Analysis
-
max time kernel
183s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2022 02:30
Static task
static1
Behavioral task
behavioral1
Sample
e1e47746d68faf1f7417b75713f849f7ad4468a42c61bb6f8dfa502088c64cac.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e1e47746d68faf1f7417b75713f849f7ad4468a42c61bb6f8dfa502088c64cac.exe
Resource
win10v2004-20220812-en
General
-
Target
e1e47746d68faf1f7417b75713f849f7ad4468a42c61bb6f8dfa502088c64cac.exe
-
Size
64KB
-
MD5
93ac3aefb3c8b1dc8815085453d563d0
-
SHA1
7561ad331ba606a9659d1f3078093e1ebd60cac6
-
SHA256
e1e47746d68faf1f7417b75713f849f7ad4468a42c61bb6f8dfa502088c64cac
-
SHA512
a47b8fc2823d468dc18593459976ab10f795c739cfe817705b288a8e7b6c76a4afb299e66adb5d69001f99a79bc288b34874fd79b64339c24dc0aad3bebb4654
-
SSDEEP
768:CAX45JoF+yMhkA089gH5F5o8AxLXQGPL4vzZq2o9W7GsxBbPr:CLGxMhm8S5o8AxLgGCq2iW7z
Malware Config
Signatures
-
resource yara_rule behavioral2/files/0x0008000000022e5b-134.dat aspack_v212_v242 behavioral2/files/0x0008000000022e5b-133.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 3532 oEvTqg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation oEvTqg.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe oEvTqg.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe oEvTqg.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jcmd.exe oEvTqg.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jinfo.exe oEvTqg.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jrunscript.exe oEvTqg.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\klist.exe oEvTqg.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoasb.exe oEvTqg.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\AppSharingHookController.exe oEvTqg.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\PaintStudio.View.exe oEvTqg.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeBridge\SkypeBridge.exe oEvTqg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\arh.exe oEvTqg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\wow_helper.exe oEvTqg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleCrashHandler.exe oEvTqg.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javapackager.exe oEvTqg.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\unpack200.exe oEvTqg.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\WORDICON.EXE oEvTqg.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\HxAccounts.exe oEvTqg.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe oEvTqg.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jmap.exe oEvTqg.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\kinit.exe oEvTqg.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\AppVDllSurrogate32.exe oEvTqg.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_x64__8wekyb3d8bbwe\PeopleApp.exe oEvTqg.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe oEvTqg.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jps.exe oEvTqg.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\java-rmi.exe oEvTqg.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\EQUATION\eqnedt32.exe oEvTqg.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\YourPhone.exe oEvTqg.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Video.UI.exe oEvTqg.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\pack200.exe oEvTqg.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\protocolhandler.exe oEvTqg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AdobeCollabSync.exe oEvTqg.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{4CA8DFAB-80A0-43FC-AC78-FBACDED770CF}\chrome_installer.exe oEvTqg.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\appletviewer.exe oEvTqg.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOUC.EXE oEvTqg.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\javacpl.exe oEvTqg.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\javaw.exe oEvTqg.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\lib\nbexec64.exe oEvTqg.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\Integrator.exe oEvTqg.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE oEvTqg.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Source Engine\OSE.EXE oEvTqg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateOnDemand.exe oEvTqg.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msotd.exe oEvTqg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateComRegisterShell64.exe oEvTqg.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\orbd.exe oEvTqg.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE oEvTqg.exe File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe oEvTqg.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\codecpacks.VP9.exe oEvTqg.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxSpeechToTextOverlay_1.17.29001.0_x64__8wekyb3d8bbwe\SpeechToTextOverlay64-Retail.exe oEvTqg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\32BitMAPIBroker.exe oEvTqg.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.Loader.exe oEvTqg.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe oEvTqg.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe oEvTqg.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe oEvTqg.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_x64__8wekyb3d8bbwe\Solitaire.exe oEvTqg.exe File opened for modification C:\Program Files (x86)\Google\Update\DisabledGoogleUpdate.exe oEvTqg.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jjs.exe oEvTqg.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\java.exe oEvTqg.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\ssvagent.exe oEvTqg.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exe oEvTqg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Eula.exe oEvTqg.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\java-rmi.exe oEvTqg.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\pack200.exe oEvTqg.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\CLVIEW.EXE oEvTqg.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\idlj.exe oEvTqg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2968 wrote to memory of 3532 2968 e1e47746d68faf1f7417b75713f849f7ad4468a42c61bb6f8dfa502088c64cac.exe 44 PID 2968 wrote to memory of 3532 2968 e1e47746d68faf1f7417b75713f849f7ad4468a42c61bb6f8dfa502088c64cac.exe 44 PID 2968 wrote to memory of 3532 2968 e1e47746d68faf1f7417b75713f849f7ad4468a42c61bb6f8dfa502088c64cac.exe 44 PID 3532 wrote to memory of 3028 3532 oEvTqg.exe 82 PID 3532 wrote to memory of 3028 3532 oEvTqg.exe 82 PID 3532 wrote to memory of 3028 3532 oEvTqg.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1e47746d68faf1f7417b75713f849f7ad4468a42c61bb6f8dfa502088c64cac.exe"C:\Users\Admin\AppData\Local\Temp\e1e47746d68faf1f7417b75713f849f7ad4468a42c61bb6f8dfa502088c64cac.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\oEvTqg.exeC:\Users\Admin\AppData\Local\Temp\oEvTqg.exe2⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4d722541.bat" "3⤵PID:3028
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
187B
MD52ba32c567ae050725439dfcc89f13cce
SHA155328d2f4b1ed8dcba930cf3b552c153406a9143
SHA2569289a41b71aa508a8e7cae7b56f3859efafedc88ad22771c8d3109be08cecde8
SHA5129cb3241e0087c0c9eb32722e02040166005fa745cffdf2331581ce5569f00fe2e81ae426892974c1432bc8d5ce5b681a71a0064ddb8d21a54499c469fe3f8ba4
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e