Analysis
-
max time kernel
164s -
max time network
178s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2022, 07:30
Behavioral task
behavioral1
Sample
6ab686dcf22216be050dd449e582d0210b83bb973f3cf7a9fac6b183bb631138.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6ab686dcf22216be050dd449e582d0210b83bb973f3cf7a9fac6b183bb631138.exe
Resource
win10v2004-20220812-en
General
-
Target
6ab686dcf22216be050dd449e582d0210b83bb973f3cf7a9fac6b183bb631138.exe
-
Size
36KB
-
MD5
5b821c8266e4092ae9a1e447fcf3820c
-
SHA1
d5bf94666d736f4fda4c5cbd335290b1b4d7c135
-
SHA256
6ab686dcf22216be050dd449e582d0210b83bb973f3cf7a9fac6b183bb631138
-
SHA512
730ad91b6af73ff7ccef24521091fae77e87a3d5899ef3f11f7e6894bf69ee34e39d7d23716471a8f65078bb164c10db09acf889603a57e7b60885603add5855
-
SSDEEP
768:DXym2RHT6BiHjWQR8SX8MZ0ExZqj+dqTht:Tj2IBw5F0Jt
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4720 BHOCALL.EXE -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A47BE134-9ACE-2457-ABD0-3AE14579BDE1} 6ab686dcf22216be050dd449e582d0210b83bb973f3cf7a9fac6b183bb631138.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A47BE134-9ACE-2457-ABD0-3AE14579BDE1}\StubPath = "C:\\Windows\\system32\\BHOCALL.EXE" 6ab686dcf22216be050dd449e582d0210b83bb973f3cf7a9fac6b183bb631138.exe -
resource yara_rule behavioral2/memory/1316-133-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/files/0x000a000000022ddf-136.dat upx behavioral2/files/0x000a000000022ddf-137.dat upx behavioral2/memory/4720-138-0x0000000000400000-0x000000000040A000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\BHOCALL.EXE 6ab686dcf22216be050dd449e582d0210b83bb973f3cf7a9fac6b183bb631138.exe File opened for modification C:\Windows\SysWOW64\BHOCALL.EXE 6ab686dcf22216be050dd449e582d0210b83bb973f3cf7a9fac6b183bb631138.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage\Command BHOCALL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D} BHOCALL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage BHOCALL.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage\Command 6ab686dcf22216be050dd449e582d0210b83bb973f3cf7a9fac6b183bb631138.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 6ab686dcf22216be050dd449e582d0210b83bb973f3cf7a9fac6b183bb631138.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell 6ab686dcf22216be050dd449e582d0210b83bb973f3cf7a9fac6b183bb631138.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage 6ab686dcf22216be050dd449e582d0210b83bb973f3cf7a9fac6b183bb631138.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D} 6ab686dcf22216be050dd449e582d0210b83bb973f3cf7a9fac6b183bb631138.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID BHOCALL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell BHOCALL.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings OpenWith.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 2400 PING.EXE 4384 PING.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1316 6ab686dcf22216be050dd449e582d0210b83bb973f3cf7a9fac6b183bb631138.exe Token: SeDebugPrivilege 4720 BHOCALL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3584 OpenWith.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1316 wrote to memory of 4620 1316 6ab686dcf22216be050dd449e582d0210b83bb973f3cf7a9fac6b183bb631138.exe 80 PID 1316 wrote to memory of 4620 1316 6ab686dcf22216be050dd449e582d0210b83bb973f3cf7a9fac6b183bb631138.exe 80 PID 1316 wrote to memory of 4620 1316 6ab686dcf22216be050dd449e582d0210b83bb973f3cf7a9fac6b183bb631138.exe 80 PID 4620 wrote to memory of 2400 4620 cmd.exe 82 PID 4620 wrote to memory of 2400 4620 cmd.exe 82 PID 4620 wrote to memory of 2400 4620 cmd.exe 82 PID 4620 wrote to memory of 4720 4620 cmd.exe 83 PID 4620 wrote to memory of 4720 4620 cmd.exe 83 PID 4620 wrote to memory of 4720 4620 cmd.exe 83 PID 4720 wrote to memory of 4616 4720 BHOCALL.EXE 84 PID 4720 wrote to memory of 4616 4720 BHOCALL.EXE 84 PID 4720 wrote to memory of 4616 4720 BHOCALL.EXE 84 PID 4616 wrote to memory of 4384 4616 cmd.exe 87 PID 4616 wrote to memory of 4384 4616 cmd.exe 87 PID 4616 wrote to memory of 4384 4616 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ab686dcf22216be050dd449e582d0210b83bb973f3cf7a9fac6b183bb631138.exe"C:\Users\Admin\AppData\Local\Temp\6ab686dcf22216be050dd449e582d0210b83bb973f3cf7a9fac6b183bb631138.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3 &del 6ab686dcf22216be050dd449e582d0210b83bb973f3cf7a9fac6b183bb631138.exe &start BHOCALL.EXE2⤵
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 33⤵
- Runs ping.exe
PID:2400
-
-
C:\Windows\SysWOW64\BHOCALL.EXEBHOCALL.EXE3⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\SysWOW64\cmd.execmd /c if exist C:\Users\Admin\AppData\Local\Temp\\~E89F.tmp start C:\Users\Admin\AppData\Local\Temp\\~E89F.tmp&ping 127.0.0.1 -n 20&if exist C:\Users\Admin\AppData\Local\Temp\\~E89F.tmp del C:\Users\Admin\AppData\Local\Temp\\~E89F.tmp4⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 205⤵
- Runs ping.exe
PID:4384
-
-
-
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3584
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD55b821c8266e4092ae9a1e447fcf3820c
SHA1d5bf94666d736f4fda4c5cbd335290b1b4d7c135
SHA2566ab686dcf22216be050dd449e582d0210b83bb973f3cf7a9fac6b183bb631138
SHA512730ad91b6af73ff7ccef24521091fae77e87a3d5899ef3f11f7e6894bf69ee34e39d7d23716471a8f65078bb164c10db09acf889603a57e7b60885603add5855
-
Filesize
36KB
MD55b821c8266e4092ae9a1e447fcf3820c
SHA1d5bf94666d736f4fda4c5cbd335290b1b4d7c135
SHA2566ab686dcf22216be050dd449e582d0210b83bb973f3cf7a9fac6b183bb631138
SHA512730ad91b6af73ff7ccef24521091fae77e87a3d5899ef3f11f7e6894bf69ee34e39d7d23716471a8f65078bb164c10db09acf889603a57e7b60885603add5855