Analysis
-
max time kernel
144s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19-10-2022 15:46
Static task
static1
Behavioral task
behavioral1
Sample
56a811fd6dffbdc6ea4fd497fbb2d3db0d47045deba2d235d6fe13c3cd73faea.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
56a811fd6dffbdc6ea4fd497fbb2d3db0d47045deba2d235d6fe13c3cd73faea.exe
Resource
win10v2004-20220812-en
General
-
Target
56a811fd6dffbdc6ea4fd497fbb2d3db0d47045deba2d235d6fe13c3cd73faea.exe
-
Size
1.2MB
-
MD5
a18dcc398139154de6b694db84b46a20
-
SHA1
c75bea6cad85a87e42c2b4e6e3e756bdc78e15b5
-
SHA256
56a811fd6dffbdc6ea4fd497fbb2d3db0d47045deba2d235d6fe13c3cd73faea
-
SHA512
a3617cdfc1573addecd06628ba210265203aa6213565cc6dc7b655fc186b9a24bffb20c9b600c5db5701375aaa7f1c6e67659c3f33e28ec837a0c10a6dab1fdf
-
SSDEEP
24576:3tb20pkaCqT5TBWgNQ7aLoc2Zwkw2Id1gq3JA36A:0Vg5tQ7aLoc2FFId1gq3JG5
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3396 98925.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 56a811fd6dffbdc6ea4fd497fbb2d3db0d47045deba2d235d6fe13c3cd73faea.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 98925.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WerFault = "C:\\Users\\Admin\\AppData\\Roaming\\98925.exe" 98925.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000d000000022e15-133.dat autoit_exe behavioral2/files/0x000d000000022e15-134.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3396 set thread context of 908 3396 98925.exe 83 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3364 908 WerFault.exe 83 -
NTFS ADS 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\56a811fd6dffbdc6ea4fd497fbb2d3db0d47045deba2d235d6fe13c3cd73faea.exe:Zone.Identifier:$DATA 56a811fd6dffbdc6ea4fd497fbb2d3db0d47045deba2d235d6fe13c3cd73faea.exe File created C:\Users\Admin\AppData\Roaming\98925.exe\:Zone.Identifier:$DATA 56a811fd6dffbdc6ea4fd497fbb2d3db0d47045deba2d235d6fe13c3cd73faea.exe File opened for modification C:\Users\Admin\AppData\Roaming\98925.exe:Zone.Identifier:$DATA 98925.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 2992 56a811fd6dffbdc6ea4fd497fbb2d3db0d47045deba2d235d6fe13c3cd73faea.exe 2992 56a811fd6dffbdc6ea4fd497fbb2d3db0d47045deba2d235d6fe13c3cd73faea.exe 2992 56a811fd6dffbdc6ea4fd497fbb2d3db0d47045deba2d235d6fe13c3cd73faea.exe 2992 56a811fd6dffbdc6ea4fd497fbb2d3db0d47045deba2d235d6fe13c3cd73faea.exe 3396 98925.exe 3396 98925.exe 3396 98925.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 2992 56a811fd6dffbdc6ea4fd497fbb2d3db0d47045deba2d235d6fe13c3cd73faea.exe 2992 56a811fd6dffbdc6ea4fd497fbb2d3db0d47045deba2d235d6fe13c3cd73faea.exe 2992 56a811fd6dffbdc6ea4fd497fbb2d3db0d47045deba2d235d6fe13c3cd73faea.exe 2992 56a811fd6dffbdc6ea4fd497fbb2d3db0d47045deba2d235d6fe13c3cd73faea.exe 3396 98925.exe 3396 98925.exe 3396 98925.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2992 wrote to memory of 3396 2992 56a811fd6dffbdc6ea4fd497fbb2d3db0d47045deba2d235d6fe13c3cd73faea.exe 81 PID 2992 wrote to memory of 3396 2992 56a811fd6dffbdc6ea4fd497fbb2d3db0d47045deba2d235d6fe13c3cd73faea.exe 81 PID 2992 wrote to memory of 3396 2992 56a811fd6dffbdc6ea4fd497fbb2d3db0d47045deba2d235d6fe13c3cd73faea.exe 81 PID 3396 wrote to memory of 908 3396 98925.exe 83 PID 3396 wrote to memory of 908 3396 98925.exe 83 PID 3396 wrote to memory of 908 3396 98925.exe 83 PID 3396 wrote to memory of 908 3396 98925.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\56a811fd6dffbdc6ea4fd497fbb2d3db0d47045deba2d235d6fe13c3cd73faea.exe"C:\Users\Admin\AppData\Local\Temp\56a811fd6dffbdc6ea4fd497fbb2d3db0d47045deba2d235d6fe13c3cd73faea.exe"1⤵
- Checks computer location settings
- NTFS ADS
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Users\Admin\AppData\Roaming\98925.exe"C:\Users\Admin\AppData\Roaming\98925.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- NTFS ADS
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵PID:908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 908 -s 804⤵
- Program crash
PID:3364
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 908 -ip 9081⤵PID:1740
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
355KB
MD578ba668db1856f03ec5ad0390fc9a37f
SHA1d6ca40967c71c602827cb58fe07e2598280be564
SHA256e18bb1fb9dd27e14a6f672b5ce3c891b3a0ae50deb7b2a751c83817f6c1e6d4b
SHA512f25d8585680592aba09c9d878da1cde29a5119e769ddf782f943ecd26ce9732a031314ee7c1708b072a84c8e2c5b0ee6f4e94f9c4a9b9feda00a50be44bfaa3b
-
Filesize
1.2MB
MD5a18dcc398139154de6b694db84b46a20
SHA1c75bea6cad85a87e42c2b4e6e3e756bdc78e15b5
SHA25656a811fd6dffbdc6ea4fd497fbb2d3db0d47045deba2d235d6fe13c3cd73faea
SHA512a3617cdfc1573addecd06628ba210265203aa6213565cc6dc7b655fc186b9a24bffb20c9b600c5db5701375aaa7f1c6e67659c3f33e28ec837a0c10a6dab1fdf
-
Filesize
1.2MB
MD5a18dcc398139154de6b694db84b46a20
SHA1c75bea6cad85a87e42c2b4e6e3e756bdc78e15b5
SHA25656a811fd6dffbdc6ea4fd497fbb2d3db0d47045deba2d235d6fe13c3cd73faea
SHA512a3617cdfc1573addecd06628ba210265203aa6213565cc6dc7b655fc186b9a24bffb20c9b600c5db5701375aaa7f1c6e67659c3f33e28ec837a0c10a6dab1fdf