950790ff0dddff6f5f29c6b02c10997e0c5
SHA256d95b5bf9ca97c1900de5357743282bab655d61d616606485088e1708559b7cf1
SHA512b8da86f2f1e908955254e5168d0447f479cec7815a8b081a7b38eb87187cb2eb992109c67e006361b96bc1529ee8abc9dc477d78e9ca565e43f5415b492771d4