Analysis
-
max time kernel
129s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2022, 10:05
Behavioral task
behavioral1
Sample
46ec3076ae742e67b00aa1aff0c01b91a0109116475acba751efff923e3f7ae7.exe
Resource
win7-20221111-en
General
-
Target
46ec3076ae742e67b00aa1aff0c01b91a0109116475acba751efff923e3f7ae7.exe
-
Size
583KB
-
MD5
31ae99a368bf4296748f8efa25513d80
-
SHA1
002daa8b2f65b30711d5db8b6abbfaf1a0fc9b00
-
SHA256
46ec3076ae742e67b00aa1aff0c01b91a0109116475acba751efff923e3f7ae7
-
SHA512
0a3b1e9cd7a2d3f76890842ce0336d8683ae51f6e0a7d92187470addc580a12dd839548c7bf8f8d626a11695017804f42bd87b1c8a1231ff754c10bc524fd2f5
-
SSDEEP
12288:ZgCYxPVQ1KRLLIyDASbumfbKFsdrojwSzunLEjzaQ/K1V+qr:ZgCYQ1LGum4sx8Kofd/uV+w
Malware Config
Signatures
-
resource yara_rule behavioral2/files/0x0009000000022db2-134.dat aspack_v212_v242 behavioral2/files/0x0009000000022db2-133.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 4288 LXfWcN.exe -
resource yara_rule behavioral2/memory/2176-135-0x0000000000400000-0x0000000000586000-memory.dmp upx behavioral2/memory/2176-137-0x0000000000400000-0x0000000000586000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Control Panel\International\Geo\Nation LXfWcN.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javafxpackager.exe LXfWcN.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\jp2launcher.exe LXfWcN.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.exe LXfWcN.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\setup.exe LXfWcN.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe LXfWcN.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe LXfWcN.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\HxOutlook.exe LXfWcN.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\32BitMAPIBroker.exe LXfWcN.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\tnameserv.exe LXfWcN.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOUC.EXE LXfWcN.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.DBConnection.exe LXfWcN.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\PaintStudio.View.exe LXfWcN.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe LXfWcN.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\rmid.exe LXfWcN.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\javacpl.exe LXfWcN.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\servertool.exe LXfWcN.exe File opened for modification C:\Program Files\Microsoft Office\Office16\OSPPREARM.EXE LXfWcN.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroBroker.exe LXfWcN.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\AcroLayoutRecognizer.exe LXfWcN.exe File opened for modification C:\Program Files\7-Zip\7zG.exe LXfWcN.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\unpack200.exe LXfWcN.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateSetup.exe LXfWcN.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe LXfWcN.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\lib\nbexec.exe LXfWcN.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\arh.exe LXfWcN.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdate.exe LXfWcN.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe LXfWcN.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\orbd.exe LXfWcN.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\onenoteim.exe LXfWcN.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxIdentityProvider_12.50.6001.0_x64__8wekyb3d8bbwe\XboxIdp.exe LXfWcN.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\notification_helper.exe LXfWcN.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jcmd.exe LXfWcN.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\jabswitch.exe LXfWcN.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\policytool.exe LXfWcN.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SDXHelperBgt.exe LXfWcN.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrServicesUpdater.exe LXfWcN.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jhat.exe LXfWcN.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\pack200.exe LXfWcN.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\XLICONS.EXE LXfWcN.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DWTRIG20.EXE LXfWcN.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\FLTLDR.EXE LXfWcN.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Eula.exe LXfWcN.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\pack200.exe LXfWcN.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE LXfWcN.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{FF60BB18-5F69-4C1B-A9D8-C807970CB972}\chrome_installer.exe LXfWcN.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\HxTsr.exe LXfWcN.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32Info.exe LXfWcN.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jstat.exe LXfWcN.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jvisualvm.exe LXfWcN.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\servertool.exe LXfWcN.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\keytool.exe LXfWcN.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\kinit.exe LXfWcN.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\ssvagent.exe LXfWcN.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\89.0.4389.114\chrome_installer.exe LXfWcN.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\appletviewer.exe LXfWcN.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javaw.exe LXfWcN.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\schemagen.exe LXfWcN.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoia.exe LXfWcN.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AdobeCollabSync.exe LXfWcN.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javadoc.exe LXfWcN.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\rmid.exe LXfWcN.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\DATABASECOMPARE.EXE LXfWcN.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\MSOHTMED.EXE LXfWcN.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\Win32Bridge.Server.exe LXfWcN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2176 46ec3076ae742e67b00aa1aff0c01b91a0109116475acba751efff923e3f7ae7.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2176 wrote to memory of 4288 2176 46ec3076ae742e67b00aa1aff0c01b91a0109116475acba751efff923e3f7ae7.exe 85 PID 2176 wrote to memory of 4288 2176 46ec3076ae742e67b00aa1aff0c01b91a0109116475acba751efff923e3f7ae7.exe 85 PID 2176 wrote to memory of 4288 2176 46ec3076ae742e67b00aa1aff0c01b91a0109116475acba751efff923e3f7ae7.exe 85 PID 4288 wrote to memory of 3992 4288 LXfWcN.exe 97 PID 4288 wrote to memory of 3992 4288 LXfWcN.exe 97 PID 4288 wrote to memory of 3992 4288 LXfWcN.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\46ec3076ae742e67b00aa1aff0c01b91a0109116475acba751efff923e3f7ae7.exe"C:\Users\Admin\AppData\Local\Temp\46ec3076ae742e67b00aa1aff0c01b91a0109116475acba751efff923e3f7ae7.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\LXfWcN.exeC:\Users\Admin\AppData\Local\Temp\LXfWcN.exe2⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\25ad198f.bat" "3⤵PID:3992
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
187B
MD50cbb52c075ed8c5ee66ece5941f89e5e
SHA19ec79641a01b6d75825f43b359fb70811d6f60be
SHA256474eaca3a6af7492a53c833c2c96cd9b46b31eb87283756bbf0d8230beaa5c0e
SHA512cb58a885b12cc61c3e11d51053279e16bcbeaf5c001352a40a59286327a54e21263c83584d6f9b64dc4dcca88a8fe0b891e8b166b3c64d2173a029d2a79bbc15
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e