Analysis
-
max time kernel
181s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2022 04:47
Static task
static1
Behavioral task
behavioral1
Sample
84c86b461afe2a2a02392beee58313e1.exe
Resource
win7-20220812-en
General
-
Target
84c86b461afe2a2a02392beee58313e1.exe
-
Size
357KB
-
MD5
84c86b461afe2a2a02392beee58313e1
-
SHA1
f362a9be8a825e0940c18fe9139c2517f6728575
-
SHA256
26a26eb8f02e73198e75453ca06445d45da4a11914011d545c7da0964323043b
-
SHA512
f0486af628753ca2a5fe8cad4f8139a11604361764db9840c9171b266d22aff0a942a9c92d0a252e5dc81c7e1388d0fa17e0212b9e29f4a82e893d4a6490de33
-
SSDEEP
6144:HNeZmC8pMv7OibcWkF+MeXbYpBpMqEVv138KeHMk7mP/9so2UL0dNCjJfGLR0:HNljJERMyEpNEVvcgwdNCjtGS
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
ragbwalbdm.exepid process 4792 ragbwalbdm.exe -
Loads dropped DLL 1 IoCs
Processes:
ragbwalbdm.exepid process 2976 ragbwalbdm.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
ragbwalbdm.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hituptjfikw = "C:\\Users\\Admin\\AppData\\Roaming\\myniqcs\\qkhbxqocpo.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\ragbwalbdm.exe\"" ragbwalbdm.exe -
Processes:
ragbwalbdm.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ragbwalbdm.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
ragbwalbdm.exedescription pid process target process PID 4792 set thread context of 2976 4792 ragbwalbdm.exe ragbwalbdm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4344 4792 WerFault.exe ragbwalbdm.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
ragbwalbdm.exepid process 2976 ragbwalbdm.exe 2976 ragbwalbdm.exe 2976 ragbwalbdm.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
ragbwalbdm.exepid process 2976 ragbwalbdm.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
ragbwalbdm.exedescription pid process Token: SeDebugPrivilege 2976 ragbwalbdm.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
84c86b461afe2a2a02392beee58313e1.exeragbwalbdm.exedescription pid process target process PID 2056 wrote to memory of 4792 2056 84c86b461afe2a2a02392beee58313e1.exe ragbwalbdm.exe PID 2056 wrote to memory of 4792 2056 84c86b461afe2a2a02392beee58313e1.exe ragbwalbdm.exe PID 2056 wrote to memory of 4792 2056 84c86b461afe2a2a02392beee58313e1.exe ragbwalbdm.exe PID 4792 wrote to memory of 2976 4792 ragbwalbdm.exe ragbwalbdm.exe PID 4792 wrote to memory of 2976 4792 ragbwalbdm.exe ragbwalbdm.exe PID 4792 wrote to memory of 2976 4792 ragbwalbdm.exe ragbwalbdm.exe PID 4792 wrote to memory of 2976 4792 ragbwalbdm.exe ragbwalbdm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\84c86b461afe2a2a02392beee58313e1.exe"C:\Users\Admin\AppData\Local\Temp\84c86b461afe2a2a02392beee58313e1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\ragbwalbdm.exe"C:\Users\Admin\AppData\Local\Temp\ragbwalbdm.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\ragbwalbdm.exe"C:\Users\Admin\AppData\Local\Temp\ragbwalbdm.exe"3⤵
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4792 -s 6443⤵
- Program crash
PID:4344
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4792 -ip 47921⤵PID:2672
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5bce5ca75820b0d5e1279b9067c05da4f
SHA19248b8e6d81b49b7d58cc19468b8a63b0e79800b
SHA256400fa3bf5cbcb75ec1319f40dd58d96f1409f32786090eab95c6a6639e881da7
SHA512d12fcc8e54bcaaac93c092eb97e6a8668b7c6d40fc8f9cbca65a77014a1afa0cc82ea5fc8a84a9b34b8e3a807cf3bd76e919af35730768787d66a527c1cee1d0
-
Filesize
124KB
MD56c30bd1abe8602165d89ac12bc7b5dc3
SHA16a523a2244b1eeba57416dc3b8f91ea166d84c1b
SHA256454ac440b820c6fc22867037aae0b963c323da63d116b4abc0a23b3d361c8aad
SHA5125283b8177defe8f8bd5da87619d18b2518951ab3654a506363e4fb2bec0888d7ce2704fb5dc6cb8fde3964c722c44b5a4dc89c4e4df91ef5d217c28e093e6dac
-
Filesize
124KB
MD56c30bd1abe8602165d89ac12bc7b5dc3
SHA16a523a2244b1eeba57416dc3b8f91ea166d84c1b
SHA256454ac440b820c6fc22867037aae0b963c323da63d116b4abc0a23b3d361c8aad
SHA5125283b8177defe8f8bd5da87619d18b2518951ab3654a506363e4fb2bec0888d7ce2704fb5dc6cb8fde3964c722c44b5a4dc89c4e4df91ef5d217c28e093e6dac
-
Filesize
124KB
MD56c30bd1abe8602165d89ac12bc7b5dc3
SHA16a523a2244b1eeba57416dc3b8f91ea166d84c1b
SHA256454ac440b820c6fc22867037aae0b963c323da63d116b4abc0a23b3d361c8aad
SHA5125283b8177defe8f8bd5da87619d18b2518951ab3654a506363e4fb2bec0888d7ce2704fb5dc6cb8fde3964c722c44b5a4dc89c4e4df91ef5d217c28e093e6dac
-
Filesize
280KB
MD57f6cbb6cfcda91ec274aa12c5119cf5f
SHA1bcc5c4e09c371ff75bcb299bab60045588a4389f
SHA2568461f62bc8bf1b2f9cef9e6947ac1d519f5810151f0040f27eca3001fd42b641
SHA5128831f5dc6fe4da76b15d48c36e4c6b86396ebd5337fa10c382cf9a82fe0d5fdaffb8c8b62a8cdf7bf9fc140221cba2eac64eaf755e2ff38b73f60d726ec93d1f