Analysis
-
max time kernel
146s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2022 07:36
Static task
static1
Behavioral task
behavioral1
Sample
5d70fa916dddc12d1966529883ab08b59efb239a03a82ef30b8ba4bd97a3f39a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5d70fa916dddc12d1966529883ab08b59efb239a03a82ef30b8ba4bd97a3f39a.exe
Resource
win10v2004-20220812-en
General
-
Target
5d70fa916dddc12d1966529883ab08b59efb239a03a82ef30b8ba4bd97a3f39a.exe
-
Size
92KB
-
MD5
93d63b733d33f4c64488d5854f962c00
-
SHA1
63d86ec9a0773d108efc1b12b3446cd8d312bb55
-
SHA256
5d70fa916dddc12d1966529883ab08b59efb239a03a82ef30b8ba4bd97a3f39a
-
SHA512
3d93846b88ceb0618e7d4193aa0b99a876169db05cbf75e5bf991a957c808ce58180c219815b9908ac53d25a82e58231abf0252b15b95c06cb7b8d511c6340b2
-
SSDEEP
1536:nj2AwKrSEqxQxK+oyEIXQ7+JLIzbPhwxw8lepaptXN883IPpLh29JbbEokDU:j2AwNc0AXQ7+crmVokpNSxTABt
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2612 eidolon.exe 2088 5d70fa916dddc12d1966529883ab08b59efb239a03a82ef30b8ba4bd97a3f39a.exe 216 USBServers32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 5d70fa916dddc12d1966529883ab08b59efb239a03a82ef30b8ba4bd97a3f39a.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\windows\currentVersion\run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\USBServers32 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\USBServers32.exe" reg.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\shell32.dll eidolon.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4824 wrote to memory of 2612 4824 5d70fa916dddc12d1966529883ab08b59efb239a03a82ef30b8ba4bd97a3f39a.exe 83 PID 4824 wrote to memory of 2612 4824 5d70fa916dddc12d1966529883ab08b59efb239a03a82ef30b8ba4bd97a3f39a.exe 83 PID 4824 wrote to memory of 2612 4824 5d70fa916dddc12d1966529883ab08b59efb239a03a82ef30b8ba4bd97a3f39a.exe 83 PID 4824 wrote to memory of 3096 4824 5d70fa916dddc12d1966529883ab08b59efb239a03a82ef30b8ba4bd97a3f39a.exe 84 PID 4824 wrote to memory of 3096 4824 5d70fa916dddc12d1966529883ab08b59efb239a03a82ef30b8ba4bd97a3f39a.exe 84 PID 4824 wrote to memory of 3096 4824 5d70fa916dddc12d1966529883ab08b59efb239a03a82ef30b8ba4bd97a3f39a.exe 84 PID 4824 wrote to memory of 3828 4824 5d70fa916dddc12d1966529883ab08b59efb239a03a82ef30b8ba4bd97a3f39a.exe 86 PID 4824 wrote to memory of 3828 4824 5d70fa916dddc12d1966529883ab08b59efb239a03a82ef30b8ba4bd97a3f39a.exe 86 PID 4824 wrote to memory of 3828 4824 5d70fa916dddc12d1966529883ab08b59efb239a03a82ef30b8ba4bd97a3f39a.exe 86 PID 3828 wrote to memory of 2088 3828 cmd.exe 88 PID 3828 wrote to memory of 2088 3828 cmd.exe 88 PID 3828 wrote to memory of 2088 3828 cmd.exe 88 PID 3828 wrote to memory of 216 3828 cmd.exe 89 PID 3828 wrote to memory of 216 3828 cmd.exe 89 PID 3828 wrote to memory of 216 3828 cmd.exe 89 PID 216 wrote to memory of 796 216 USBServers32.exe 90 PID 216 wrote to memory of 796 216 USBServers32.exe 90 PID 216 wrote to memory of 796 216 USBServers32.exe 90 PID 796 wrote to memory of 3460 796 cmd.exe 92 PID 796 wrote to memory of 3460 796 cmd.exe 92 PID 796 wrote to memory of 3460 796 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d70fa916dddc12d1966529883ab08b59efb239a03a82ef30b8ba4bd97a3f39a.exe"C:\Users\Admin\AppData\Local\Temp\5d70fa916dddc12d1966529883ab08b59efb239a03a82ef30b8ba4bd97a3f39a.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\eidolon.exe"C:\Users\Admin\AppData\Local\Temp\eidolon.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2612
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Windows\temp\tttdelzzz.bat" "2⤵PID:3096
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Windows\temp\tttbrozzz.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Users\Admin\AppData\Local\Temp\5d70fa916dddc12d1966529883ab08b59efb239a03a82ef30b8ba4bd97a3f39a.exe"C:\Users\Admin\AppData\Local\Temp\5d70fa916dddc12d1966529883ab08b59efb239a03a82ef30b8ba4bd97a3f39a.exe"3⤵
- Executes dropped EXE
PID:2088
-
-
C:\Users\Admin\AppData\Local\Temp\USBServers32.exe"C:\Users\Admin\AppData\Local\Temp\USBServers32.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c reg add HKEY_CURRENT_USER\Software\Microsoft\windows\currentVersion\run /v USBServers32 /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\USBServers32.exe" /f4⤵
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Windows\SysWOW64\reg.exereg add HKEY_CURRENT_USER\Software\Microsoft\windows\currentVersion\run /v USBServers32 /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\USBServers32.exe" /f5⤵
- Adds Run key to start application
PID:3460
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\5d70fa916dddc12d1966529883ab08b59efb239a03a82ef30b8ba4bd97a3f39a.exe
Filesize37KB
MD5fd9aa418a3248e939b2e3c045d606e92
SHA1fcdbbb36b74f19406278db05919e64d449adbb41
SHA256899f0f597f01d496a4bdfb8e0185a0a3ba68967d98079589e80de192fc035703
SHA512977f22cfb94a0e3aede44a17134298dab2d4ca5f74e62e0b0d62a869e4173d82fe67d669968c3e353fef2e15082f8e1705d05664a56784695fefa565e2c262fa
-
Filesize
54KB
MD56428b1de8971e837926de5b464725f64
SHA119d7ce6fff617b790f9de7bf99406e61061f0594
SHA2568f53ab3cd172f685568e0cbb51eb7dfd2389a5fe6aaf47d0aa7d823253e673ee
SHA5127938b01ce48bcdd3276c83f82fc71407d101f2e884b3f271a17fcf4c60af642faf57047edab97906351217f79847107757283af3fbfc3059cf4eb8e8d778d026
-
Filesize
54KB
MD56428b1de8971e837926de5b464725f64
SHA119d7ce6fff617b790f9de7bf99406e61061f0594
SHA2568f53ab3cd172f685568e0cbb51eb7dfd2389a5fe6aaf47d0aa7d823253e673ee
SHA5127938b01ce48bcdd3276c83f82fc71407d101f2e884b3f271a17fcf4c60af642faf57047edab97906351217f79847107757283af3fbfc3059cf4eb8e8d778d026
-
Filesize
24KB
MD5f3858fb30c8ddb74a11e85381009c438
SHA1ab388dbb45109acd543d28030daf065e50e20a1b
SHA256a1bf9bc23f97fee5a83ddcb3ba4d8fbbcc70fb2d871b325261be0ded72196fe9
SHA5126aeb783c6ed7108480f956fd5b54a39a26d6257dc1c472d4d16700eb76be4276690596702fbc9a078662627673965584accf90449cd08dec461806ae3d57c0d1
-
Filesize
24KB
MD5f3858fb30c8ddb74a11e85381009c438
SHA1ab388dbb45109acd543d28030daf065e50e20a1b
SHA256a1bf9bc23f97fee5a83ddcb3ba4d8fbbcc70fb2d871b325261be0ded72196fe9
SHA5126aeb783c6ed7108480f956fd5b54a39a26d6257dc1c472d4d16700eb76be4276690596702fbc9a078662627673965584accf90449cd08dec461806ae3d57c0d1
-
Filesize
37KB
MD5fd9aa418a3248e939b2e3c045d606e92
SHA1fcdbbb36b74f19406278db05919e64d449adbb41
SHA256899f0f597f01d496a4bdfb8e0185a0a3ba68967d98079589e80de192fc035703
SHA512977f22cfb94a0e3aede44a17134298dab2d4ca5f74e62e0b0d62a869e4173d82fe67d669968c3e353fef2e15082f8e1705d05664a56784695fefa565e2c262fa
-
Filesize
619B
MD511c954df2747603320031048077a43c9
SHA1a3ba7949ffc100f0a131dbaa57641902291f28b7
SHA2567fad654a85cd8b48cf5ce4338857c9dcda8998f6e796bd0cf4dc90173995cc5d
SHA512d75d6a02843d1129ded907cc0f52203183c536daffc31dccf56b76df8053aba8b9dd04a8571631b1c8006fca414057833095247d4656cf1e68cd59374e4045b6
-
Filesize
327B
MD5d7ae40d256a0f06d26c9ff7d59b5f469
SHA11a36f1c0ed778f30eaf8bce42503dca035652b4e
SHA256214f2b425582c51ae12d7d77f2a885ccd670412aaa5d31ebdcc3c3acc27f5177
SHA51234f819d6ba271de830ed711c376953f7d2d537e3f3cfe1739cbb54aef47b5603e2b0053ee21c2b9a334b88df64683a517d655eaec8bc91777dac4b0c86f2d5cb