Analysis

  • max time kernel
    154s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/10/2022, 02:45

General

  • Target

    0bc92633b426d835db2260178dd7de9c3c15abc8770abe39ac5e4e5ebb31655e.exe

  • Size

    825KB

  • MD5

    16ed750a2e7830f6e3292ad2c94d67e8

  • SHA1

    8fc754951f5250f1d2b6196fdd6716f573bf0d17

  • SHA256

    0bc92633b426d835db2260178dd7de9c3c15abc8770abe39ac5e4e5ebb31655e

  • SHA512

    c0ed224f7eb440fd2242bf9412b423364bae2eb2e234f4e841c84e0486a836f7adee1b33731e447e4da67291396ec821e80e8f4904b3d70f125f708944cd1fb5

  • SSDEEP

    24576:mH8BetlVOo3T0/NRoihx753MnpXTJLCbkZ:rktPOx/Jh16B93Z

Score
10/10

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 10 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • UPX packed file 16 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 6 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry key 1 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 37 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0bc92633b426d835db2260178dd7de9c3c15abc8770abe39ac5e4e5ebb31655e.exe
    "C:\Users\Admin\AppData\Local\Temp\0bc92633b426d835db2260178dd7de9c3c15abc8770abe39ac5e4e5ebb31655e.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4248
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ZEpSo.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1680
      • C:\Windows\SysWOW64\reg.exe
        REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Microsoft Windows Updater" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsfot Windows Updater\iexplore.exe" /f
        3⤵
        • Adds Run key to start application
        PID:532
    • C:\Users\Admin\AppData\Roaming\Microsfot Windows Updater\iexplore.exe
      "C:\Users\Admin\AppData\Roaming\Microsfot Windows Updater\iexplore.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1148
      • C:\Users\Admin\AppData\Roaming\Microsfot Windows Updater\iexplore.exe
        "C:\Users\Admin\AppData\Roaming\Microsfot Windows Updater\iexplore.exe"
        3⤵
        • Adds policy Run key to start application
        • Executes dropped EXE
        • Modifies Installed Components in the registry
        • Adds Run key to start application
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1880
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4592
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
            5⤵
            • Modifies firewall policy service
            • Modifies registry key
            PID:4288
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Microsfot Windows Updater\iexplore.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsfot Windows Updater\iexplore.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4664
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Microsfot Windows Updater\iexplore.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsfot Windows Updater\iexplore.exe:*:Enabled:Windows Messanger" /f
            5⤵
            • Modifies firewall policy service
            • Modifies registry key
            PID:2404
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4100
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
            5⤵
            • Modifies firewall policy service
            • Modifies registry key
            PID:1300
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\iexplore.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\iexplore.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4972
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\iexplore.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\iexplore.exe:*:Enabled:Windows Messanger" /f
            5⤵
            • Modifies firewall policy service
            • Modifies registry key
            PID:4712
      • C:\Users\Admin\AppData\Roaming\Microsfot Windows Updater\iexplore.exe
        "C:\Users\Admin\AppData\Roaming\Microsfot Windows Updater\iexplore.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2560

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\ZEpSo.bat

    Filesize

    179B

    MD5

    e0239fbdb672e83a9be13c6b2bc427b8

    SHA1

    447dd4f50b6accd5dd492e7a96ee4a395084ebe5

    SHA256

    e8a72e3efeb2d2fc968f814e99d4de49e20a7f0f87f5bf712e8fec203e4673e8

    SHA512

    e1cbf7cd1b0ec2bbc493741ef1c9965224b505c001fa5045ab527bc50018d9014696d3feb4b3237e5046b8c215df645ec767f6876b8840d20d986ad04e3886b7

  • C:\Users\Admin\AppData\Roaming\Microsfot Windows Updater\iexplore.exe

    Filesize

    825KB

    MD5

    16ed750a2e7830f6e3292ad2c94d67e8

    SHA1

    8fc754951f5250f1d2b6196fdd6716f573bf0d17

    SHA256

    0bc92633b426d835db2260178dd7de9c3c15abc8770abe39ac5e4e5ebb31655e

    SHA512

    c0ed224f7eb440fd2242bf9412b423364bae2eb2e234f4e841c84e0486a836f7adee1b33731e447e4da67291396ec821e80e8f4904b3d70f125f708944cd1fb5

  • C:\Users\Admin\AppData\Roaming\Microsfot Windows Updater\iexplore.exe

    Filesize

    825KB

    MD5

    16ed750a2e7830f6e3292ad2c94d67e8

    SHA1

    8fc754951f5250f1d2b6196fdd6716f573bf0d17

    SHA256

    0bc92633b426d835db2260178dd7de9c3c15abc8770abe39ac5e4e5ebb31655e

    SHA512

    c0ed224f7eb440fd2242bf9412b423364bae2eb2e234f4e841c84e0486a836f7adee1b33731e447e4da67291396ec821e80e8f4904b3d70f125f708944cd1fb5

  • C:\Users\Admin\AppData\Roaming\Microsfot Windows Updater\iexplore.exe

    Filesize

    825KB

    MD5

    16ed750a2e7830f6e3292ad2c94d67e8

    SHA1

    8fc754951f5250f1d2b6196fdd6716f573bf0d17

    SHA256

    0bc92633b426d835db2260178dd7de9c3c15abc8770abe39ac5e4e5ebb31655e

    SHA512

    c0ed224f7eb440fd2242bf9412b423364bae2eb2e234f4e841c84e0486a836f7adee1b33731e447e4da67291396ec821e80e8f4904b3d70f125f708944cd1fb5

  • C:\Users\Admin\AppData\Roaming\Microsfot Windows Updater\iexplore.exe

    Filesize

    825KB

    MD5

    16ed750a2e7830f6e3292ad2c94d67e8

    SHA1

    8fc754951f5250f1d2b6196fdd6716f573bf0d17

    SHA256

    0bc92633b426d835db2260178dd7de9c3c15abc8770abe39ac5e4e5ebb31655e

    SHA512

    c0ed224f7eb440fd2242bf9412b423364bae2eb2e234f4e841c84e0486a836f7adee1b33731e447e4da67291396ec821e80e8f4904b3d70f125f708944cd1fb5

  • memory/1148-146-0x0000000000400000-0x0000000000DA5000-memory.dmp

    Filesize

    9.6MB

  • memory/1148-145-0x0000000000400000-0x0000000000DA5000-memory.dmp

    Filesize

    9.6MB

  • memory/1148-164-0x0000000000400000-0x0000000000DA5000-memory.dmp

    Filesize

    9.6MB

  • memory/1880-148-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB

  • memory/1880-154-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB

  • memory/1880-176-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB

  • memory/1880-166-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB

  • memory/1880-165-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB

  • memory/1880-151-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB

  • memory/2560-167-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB

  • memory/2560-153-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB

  • memory/2560-157-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB

  • memory/2560-160-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB

  • memory/4248-132-0x0000000000400000-0x0000000000DA5000-memory.dmp

    Filesize

    9.6MB

  • memory/4248-142-0x0000000000400000-0x0000000000DA5000-memory.dmp

    Filesize

    9.6MB

  • memory/4248-135-0x0000000000400000-0x0000000000DA5000-memory.dmp

    Filesize

    9.6MB