Analysis
-
max time kernel
91s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 07:47
Static task
static1
Behavioral task
behavioral1
Sample
72c4c09093663a7bb67f3f5b2da6b7d8b9d9016ca9bb91268434e6a518beab20.exe
Resource
win7-20220812-en
General
-
Target
72c4c09093663a7bb67f3f5b2da6b7d8b9d9016ca9bb91268434e6a518beab20.exe
-
Size
684KB
-
MD5
93533097a256398b5acdbe8983acdacd
-
SHA1
1c12702a274ae43d4d712afe3c2f438d6020a0dd
-
SHA256
72c4c09093663a7bb67f3f5b2da6b7d8b9d9016ca9bb91268434e6a518beab20
-
SHA512
e0bdd70f4594e4fae097a414bebf4accbce7c85b2e68ed809c947032bcb408cbcb6c7174ba64c380f69963db88e470f36f7412e5c262a59bf86456db8c52a468
-
SSDEEP
12288:0/XM4DShe9EcHPLrLZ5AICgkTP3/j3r3ZBIRjD68wBxGsHmmvV9RnCbzvYej:AM4DSs9FvzAICgkTjjZB2oGmvDRnY1
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List WScript.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile WScript.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts WScript.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List\5445:TCP = "5445:TCP:*:Enabled:@xpsp2res.dll,-22003" WScript.exe -
Executes dropped EXE 5 IoCs
pid Process 3956 work1.exe 4612 smss.exe 4692 smss.exe 1048 smss.exe 4476 smss.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation work1.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 72c4c09093663a7bb67f3f5b2da6b7d8b9d9016ca9bb91268434e6a518beab20.exe -
Loads dropped DLL 4 IoCs
pid Process 4612 smss.exe 4692 smss.exe 1048 smss.exe 4476 smss.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Windows directory 13 IoCs
description ioc Process File opened for modification C:\Windows\PIF\smss.exe work1.exe File opened for modification C:\Windows\PIF\firewall.vbe work1.exe File opened for modification C:\Windows\PIF work1.exe File opened for modification C:\Windows\PIF\AdmDll.dll work1.exe File created C:\Windows\PIF\reg1.reg work1.exe File opened for modification C:\Windows\PIF\reg1.reg work1.exe File created C:\Windows\PIF\reg.reg work1.exe File created C:\Windows\PIF\smss.exe work1.exe File created C:\Windows\PIF\cmd.vbe work1.exe File opened for modification C:\Windows\PIF\cmd.vbe work1.exe File created C:\Windows\PIF\AdmDll.dll work1.exe File opened for modification C:\Windows\PIF\reg.reg work1.exe File created C:\Windows\PIF\firewall.vbe work1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings work1.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings WScript.exe -
Runs .reg file with regedit 2 IoCs
pid Process 4052 regedit.exe 4060 regedit.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 4788 wrote to memory of 3956 4788 72c4c09093663a7bb67f3f5b2da6b7d8b9d9016ca9bb91268434e6a518beab20.exe 82 PID 4788 wrote to memory of 3956 4788 72c4c09093663a7bb67f3f5b2da6b7d8b9d9016ca9bb91268434e6a518beab20.exe 82 PID 4788 wrote to memory of 3956 4788 72c4c09093663a7bb67f3f5b2da6b7d8b9d9016ca9bb91268434e6a518beab20.exe 82 PID 3956 wrote to memory of 748 3956 work1.exe 83 PID 3956 wrote to memory of 748 3956 work1.exe 83 PID 3956 wrote to memory of 748 3956 work1.exe 83 PID 748 wrote to memory of 1140 748 WScript.exe 84 PID 748 wrote to memory of 1140 748 WScript.exe 84 PID 748 wrote to memory of 1140 748 WScript.exe 84 PID 748 wrote to memory of 4052 748 WScript.exe 85 PID 748 wrote to memory of 4052 748 WScript.exe 85 PID 748 wrote to memory of 4052 748 WScript.exe 85 PID 748 wrote to memory of 4060 748 WScript.exe 86 PID 748 wrote to memory of 4060 748 WScript.exe 86 PID 748 wrote to memory of 4060 748 WScript.exe 86 PID 748 wrote to memory of 4612 748 WScript.exe 87 PID 748 wrote to memory of 4612 748 WScript.exe 87 PID 748 wrote to memory of 4612 748 WScript.exe 87 PID 748 wrote to memory of 4692 748 WScript.exe 88 PID 748 wrote to memory of 4692 748 WScript.exe 88 PID 748 wrote to memory of 4692 748 WScript.exe 88 PID 748 wrote to memory of 1048 748 WScript.exe 89 PID 748 wrote to memory of 1048 748 WScript.exe 89 PID 748 wrote to memory of 1048 748 WScript.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\72c4c09093663a7bb67f3f5b2da6b7d8b9d9016ca9bb91268434e6a518beab20.exe"C:\Users\Admin\AppData\Local\Temp\72c4c09093663a7bb67f3f5b2da6b7d8b9d9016ca9bb91268434e6a518beab20.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Users\Admin\AppData\Roaming\work1.exe"C:\Users\Admin\AppData\Roaming\work1.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\PIF\cmd.vbe"3⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\PIF\firewall.vbe"4⤵
- Modifies firewall policy service
PID:1140
-
-
C:\Windows\SysWOW64\regedit.exe"C:\Windows\regedit.exe" /s C:\Windows\PIF\reg.reg4⤵
- Runs .reg file with regedit
PID:4052
-
-
C:\Windows\SysWOW64\regedit.exe"C:\Windows\regedit.exe" /s C:\Windows\PIF\reg1.reg4⤵
- Runs .reg file with regedit
PID:4060
-
-
C:\Windows\PIF\smss.exe"C:\Windows\PIF\smss.exe" /install /silence4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4612
-
-
C:\Windows\PIF\smss.exe"C:\Windows\PIF\smss.exe" /pass:xplicit /port:5445 /save /silence4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4692
-
-
C:\Windows\PIF\smss.exe"C:\Windows\PIF\smss.exe" /start /silence4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1048
-
-
-
-
C:\Windows\PIF\smss.exe"C:\Windows\PIF\smss.exe" /service1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4476
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
317KB
MD5e2981acd6aad63030a427c8fbe23214d
SHA1114917d24670c37c5323fd3d14ad8f4859efa47a
SHA256c64dc6b16fbf9875acad2bc192e0ea9a964100d1ba78207695d96cf088786a37
SHA5124dd1c84f143ebef5945144c505c395eab20a09a3edbbe14be30eb164aa21db0e9c64af909e2950b70afb6248a06f8bfc232106a0fc1ae7e4495ea9eaba4b0f05
-
Filesize
317KB
MD5e2981acd6aad63030a427c8fbe23214d
SHA1114917d24670c37c5323fd3d14ad8f4859efa47a
SHA256c64dc6b16fbf9875acad2bc192e0ea9a964100d1ba78207695d96cf088786a37
SHA5124dd1c84f143ebef5945144c505c395eab20a09a3edbbe14be30eb164aa21db0e9c64af909e2950b70afb6248a06f8bfc232106a0fc1ae7e4495ea9eaba4b0f05
-
Filesize
88KB
MD5c915181e93fe3d4c41b1963180d3c535
SHA1f35e66bec967d4254338a120eea8159f29c06a99
SHA256d8fc5d545e684a4d5001004463f762d190bee478eb3a329f65998bad53d3c958
SHA5122a5ceeb919546a713e172823da75e8f58c98c1dcedfaa7cacbd48af57bcb8da49c6289908c6c2a1bb6bda4cc7fac58adffae4a500dfe0c503397ca9aa8e92e21
-
Filesize
88KB
MD5c915181e93fe3d4c41b1963180d3c535
SHA1f35e66bec967d4254338a120eea8159f29c06a99
SHA256d8fc5d545e684a4d5001004463f762d190bee478eb3a329f65998bad53d3c958
SHA5122a5ceeb919546a713e172823da75e8f58c98c1dcedfaa7cacbd48af57bcb8da49c6289908c6c2a1bb6bda4cc7fac58adffae4a500dfe0c503397ca9aa8e92e21
-
Filesize
88KB
MD5c915181e93fe3d4c41b1963180d3c535
SHA1f35e66bec967d4254338a120eea8159f29c06a99
SHA256d8fc5d545e684a4d5001004463f762d190bee478eb3a329f65998bad53d3c958
SHA5122a5ceeb919546a713e172823da75e8f58c98c1dcedfaa7cacbd48af57bcb8da49c6289908c6c2a1bb6bda4cc7fac58adffae4a500dfe0c503397ca9aa8e92e21
-
Filesize
88KB
MD5c915181e93fe3d4c41b1963180d3c535
SHA1f35e66bec967d4254338a120eea8159f29c06a99
SHA256d8fc5d545e684a4d5001004463f762d190bee478eb3a329f65998bad53d3c958
SHA5122a5ceeb919546a713e172823da75e8f58c98c1dcedfaa7cacbd48af57bcb8da49c6289908c6c2a1bb6bda4cc7fac58adffae4a500dfe0c503397ca9aa8e92e21
-
Filesize
88KB
MD5c915181e93fe3d4c41b1963180d3c535
SHA1f35e66bec967d4254338a120eea8159f29c06a99
SHA256d8fc5d545e684a4d5001004463f762d190bee478eb3a329f65998bad53d3c958
SHA5122a5ceeb919546a713e172823da75e8f58c98c1dcedfaa7cacbd48af57bcb8da49c6289908c6c2a1bb6bda4cc7fac58adffae4a500dfe0c503397ca9aa8e92e21
-
Filesize
531B
MD540b7488181074032b35b36f790e3b4d7
SHA1495fbb91d17a22a211c99ffba757c612d220fd1d
SHA25632ff28bc0fa11dafa988824e9c02b7f52082884ac09135d440a6df135092f3aa
SHA5120d981d4ae16a6d0712b3c583e07126f64b490c599d3bdbdf7f72016499f37b6785c1c217cb41d5854126aa0634a8a51cbf7fd4c90c875e7ac645bc33478823c4
-
Filesize
267B
MD530088192ecd38db91bb8332e3f4cbdec
SHA1dbd421b46a212d047eb5cbf79d233e6557feed57
SHA2564a3a6938cb7b4501982cee517b6d21007e855c1ea4d3ffe229a44fe4facd6e8d
SHA512cd8df66bb39e0f3d5cea106b8dd4ea34ddf562f9b828e803243b3345bea9f681fab9b02168cd264ee19ad3a9f8c41ec513ca207a320b097f9dea17b16a425b0d
-
Filesize
828B
MD5e483050e5285a268eeb7730eabcfa03f
SHA1c93cb3b84db521051f713afb192987bc356bb593
SHA256bc35a9c29f2b75aa4c42a2ac403b25f26bb93a42cf76be5d3a5674e0d9ebbe8f
SHA5120bbb51b583af80b81184ff1d9f50601424c69012301ef5bf82d0c9cef9f2271a460abddded0639f27eef808d539dbd4619de94851a731114d20cca1e1f4ab4bb
-
Filesize
258B
MD5852bca3a6be73d7ba1d0cac7c2bb5603
SHA1a93b0be44178620a548899b42c5d304185c83a99
SHA25631550d77b0358435287e357b84958dd1c4787e838a3cb774e0c4b410aab10ecc
SHA5125f99803f3099d6df552793b95f7685e82d284f079733fffcd4fc8557d395d7bf985026608eea522bfef9cc99ec2cf117633d6a42f85240b13703c1c898d69c3e
-
Filesize
240KB
MD558aa9c1c75bfd50fe0dd98dff7934250
SHA1659085afa2dab8ee8abca7071e329f13b003051b
SHA256122080d3f810d1e32206bf8dd23dee3fee26fe1ab562dff1f61acc1353a5b2ec
SHA51202c3d9ae0c34d0155fe5b847780ab4a4045ed117df6605905e60ae23a629383e2a2c351d659278a5e728ed39a4c375db585d64e1c782d7da305ca9ded256f684
-
Filesize
240KB
MD558aa9c1c75bfd50fe0dd98dff7934250
SHA1659085afa2dab8ee8abca7071e329f13b003051b
SHA256122080d3f810d1e32206bf8dd23dee3fee26fe1ab562dff1f61acc1353a5b2ec
SHA51202c3d9ae0c34d0155fe5b847780ab4a4045ed117df6605905e60ae23a629383e2a2c351d659278a5e728ed39a4c375db585d64e1c782d7da305ca9ded256f684
-
Filesize
240KB
MD558aa9c1c75bfd50fe0dd98dff7934250
SHA1659085afa2dab8ee8abca7071e329f13b003051b
SHA256122080d3f810d1e32206bf8dd23dee3fee26fe1ab562dff1f61acc1353a5b2ec
SHA51202c3d9ae0c34d0155fe5b847780ab4a4045ed117df6605905e60ae23a629383e2a2c351d659278a5e728ed39a4c375db585d64e1c782d7da305ca9ded256f684
-
Filesize
240KB
MD558aa9c1c75bfd50fe0dd98dff7934250
SHA1659085afa2dab8ee8abca7071e329f13b003051b
SHA256122080d3f810d1e32206bf8dd23dee3fee26fe1ab562dff1f61acc1353a5b2ec
SHA51202c3d9ae0c34d0155fe5b847780ab4a4045ed117df6605905e60ae23a629383e2a2c351d659278a5e728ed39a4c375db585d64e1c782d7da305ca9ded256f684
-
Filesize
240KB
MD558aa9c1c75bfd50fe0dd98dff7934250
SHA1659085afa2dab8ee8abca7071e329f13b003051b
SHA256122080d3f810d1e32206bf8dd23dee3fee26fe1ab562dff1f61acc1353a5b2ec
SHA51202c3d9ae0c34d0155fe5b847780ab4a4045ed117df6605905e60ae23a629383e2a2c351d659278a5e728ed39a4c375db585d64e1c782d7da305ca9ded256f684