Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2022 04:53
Static task
static1
Behavioral task
behavioral1
Sample
f3f63e0c0e14e45ac4a24fd867417d6b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f3f63e0c0e14e45ac4a24fd867417d6b.exe
Resource
win10v2004-20220812-en
General
-
Target
f3f63e0c0e14e45ac4a24fd867417d6b.exe
-
Size
58KB
-
MD5
f3f63e0c0e14e45ac4a24fd867417d6b
-
SHA1
0c1fba255459f9c553716182c41905ec87ee66f9
-
SHA256
8d5f868a2c1a386df121fbd941cb9b5510270d34674e964bbe3a7a36d7877577
-
SHA512
28bd4fe578e984f7db7798612c6f669d18eaf3b37f985e39a0a6ae557e520b9f0f09689940ced9c0a622f35fdd5e6a2919eab68d2d7aa606e21e26a0876c1d85
-
SSDEEP
768:AqHr9Fv5EOAMVweJTVXmZOVplA8nv6pauSF1PyZO3JeUMO4Jtx0j7W76cAYMb55:Amrnv5LfVweZVWCp28hHIO5e1a74/+
Malware Config
Extracted
bitrat
1.38
monedisssxv.duckdns.org:9090
-
communication_password
81dc9bdb52d04dc20036dbd8313ed055
-
install_dir
AppData.exe
-
install_file
compa
-
tor_process
tor
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
f3f63e0c0e14e45ac4a24fd867417d6b.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation f3f63e0c0e14e45ac4a24fd867417d6b.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
f3f63e0c0e14e45ac4a24fd867417d6b.exeInstallUtil.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ragusrtv = "\"C:\\Users\\Admin\\AppData\\Roaming\\Ukxjrx\\Ragusrtv.exe\"" f3f63e0c0e14e45ac4a24fd867417d6b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\compa = "C:\\Users\\Admin\\AppData\\Local\\AppData.exe\\compa" InstallUtil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\compa = "C:\\Users\\Admin\\AppData\\Local\\AppData.exe\\compaЀ" InstallUtil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\compa = "C:\\Users\\Admin\\AppData\\Local\\AppData.exe\\compaԀ" InstallUtil.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
InstallUtil.exepid process 1504 InstallUtil.exe 1504 InstallUtil.exe 1504 InstallUtil.exe 1504 InstallUtil.exe 1504 InstallUtil.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
f3f63e0c0e14e45ac4a24fd867417d6b.exedescription pid process target process PID 2796 set thread context of 1504 2796 f3f63e0c0e14e45ac4a24fd867417d6b.exe InstallUtil.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
powershell.exef3f63e0c0e14e45ac4a24fd867417d6b.exepid process 1556 powershell.exe 1556 powershell.exe 2796 f3f63e0c0e14e45ac4a24fd867417d6b.exe 2796 f3f63e0c0e14e45ac4a24fd867417d6b.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
f3f63e0c0e14e45ac4a24fd867417d6b.exepowershell.exeInstallUtil.exedescription pid process Token: SeDebugPrivilege 2796 f3f63e0c0e14e45ac4a24fd867417d6b.exe Token: SeDebugPrivilege 1556 powershell.exe Token: SeShutdownPrivilege 1504 InstallUtil.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
InstallUtil.exepid process 1504 InstallUtil.exe 1504 InstallUtil.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
f3f63e0c0e14e45ac4a24fd867417d6b.exedescription pid process target process PID 2796 wrote to memory of 1556 2796 f3f63e0c0e14e45ac4a24fd867417d6b.exe powershell.exe PID 2796 wrote to memory of 1556 2796 f3f63e0c0e14e45ac4a24fd867417d6b.exe powershell.exe PID 2796 wrote to memory of 1556 2796 f3f63e0c0e14e45ac4a24fd867417d6b.exe powershell.exe PID 2796 wrote to memory of 1504 2796 f3f63e0c0e14e45ac4a24fd867417d6b.exe InstallUtil.exe PID 2796 wrote to memory of 1504 2796 f3f63e0c0e14e45ac4a24fd867417d6b.exe InstallUtil.exe PID 2796 wrote to memory of 1504 2796 f3f63e0c0e14e45ac4a24fd867417d6b.exe InstallUtil.exe PID 2796 wrote to memory of 1504 2796 f3f63e0c0e14e45ac4a24fd867417d6b.exe InstallUtil.exe PID 2796 wrote to memory of 1504 2796 f3f63e0c0e14e45ac4a24fd867417d6b.exe InstallUtil.exe PID 2796 wrote to memory of 1504 2796 f3f63e0c0e14e45ac4a24fd867417d6b.exe InstallUtil.exe PID 2796 wrote to memory of 1504 2796 f3f63e0c0e14e45ac4a24fd867417d6b.exe InstallUtil.exe PID 2796 wrote to memory of 1504 2796 f3f63e0c0e14e45ac4a24fd867417d6b.exe InstallUtil.exe PID 2796 wrote to memory of 1504 2796 f3f63e0c0e14e45ac4a24fd867417d6b.exe InstallUtil.exe PID 2796 wrote to memory of 1504 2796 f3f63e0c0e14e45ac4a24fd867417d6b.exe InstallUtil.exe PID 2796 wrote to memory of 1504 2796 f3f63e0c0e14e45ac4a24fd867417d6b.exe InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f3f63e0c0e14e45ac4a24fd867417d6b.exe"C:\Users\Admin\AppData\Local\Temp\f3f63e0c0e14e45ac4a24fd867417d6b.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1556
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1504
-