Analysis
-
max time kernel
154s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
21/10/2022, 02:45
Behavioral task
behavioral1
Sample
0bc92633b426d835db2260178dd7de9c3c15abc8770abe39ac5e4e5ebb31655e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0bc92633b426d835db2260178dd7de9c3c15abc8770abe39ac5e4e5ebb31655e.exe
Resource
win10v2004-20220812-en
General
-
Target
0bc92633b426d835db2260178dd7de9c3c15abc8770abe39ac5e4e5ebb31655e.exe
-
Size
825KB
-
MD5
16ed750a2e7830f6e3292ad2c94d67e8
-
SHA1
8fc754951f5250f1d2b6196fdd6716f573bf0d17
-
SHA256
0bc92633b426d835db2260178dd7de9c3c15abc8770abe39ac5e4e5ebb31655e
-
SHA512
c0ed224f7eb440fd2242bf9412b423364bae2eb2e234f4e841c84e0486a836f7adee1b33731e447e4da67291396ec821e80e8f4904b3d70f125f708944cd1fb5
-
SSDEEP
24576:mH8BetlVOo3T0/NRoihx753MnpXTJLCbkZ:rktPOx/Jh16B93Z
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 10 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\Microsfot Windows Updater\iexplore.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Microsfot Windows Updater\\iexplore.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\iexplore.exe = "C:\\Users\\Admin\\AppData\\Roaming\\iexplore.exe:*:Enabled:Windows Messanger" reg.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\blank = "C:\\Users\\Admin\\AppData\\Roaming\\iexplore.exe" iexplore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run iexplore.exe -
Executes dropped EXE 3 IoCs
pid Process 1148 iexplore.exe 1880 iexplore.exe 2560 iexplore.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\blank iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\blank\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\iexplore.exe" iexplore.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\blank iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\blank\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\iexplore.exe" iexplore.exe -
resource yara_rule behavioral2/memory/4248-132-0x0000000000400000-0x0000000000DA5000-memory.dmp upx behavioral2/memory/4248-135-0x0000000000400000-0x0000000000DA5000-memory.dmp upx behavioral2/files/0x0006000000022f67-140.dat upx behavioral2/files/0x0006000000022f67-141.dat upx behavioral2/memory/4248-142-0x0000000000400000-0x0000000000DA5000-memory.dmp upx behavioral2/memory/1148-145-0x0000000000400000-0x0000000000DA5000-memory.dmp upx behavioral2/memory/1148-146-0x0000000000400000-0x0000000000DA5000-memory.dmp upx behavioral2/memory/1880-148-0x0000000000400000-0x0000000000474000-memory.dmp upx behavioral2/files/0x0006000000022f67-149.dat upx behavioral2/memory/1880-154-0x0000000000400000-0x0000000000474000-memory.dmp upx behavioral2/files/0x0006000000022f67-155.dat upx behavioral2/memory/1880-151-0x0000000000400000-0x0000000000474000-memory.dmp upx behavioral2/memory/1148-164-0x0000000000400000-0x0000000000DA5000-memory.dmp upx behavioral2/memory/1880-165-0x0000000000400000-0x0000000000474000-memory.dmp upx behavioral2/memory/1880-166-0x0000000000400000-0x0000000000474000-memory.dmp upx behavioral2/memory/1880-176-0x0000000000400000-0x0000000000474000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 0bc92633b426d835db2260178dd7de9c3c15abc8770abe39ac5e4e5ebb31655e.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\blank = "C:\\Users\\Admin\\AppData\\Roaming\\iexplore.exe" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\blank = "C:\\Users\\Admin\\AppData\\Roaming\\iexplore.exe" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Updater = "C:\\Users\\Admin\\AppData\\Roaming\\Microsfot Windows Updater\\iexplore.exe" reg.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1148 set thread context of 1880 1148 iexplore.exe 95 PID 1148 set thread context of 2560 1148 iexplore.exe 96 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 4 IoCs
pid Process 1300 reg.exe 2404 reg.exe 4712 reg.exe 4288 reg.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
description pid Process Token: SeDebugPrivilege 2560 iexplore.exe Token: 1 1880 iexplore.exe Token: SeCreateTokenPrivilege 1880 iexplore.exe Token: SeAssignPrimaryTokenPrivilege 1880 iexplore.exe Token: SeLockMemoryPrivilege 1880 iexplore.exe Token: SeIncreaseQuotaPrivilege 1880 iexplore.exe Token: SeMachineAccountPrivilege 1880 iexplore.exe Token: SeTcbPrivilege 1880 iexplore.exe Token: SeSecurityPrivilege 1880 iexplore.exe Token: SeTakeOwnershipPrivilege 1880 iexplore.exe Token: SeLoadDriverPrivilege 1880 iexplore.exe Token: SeSystemProfilePrivilege 1880 iexplore.exe Token: SeSystemtimePrivilege 1880 iexplore.exe Token: SeProfSingleProcessPrivilege 1880 iexplore.exe Token: SeIncBasePriorityPrivilege 1880 iexplore.exe Token: SeCreatePagefilePrivilege 1880 iexplore.exe Token: SeCreatePermanentPrivilege 1880 iexplore.exe Token: SeBackupPrivilege 1880 iexplore.exe Token: SeRestorePrivilege 1880 iexplore.exe Token: SeShutdownPrivilege 1880 iexplore.exe Token: SeDebugPrivilege 1880 iexplore.exe Token: SeAuditPrivilege 1880 iexplore.exe Token: SeSystemEnvironmentPrivilege 1880 iexplore.exe Token: SeChangeNotifyPrivilege 1880 iexplore.exe Token: SeRemoteShutdownPrivilege 1880 iexplore.exe Token: SeUndockPrivilege 1880 iexplore.exe Token: SeSyncAgentPrivilege 1880 iexplore.exe Token: SeEnableDelegationPrivilege 1880 iexplore.exe Token: SeManageVolumePrivilege 1880 iexplore.exe Token: SeImpersonatePrivilege 1880 iexplore.exe Token: SeCreateGlobalPrivilege 1880 iexplore.exe Token: 31 1880 iexplore.exe Token: 32 1880 iexplore.exe Token: 33 1880 iexplore.exe Token: 34 1880 iexplore.exe Token: 35 1880 iexplore.exe Token: SeDebugPrivilege 1880 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4248 0bc92633b426d835db2260178dd7de9c3c15abc8770abe39ac5e4e5ebb31655e.exe 1148 iexplore.exe 1880 iexplore.exe 1880 iexplore.exe 2560 iexplore.exe 1880 iexplore.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 4248 wrote to memory of 1680 4248 0bc92633b426d835db2260178dd7de9c3c15abc8770abe39ac5e4e5ebb31655e.exe 89 PID 4248 wrote to memory of 1680 4248 0bc92633b426d835db2260178dd7de9c3c15abc8770abe39ac5e4e5ebb31655e.exe 89 PID 4248 wrote to memory of 1680 4248 0bc92633b426d835db2260178dd7de9c3c15abc8770abe39ac5e4e5ebb31655e.exe 89 PID 1680 wrote to memory of 532 1680 cmd.exe 92 PID 1680 wrote to memory of 532 1680 cmd.exe 92 PID 1680 wrote to memory of 532 1680 cmd.exe 92 PID 4248 wrote to memory of 1148 4248 0bc92633b426d835db2260178dd7de9c3c15abc8770abe39ac5e4e5ebb31655e.exe 93 PID 4248 wrote to memory of 1148 4248 0bc92633b426d835db2260178dd7de9c3c15abc8770abe39ac5e4e5ebb31655e.exe 93 PID 4248 wrote to memory of 1148 4248 0bc92633b426d835db2260178dd7de9c3c15abc8770abe39ac5e4e5ebb31655e.exe 93 PID 1148 wrote to memory of 1880 1148 iexplore.exe 95 PID 1148 wrote to memory of 1880 1148 iexplore.exe 95 PID 1148 wrote to memory of 1880 1148 iexplore.exe 95 PID 1148 wrote to memory of 1880 1148 iexplore.exe 95 PID 1148 wrote to memory of 1880 1148 iexplore.exe 95 PID 1148 wrote to memory of 1880 1148 iexplore.exe 95 PID 1148 wrote to memory of 1880 1148 iexplore.exe 95 PID 1148 wrote to memory of 1880 1148 iexplore.exe 95 PID 1148 wrote to memory of 2560 1148 iexplore.exe 96 PID 1148 wrote to memory of 2560 1148 iexplore.exe 96 PID 1148 wrote to memory of 2560 1148 iexplore.exe 96 PID 1148 wrote to memory of 2560 1148 iexplore.exe 96 PID 1148 wrote to memory of 2560 1148 iexplore.exe 96 PID 1148 wrote to memory of 2560 1148 iexplore.exe 96 PID 1148 wrote to memory of 2560 1148 iexplore.exe 96 PID 1880 wrote to memory of 4592 1880 iexplore.exe 97 PID 1880 wrote to memory of 4592 1880 iexplore.exe 97 PID 1880 wrote to memory of 4592 1880 iexplore.exe 97 PID 1880 wrote to memory of 4664 1880 iexplore.exe 99 PID 1880 wrote to memory of 4664 1880 iexplore.exe 99 PID 1880 wrote to memory of 4664 1880 iexplore.exe 99 PID 1880 wrote to memory of 4100 1880 iexplore.exe 100 PID 1880 wrote to memory of 4100 1880 iexplore.exe 100 PID 1880 wrote to memory of 4100 1880 iexplore.exe 100 PID 1880 wrote to memory of 4972 1880 iexplore.exe 104 PID 1880 wrote to memory of 4972 1880 iexplore.exe 104 PID 1880 wrote to memory of 4972 1880 iexplore.exe 104 PID 4664 wrote to memory of 2404 4664 cmd.exe 106 PID 4664 wrote to memory of 2404 4664 cmd.exe 106 PID 4664 wrote to memory of 2404 4664 cmd.exe 106 PID 4100 wrote to memory of 1300 4100 cmd.exe 105 PID 4100 wrote to memory of 1300 4100 cmd.exe 105 PID 4100 wrote to memory of 1300 4100 cmd.exe 105 PID 4972 wrote to memory of 4712 4972 cmd.exe 107 PID 4972 wrote to memory of 4712 4972 cmd.exe 107 PID 4972 wrote to memory of 4712 4972 cmd.exe 107 PID 4592 wrote to memory of 4288 4592 cmd.exe 108 PID 4592 wrote to memory of 4288 4592 cmd.exe 108 PID 4592 wrote to memory of 4288 4592 cmd.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\0bc92633b426d835db2260178dd7de9c3c15abc8770abe39ac5e4e5ebb31655e.exe"C:\Users\Admin\AppData\Local\Temp\0bc92633b426d835db2260178dd7de9c3c15abc8770abe39ac5e4e5ebb31655e.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ZEpSo.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Microsoft Windows Updater" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsfot Windows Updater\iexplore.exe" /f3⤵
- Adds Run key to start application
PID:532
-
-
-
C:\Users\Admin\AppData\Roaming\Microsfot Windows Updater\iexplore.exe"C:\Users\Admin\AppData\Roaming\Microsfot Windows Updater\iexplore.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Users\Admin\AppData\Roaming\Microsfot Windows Updater\iexplore.exe"C:\Users\Admin\AppData\Roaming\Microsfot Windows Updater\iexplore.exe"3⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- Modifies registry key
PID:4288
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Microsfot Windows Updater\iexplore.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsfot Windows Updater\iexplore.exe:*:Enabled:Windows Messanger" /f4⤵
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Microsfot Windows Updater\iexplore.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsfot Windows Updater\iexplore.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- Modifies registry key
PID:2404
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- Modifies registry key
PID:1300
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\iexplore.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\iexplore.exe:*:Enabled:Windows Messanger" /f4⤵
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\iexplore.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\iexplore.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- Modifies registry key
PID:4712
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsfot Windows Updater\iexplore.exe"C:\Users\Admin\AppData\Roaming\Microsfot Windows Updater\iexplore.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2560
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
179B
MD5e0239fbdb672e83a9be13c6b2bc427b8
SHA1447dd4f50b6accd5dd492e7a96ee4a395084ebe5
SHA256e8a72e3efeb2d2fc968f814e99d4de49e20a7f0f87f5bf712e8fec203e4673e8
SHA512e1cbf7cd1b0ec2bbc493741ef1c9965224b505c001fa5045ab527bc50018d9014696d3feb4b3237e5046b8c215df645ec767f6876b8840d20d986ad04e3886b7
-
Filesize
825KB
MD516ed750a2e7830f6e3292ad2c94d67e8
SHA18fc754951f5250f1d2b6196fdd6716f573bf0d17
SHA2560bc92633b426d835db2260178dd7de9c3c15abc8770abe39ac5e4e5ebb31655e
SHA512c0ed224f7eb440fd2242bf9412b423364bae2eb2e234f4e841c84e0486a836f7adee1b33731e447e4da67291396ec821e80e8f4904b3d70f125f708944cd1fb5
-
Filesize
825KB
MD516ed750a2e7830f6e3292ad2c94d67e8
SHA18fc754951f5250f1d2b6196fdd6716f573bf0d17
SHA2560bc92633b426d835db2260178dd7de9c3c15abc8770abe39ac5e4e5ebb31655e
SHA512c0ed224f7eb440fd2242bf9412b423364bae2eb2e234f4e841c84e0486a836f7adee1b33731e447e4da67291396ec821e80e8f4904b3d70f125f708944cd1fb5
-
Filesize
825KB
MD516ed750a2e7830f6e3292ad2c94d67e8
SHA18fc754951f5250f1d2b6196fdd6716f573bf0d17
SHA2560bc92633b426d835db2260178dd7de9c3c15abc8770abe39ac5e4e5ebb31655e
SHA512c0ed224f7eb440fd2242bf9412b423364bae2eb2e234f4e841c84e0486a836f7adee1b33731e447e4da67291396ec821e80e8f4904b3d70f125f708944cd1fb5
-
Filesize
825KB
MD516ed750a2e7830f6e3292ad2c94d67e8
SHA18fc754951f5250f1d2b6196fdd6716f573bf0d17
SHA2560bc92633b426d835db2260178dd7de9c3c15abc8770abe39ac5e4e5ebb31655e
SHA512c0ed224f7eb440fd2242bf9412b423364bae2eb2e234f4e841c84e0486a836f7adee1b33731e447e4da67291396ec821e80e8f4904b3d70f125f708944cd1fb5