Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 14:37
Static task
static1
Behavioral task
behavioral1
Sample
336b1661b66a240f252fdd6b53a43be92793e834945ac9e9eca475ea86b43ff7.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
336b1661b66a240f252fdd6b53a43be92793e834945ac9e9eca475ea86b43ff7.exe
Resource
win10v2004-20220901-en
General
-
Target
336b1661b66a240f252fdd6b53a43be92793e834945ac9e9eca475ea86b43ff7.exe
-
Size
260KB
-
MD5
690e1920cf7edb4f2d66685745f2e710
-
SHA1
f7d730f09c6fead005001e7c34902667e7400032
-
SHA256
336b1661b66a240f252fdd6b53a43be92793e834945ac9e9eca475ea86b43ff7
-
SHA512
9482f72c71516fc474e95931f8f8948a603f0b12f48a6ec6f2e0092c32caef0590ed2c527dddecd6cb3bac4c4fd84f76f4e091bb4641ef205637981f0b3e435f
-
SSDEEP
3072:TezGZqJUcQUPU8xnxRIGLP9pMfs7ufRJRUz7hwfiiQJV3L58MrxO:TeiZLeU8xUegfRDfsJV3KM
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 6 3848 Rundll32.exe -
Executes dropped EXE 2 IoCs
pid Process 5012 system.exe 2716 336b1661b66a240f252fdd6b53a43be92793e834945ac9e9eca475ea86b43ff7.exe -
Stops running service(s) 3 TTPs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Rundll32.exe -
Loads dropped DLL 3 IoCs
pid Process 356 Rundll32.exe 3848 Rundll32.exe 3848 Rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\system = "C:\\Windows\\system32\\system.exe" Rundll32.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: Rundll32.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\system.exe 336b1661b66a240f252fdd6b53a43be92793e834945ac9e9eca475ea86b43ff7.exe File created C:\Windows\SysWOW64\cfopifaa.dll system.exe File created C:\Windows\SysWOW64\vgdrifaa.dll system.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files\AAV\CDriver.sys Rundll32.exe -
Launches sc.exe 7 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2700 sc.exe 2992 sc.exe 2164 sc.exe 1660 sc.exe 2732 sc.exe 3724 sc.exe 4604 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 5012 system.exe 5012 system.exe 356 Rundll32.exe 356 Rundll32.exe 356 Rundll32.exe 356 Rundll32.exe 356 Rundll32.exe 356 Rundll32.exe 356 Rundll32.exe 356 Rundll32.exe 356 Rundll32.exe 356 Rundll32.exe 356 Rundll32.exe 356 Rundll32.exe 356 Rundll32.exe 356 Rundll32.exe 3848 Rundll32.exe 3848 Rundll32.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 644 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4896 336b1661b66a240f252fdd6b53a43be92793e834945ac9e9eca475ea86b43ff7.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2716 336b1661b66a240f252fdd6b53a43be92793e834945ac9e9eca475ea86b43ff7.exe 2716 336b1661b66a240f252fdd6b53a43be92793e834945ac9e9eca475ea86b43ff7.exe 2716 336b1661b66a240f252fdd6b53a43be92793e834945ac9e9eca475ea86b43ff7.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 4896 wrote to memory of 5012 4896 336b1661b66a240f252fdd6b53a43be92793e834945ac9e9eca475ea86b43ff7.exe 82 PID 4896 wrote to memory of 5012 4896 336b1661b66a240f252fdd6b53a43be92793e834945ac9e9eca475ea86b43ff7.exe 82 PID 4896 wrote to memory of 5012 4896 336b1661b66a240f252fdd6b53a43be92793e834945ac9e9eca475ea86b43ff7.exe 82 PID 5012 wrote to memory of 356 5012 system.exe 83 PID 5012 wrote to memory of 356 5012 system.exe 83 PID 5012 wrote to memory of 356 5012 system.exe 83 PID 356 wrote to memory of 3464 356 Rundll32.exe 84 PID 356 wrote to memory of 3464 356 Rundll32.exe 84 PID 356 wrote to memory of 3464 356 Rundll32.exe 84 PID 356 wrote to memory of 788 356 Rundll32.exe 85 PID 356 wrote to memory of 788 356 Rundll32.exe 85 PID 356 wrote to memory of 788 356 Rundll32.exe 85 PID 356 wrote to memory of 2992 356 Rundll32.exe 91 PID 356 wrote to memory of 2992 356 Rundll32.exe 91 PID 356 wrote to memory of 2992 356 Rundll32.exe 91 PID 356 wrote to memory of 2700 356 Rundll32.exe 90 PID 356 wrote to memory of 2700 356 Rundll32.exe 90 PID 356 wrote to memory of 2700 356 Rundll32.exe 90 PID 356 wrote to memory of 2164 356 Rundll32.exe 92 PID 356 wrote to memory of 2164 356 Rundll32.exe 92 PID 356 wrote to memory of 2164 356 Rundll32.exe 92 PID 356 wrote to memory of 1660 356 Rundll32.exe 93 PID 356 wrote to memory of 1660 356 Rundll32.exe 93 PID 356 wrote to memory of 1660 356 Rundll32.exe 93 PID 356 wrote to memory of 2732 356 Rundll32.exe 94 PID 356 wrote to memory of 2732 356 Rundll32.exe 94 PID 356 wrote to memory of 2732 356 Rundll32.exe 94 PID 356 wrote to memory of 3724 356 Rundll32.exe 95 PID 356 wrote to memory of 3724 356 Rundll32.exe 95 PID 356 wrote to memory of 3724 356 Rundll32.exe 95 PID 356 wrote to memory of 4896 356 Rundll32.exe 80 PID 356 wrote to memory of 4896 356 Rundll32.exe 80 PID 356 wrote to memory of 5012 356 Rundll32.exe 82 PID 356 wrote to memory of 5012 356 Rundll32.exe 82 PID 356 wrote to memory of 3464 356 Rundll32.exe 84 PID 356 wrote to memory of 3464 356 Rundll32.exe 84 PID 356 wrote to memory of 788 356 Rundll32.exe 85 PID 356 wrote to memory of 788 356 Rundll32.exe 85 PID 356 wrote to memory of 2992 356 Rundll32.exe 91 PID 356 wrote to memory of 2992 356 Rundll32.exe 91 PID 356 wrote to memory of 2700 356 Rundll32.exe 90 PID 356 wrote to memory of 2700 356 Rundll32.exe 90 PID 356 wrote to memory of 2164 356 Rundll32.exe 92 PID 356 wrote to memory of 2164 356 Rundll32.exe 92 PID 356 wrote to memory of 1660 356 Rundll32.exe 93 PID 356 wrote to memory of 1660 356 Rundll32.exe 93 PID 356 wrote to memory of 2732 356 Rundll32.exe 94 PID 356 wrote to memory of 2732 356 Rundll32.exe 94 PID 3464 wrote to memory of 1920 3464 net.exe 100 PID 3464 wrote to memory of 1920 3464 net.exe 100 PID 3464 wrote to memory of 1920 3464 net.exe 100 PID 788 wrote to memory of 2268 788 net.exe 101 PID 788 wrote to memory of 2268 788 net.exe 101 PID 788 wrote to memory of 2268 788 net.exe 101 PID 356 wrote to memory of 4604 356 Rundll32.exe 102 PID 356 wrote to memory of 4604 356 Rundll32.exe 102 PID 356 wrote to memory of 4604 356 Rundll32.exe 102 PID 5012 wrote to memory of 3848 5012 system.exe 104 PID 5012 wrote to memory of 3848 5012 system.exe 104 PID 5012 wrote to memory of 3848 5012 system.exe 104 PID 4896 wrote to memory of 2716 4896 336b1661b66a240f252fdd6b53a43be92793e834945ac9e9eca475ea86b43ff7.exe 112 PID 4896 wrote to memory of 2716 4896 336b1661b66a240f252fdd6b53a43be92793e834945ac9e9eca475ea86b43ff7.exe 112 PID 4896 wrote to memory of 2716 4896 336b1661b66a240f252fdd6b53a43be92793e834945ac9e9eca475ea86b43ff7.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\336b1661b66a240f252fdd6b53a43be92793e834945ac9e9eca475ea86b43ff7.exe"C:\Users\Admin\AppData\Local\Temp\336b1661b66a240f252fdd6b53a43be92793e834945ac9e9eca475ea86b43ff7.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Windows\SysWOW64\Rundll32.exeRundll32 C:\Windows\system32\cfopifaa.dll Exxcute3⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:356 -
C:\Windows\SysWOW64\net.exenet stop WinDefend4⤵
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend5⤵PID:1920
-
-
-
C:\Windows\SysWOW64\net.exenet stop MpsSvc4⤵
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc5⤵PID:2268
-
-
-
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled4⤵
- Launches sc.exe
PID:2700
-
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled4⤵
- Launches sc.exe
PID:2992
-
-
C:\Windows\SysWOW64\sc.exesc stop ZhuDongFangYu4⤵
- Launches sc.exe
PID:2164
-
-
C:\Windows\SysWOW64\sc.exesc delete ZhuDongFangYu4⤵
- Launches sc.exe
PID:1660
-
-
C:\Windows\SysWOW64\sc.exesc stop 360rp4⤵
- Launches sc.exe
PID:2732
-
-
C:\Windows\SysWOW64\sc.exesc delete 360rp4⤵
- Launches sc.exe
PID:3724
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" stop PolicyAgent4⤵
- Launches sc.exe
PID:4604
-
-
-
C:\Windows\SysWOW64\Rundll32.exeRundll32 C:\Windows\system32\vgdrifaa.dll Exucute3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
PID:3848
-
-
-
C:\Users\Admin\AppData\Local\Temp\336b1661b66a240f252fdd6b53a43be92793e834945ac9e9eca475ea86b43ff7.exeC:\Users\Admin\AppData\Local\Temp\336b1661b66a240f252fdd6b53a43be92793e834945ac9e9eca475ea86b43ff7.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2716
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\336b1661b66a240f252fdd6b53a43be92793e834945ac9e9eca475ea86b43ff7.exe
Filesize108KB
MD58e5b467a5679e89d8e386713fee20bf4
SHA11febaaa60c3019c47ff035f8319469f747aac2cf
SHA25664dc8c4d9f640b91b08d604c615caeac2ddd78c80190ce154f1cc884f65b2637
SHA512b35ca07e473d561b1a09c0a128a5840763f6a538293cb6cde99c6ce8495bbdaa2a2e6cb70b458a10012350a792f0889ac8b2ab7704514d2a7379bd6ca0b5a368
-
Filesize
4.3MB
MD56c7cdd25c2cb0073306eb22aebfc663f
SHA1a1eba8ab49272b9852fe6a543677e8af36271248
SHA25658280e3572333f97a7cf9f33e8d31dc26a98b6535965ebd0bde82249fc9bf705
SHA51217344e07b9e9b2cd6ae4237d7f310732462f9cbb8656883607d7a1a4090e869265f92a6da1718dee50b1375b91583de60c6bd9e7e8db6b6e45e33f4b894365d6
-
Filesize
76KB
MD5eee47dc87eac9004c88a14ecb74f68b7
SHA1fb655609e5325aedbc32970e07a9ff1def649495
SHA2561842b912afece361d3a2f62ca742e5940d312f431773f5701d534044b8143c9e
SHA512e9b58771260bea011c69bbb22fafad18c6c858aad7e23f8565fdccefa054954236f21e25570c53b7c2ca1016da580d0713a929405700a23a8eaefeceee35c22c
-
Filesize
76KB
MD5eee47dc87eac9004c88a14ecb74f68b7
SHA1fb655609e5325aedbc32970e07a9ff1def649495
SHA2561842b912afece361d3a2f62ca742e5940d312f431773f5701d534044b8143c9e
SHA512e9b58771260bea011c69bbb22fafad18c6c858aad7e23f8565fdccefa054954236f21e25570c53b7c2ca1016da580d0713a929405700a23a8eaefeceee35c22c
-
Filesize
141KB
MD5d38207a5dd73ffd8c9ffe21fcd3f2a53
SHA1e5e792ef21a75423318e8d503ed88ba7bbfbcb45
SHA256b51a122cf9228b7a017331146d05b1a50685fbc604cfd608fcbdbe89622387c3
SHA512730c66e2490692f991ce80ff4df4126e40539034d938df5a9fdf47807579a06b598fce46e8c2982dce583f7a55e077da74dc1a1a94cac154c13678c20710b7ba
-
Filesize
141KB
MD5d38207a5dd73ffd8c9ffe21fcd3f2a53
SHA1e5e792ef21a75423318e8d503ed88ba7bbfbcb45
SHA256b51a122cf9228b7a017331146d05b1a50685fbc604cfd608fcbdbe89622387c3
SHA512730c66e2490692f991ce80ff4df4126e40539034d938df5a9fdf47807579a06b598fce46e8c2982dce583f7a55e077da74dc1a1a94cac154c13678c20710b7ba
-
Filesize
21KB
MD52642b0beb97e9113be39215406b6d40b
SHA1cbcc7ddce2eb844dfc47876e566fda122d062a76
SHA25683e8298f58ddb4cef0580a3bb70fa023c82143e0af63ef6a275e19b3ef93b282
SHA51266659311a109dea93abfa2f4e9287d011e686774d6e30e24991fa88a0ec6a44304f46ed99680a19752a437ea2d83519e3d2c0c5bf676fae0c4af6e285c955b36
-
Filesize
21KB
MD52642b0beb97e9113be39215406b6d40b
SHA1cbcc7ddce2eb844dfc47876e566fda122d062a76
SHA25683e8298f58ddb4cef0580a3bb70fa023c82143e0af63ef6a275e19b3ef93b282
SHA51266659311a109dea93abfa2f4e9287d011e686774d6e30e24991fa88a0ec6a44304f46ed99680a19752a437ea2d83519e3d2c0c5bf676fae0c4af6e285c955b36