Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2022, 20:20
Static task
static1
Behavioral task
behavioral1
Sample
4ed3a989158578e890c9a250c6f70ad10a063ec5d90bc2fcc45896a21bb534f9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4ed3a989158578e890c9a250c6f70ad10a063ec5d90bc2fcc45896a21bb534f9.exe
Resource
win10v2004-20220812-en
General
-
Target
4ed3a989158578e890c9a250c6f70ad10a063ec5d90bc2fcc45896a21bb534f9.exe
-
Size
44KB
-
MD5
2001efe468016abc4b728ccd40ddd0c0
-
SHA1
4e0351f76fa17d792e47f6ba639a9c87da5fd90f
-
SHA256
4ed3a989158578e890c9a250c6f70ad10a063ec5d90bc2fcc45896a21bb534f9
-
SHA512
459dd75c9f64d40618887c7387357d5efecee1a3302d02f59c9f76591b39d1b791cb9495cacbad748cdc554b08d5d5d3a79ddf1365827b8f14e956c4215d2c2e
-
SSDEEP
768:2USW61K57IIfWAQGPL4vzZq2o9W7GsxBbPr:2q6JAWLGCq2iW7z
Malware Config
Signatures
-
resource yara_rule behavioral2/files/0x0006000000022e12-135.dat aspack_v212_v242 behavioral2/files/0x0006000000022e12-134.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 2180 cyIfzL.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation cyIfzL.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\jjs.exe cyIfzL.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe cyIfzL.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe cyIfzL.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\wow_helper.exe cyIfzL.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javah.exe cyIfzL.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\wsimport.exe cyIfzL.exe File opened for modification C:\Program Files\Microsoft Office\Office16\OSPPREARM.EXE cyIfzL.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.exe cyIfzL.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\Wordconv.exe cyIfzL.exe File opened for modification C:\Program Files\Windows Mail\wab.exe cyIfzL.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Microsoft.Msn.Weather.exe cyIfzL.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exe cyIfzL.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe cyIfzL.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javafxpackager.exe cyIfzL.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeBackgroundHost.exe cyIfzL.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\keytool.exe cyIfzL.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\javacpl.exe cyIfzL.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\VPREVIEW.EXE cyIfzL.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.DBConnection64.exe cyIfzL.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\View3D.ResourceResolver.exe cyIfzL.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_x64__8wekyb3d8bbwe\PeopleApp.exe cyIfzL.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\chrmstp.exe cyIfzL.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\servertool.exe cyIfzL.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32Info.exe cyIfzL.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeBridge\SkypeBridge.exe cyIfzL.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Music.UI.exe cyIfzL.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\Uninstall.exe cyIfzL.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msotd.exe cyIfzL.exe File opened for modification C:\Program Files\Microsoft Office 15\ClientX64\OfficeClickToRun.exe cyIfzL.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\java.exe cyIfzL.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\OLicenseHeartbeat.exe cyIfzL.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Wallet_2.4.18324.0_x64__8wekyb3d8bbwe\Microsoft.Wallet.exe cyIfzL.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Time.exe cyIfzL.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroTextExtractor.exe cyIfzL.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\WCChromeNativeMessagingHost.exe cyIfzL.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jvisualvm.exe cyIfzL.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\ssvagent.exe cyIfzL.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe cyIfzL.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SETLANG.EXE cyIfzL.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\orbd.exe cyIfzL.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\jabswitch.exe cyIfzL.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\WinStore.App.exe cyIfzL.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\notification_helper.exe cyIfzL.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\javaw.exe cyIfzL.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\jp2launcher.exe cyIfzL.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.NetFX45.exe cyIfzL.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSQRY32.EXE cyIfzL.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE cyIfzL.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\PilotshubApp.exe cyIfzL.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javaws.exe cyIfzL.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jinfo.exe cyIfzL.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\jabswitch.exe cyIfzL.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\excelcnv.exe cyIfzL.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOSREC.EXE cyIfzL.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_x64__8wekyb3d8bbwe\WindowsCamera.exe cyIfzL.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\HxCalendarAppImm.exe cyIfzL.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\FullTrustNotifier.exe cyIfzL.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\appletviewer.exe cyIfzL.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jdb.exe cyIfzL.exe File opened for modification C:\Program Files\Windows Photo Viewer\ImagingDevices.exe cyIfzL.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_x64__8wekyb3d8bbwe\GetHelp.exe cyIfzL.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\codecpacks.heif.exe cyIfzL.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\idlj.exe cyIfzL.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\SPREADSHEETCOMPARE.EXE cyIfzL.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2372 4ed3a989158578e890c9a250c6f70ad10a063ec5d90bc2fcc45896a21bb534f9.exe 2372 4ed3a989158578e890c9a250c6f70ad10a063ec5d90bc2fcc45896a21bb534f9.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2180 2372 4ed3a989158578e890c9a250c6f70ad10a063ec5d90bc2fcc45896a21bb534f9.exe 80 PID 2372 wrote to memory of 2180 2372 4ed3a989158578e890c9a250c6f70ad10a063ec5d90bc2fcc45896a21bb534f9.exe 80 PID 2372 wrote to memory of 2180 2372 4ed3a989158578e890c9a250c6f70ad10a063ec5d90bc2fcc45896a21bb534f9.exe 80 PID 2180 wrote to memory of 1020 2180 cyIfzL.exe 81 PID 2180 wrote to memory of 1020 2180 cyIfzL.exe 81 PID 2180 wrote to memory of 1020 2180 cyIfzL.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ed3a989158578e890c9a250c6f70ad10a063ec5d90bc2fcc45896a21bb534f9.exe"C:\Users\Admin\AppData\Local\Temp\4ed3a989158578e890c9a250c6f70ad10a063ec5d90bc2fcc45896a21bb534f9.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\cyIfzL.exeC:\Users\Admin\AppData\Local\Temp\cyIfzL.exe2⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\0cf10eb3.bat" "3⤵PID:1020
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
187B
MD5937e2b144c75c8888fa4ab933328d309
SHA17694b52bfcc9f243471b8168f92c4558c1eda654
SHA256c633cdcff8f1c217f61212f2cda63cc03ce36bcb3590c5318658fd6a12f4aff3
SHA5125bab7149a674d28fc4ced0e2f2f17f2f3094dbcfaa8e5fb8dc200eb2a29e24aee8ff14d2d791aac74f2b847bb593219fdc6368a6fd0832aaaa5ee4be185a2799
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e