Analysis
-
max time kernel
151s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2022, 11:57
Static task
static1
Behavioral task
behavioral1
Sample
87061ded85afdad10696adce31b6e56237c9e499a3b86c0992efbdbecd5ad3d3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
87061ded85afdad10696adce31b6e56237c9e499a3b86c0992efbdbecd5ad3d3.exe
Resource
win10v2004-20220812-en
General
-
Target
87061ded85afdad10696adce31b6e56237c9e499a3b86c0992efbdbecd5ad3d3.exe
-
Size
729KB
-
MD5
03cd5c80aae30cee608db1ff6c3094e0
-
SHA1
84c0a210639ebc5ae015f52a190a50e2ce03ee64
-
SHA256
87061ded85afdad10696adce31b6e56237c9e499a3b86c0992efbdbecd5ad3d3
-
SHA512
85b63d353a8450221caea3c8d0ddc172dee58622bd33c8528977d0bb1a249166dd98dd2c22fd3d79434a2dcdd0d8cbc201c7b3ef4f9791562b6a82f4162d521e
-
SSDEEP
12288:PBjUUmQfHYbDG+IDHjPWFrS20/ncnaGBP5uJePWBQeBJiSycBcagEy2Vyv:PBvmcYb7IjjPWFe5IVp5Q+qlhBcagD2A
Malware Config
Signatures
-
resource yara_rule behavioral2/files/0x0003000000000721-143.dat aspack_v212_v242 behavioral2/files/0x0003000000000721-144.dat aspack_v212_v242 -
Executes dropped EXE 2 IoCs
pid Process 4112 qotyt.exe 2880 huajg.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 87061ded85afdad10696adce31b6e56237c9e499a3b86c0992efbdbecd5ad3d3.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation qotyt.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2880 huajg.exe 2880 huajg.exe 2880 huajg.exe 2880 huajg.exe 2880 huajg.exe 2880 huajg.exe 2880 huajg.exe 2880 huajg.exe 2880 huajg.exe 2880 huajg.exe 2880 huajg.exe 2880 huajg.exe 2880 huajg.exe 2880 huajg.exe 2880 huajg.exe 2880 huajg.exe 2880 huajg.exe 2880 huajg.exe 2880 huajg.exe 2880 huajg.exe 2880 huajg.exe 2880 huajg.exe 2880 huajg.exe 2880 huajg.exe 2880 huajg.exe 2880 huajg.exe 2880 huajg.exe 2880 huajg.exe 2880 huajg.exe 2880 huajg.exe 2880 huajg.exe 2880 huajg.exe 2880 huajg.exe 2880 huajg.exe 2880 huajg.exe 2880 huajg.exe 2880 huajg.exe 2880 huajg.exe 2880 huajg.exe 2880 huajg.exe 2880 huajg.exe 2880 huajg.exe 2880 huajg.exe 2880 huajg.exe 2880 huajg.exe 2880 huajg.exe 2880 huajg.exe 2880 huajg.exe 2880 huajg.exe 2880 huajg.exe 2880 huajg.exe 2880 huajg.exe 2880 huajg.exe 2880 huajg.exe 2880 huajg.exe 2880 huajg.exe 2880 huajg.exe 2880 huajg.exe 2880 huajg.exe 2880 huajg.exe 2880 huajg.exe 2880 huajg.exe 2880 huajg.exe 2880 huajg.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2688 wrote to memory of 4112 2688 87061ded85afdad10696adce31b6e56237c9e499a3b86c0992efbdbecd5ad3d3.exe 81 PID 2688 wrote to memory of 4112 2688 87061ded85afdad10696adce31b6e56237c9e499a3b86c0992efbdbecd5ad3d3.exe 81 PID 2688 wrote to memory of 4112 2688 87061ded85afdad10696adce31b6e56237c9e499a3b86c0992efbdbecd5ad3d3.exe 81 PID 2688 wrote to memory of 5020 2688 87061ded85afdad10696adce31b6e56237c9e499a3b86c0992efbdbecd5ad3d3.exe 82 PID 2688 wrote to memory of 5020 2688 87061ded85afdad10696adce31b6e56237c9e499a3b86c0992efbdbecd5ad3d3.exe 82 PID 2688 wrote to memory of 5020 2688 87061ded85afdad10696adce31b6e56237c9e499a3b86c0992efbdbecd5ad3d3.exe 82 PID 4112 wrote to memory of 2880 4112 qotyt.exe 91 PID 4112 wrote to memory of 2880 4112 qotyt.exe 91 PID 4112 wrote to memory of 2880 4112 qotyt.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\87061ded85afdad10696adce31b6e56237c9e499a3b86c0992efbdbecd5ad3d3.exe"C:\Users\Admin\AppData\Local\Temp\87061ded85afdad10696adce31b6e56237c9e499a3b86c0992efbdbecd5ad3d3.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\qotyt.exe"C:\Users\Admin\AppData\Local\Temp\qotyt.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\huajg.exe"C:\Users\Admin\AppData\Local\Temp\huajg.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2880
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵PID:5020
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5dc93890ca9373cc24b7ee291734b60a4
SHA1d9729c7ab96fadc11e4afb7d3ea46823396153fd
SHA256b6e7c1baa34a3265a1da02a7405fcfa902b2bb7dae4b29776067c8e5ad9d1c9c
SHA5122e607e758ac7fe2eda073b03fabf4de5434ba85d1c9d8a73dbf39e6d5c94ef3d3ee36b61d8f4c9cad95f4c7fa57a531875934c62075ba7b815fc04f9632e8b3f
-
Filesize
512B
MD536052d8bbe6e40df6c209a56b70aef4c
SHA1c06e475b9b2be5d9cc0b3cdd606d068417e72b23
SHA256dfba21f50ad10f27586ab4f5890454c1218204d0b2301908da46922f2d4ba132
SHA51206670e20ffb7250b59355ed54ec6cd3d07084444d5c9aadb8aac369eec145c8362b88cea7827249cbf4cdbfd931a9046765ddfdca07f7a1786146ffc0b9886ed
-
Filesize
247KB
MD5bf0165798e27e82f240edf778a210e3a
SHA18b7e33596c4bc1e00fc72fdf004e89e91871a6c4
SHA256e5e75ba7e56bf8a07a34d4f45f8da8773ca724a685c98d8f6b83817549e5adfe
SHA512bdea9cb850d6c40d86ff3c16a947ce670986d81c02e29db5d46247485475fe51bd9c68d72a7bc77244e9fd89c8eb1d7411be6b788dae8aab7160fde9097083a3
-
Filesize
247KB
MD5bf0165798e27e82f240edf778a210e3a
SHA18b7e33596c4bc1e00fc72fdf004e89e91871a6c4
SHA256e5e75ba7e56bf8a07a34d4f45f8da8773ca724a685c98d8f6b83817549e5adfe
SHA512bdea9cb850d6c40d86ff3c16a947ce670986d81c02e29db5d46247485475fe51bd9c68d72a7bc77244e9fd89c8eb1d7411be6b788dae8aab7160fde9097083a3
-
Filesize
729KB
MD586376e82c61b93dde2633a0bd8537347
SHA16b8d033eeb92c62bca9363a152b281f101581219
SHA2566966336056fa7029e54fb1afedd93bac972804127eae9d479f72693de608d73e
SHA51251c582732a60e62f54c865f892a9fa3a5b5c7452f17d6db3e1b8cecc310f6f797c19223ecf973b88a35a6b269f1d15831b8dcea02b3d4796d765fb3615d301e8
-
Filesize
729KB
MD586376e82c61b93dde2633a0bd8537347
SHA16b8d033eeb92c62bca9363a152b281f101581219
SHA2566966336056fa7029e54fb1afedd93bac972804127eae9d479f72693de608d73e
SHA51251c582732a60e62f54c865f892a9fa3a5b5c7452f17d6db3e1b8cecc310f6f797c19223ecf973b88a35a6b269f1d15831b8dcea02b3d4796d765fb3615d301e8