Analysis

  • max time kernel
    151s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 09:42

General

  • Target

    49b2cbb64440101fa6b838082a1ce986fe4bd1869069aef5f83167fad5f456c8.exe

  • Size

    124KB

  • MD5

    70d24101bbf1b1c0586eda8cb43b0b86

  • SHA1

    05b7f3c58ddee28044006efb66020597a7d52c36

  • SHA256

    49b2cbb64440101fa6b838082a1ce986fe4bd1869069aef5f83167fad5f456c8

  • SHA512

    b2d4f60dd2999d8fa739a89ed08ed2fc9f3946647667d72960c0b0c9a5ca91aa803641d7961372726e6faaeb853ff9b95df1f473afe771ff8a38748364d2e569

  • SSDEEP

    3072:ZlLfBpLN3a1P4eSZWWGNBrGnrKB+3s/s1Ic44g1j0JPuG:TBX24eSjGncrXCSIc

Malware Config

Signatures

  • UAC bypass 3 TTPs 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Modifies Windows Firewall 1 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\49b2cbb64440101fa6b838082a1ce986fe4bd1869069aef5f83167fad5f456c8.exe
    "C:\Users\Admin\AppData\Local\Temp\49b2cbb64440101fa6b838082a1ce986fe4bd1869069aef5f83167fad5f456c8.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1400
    • C:\Users\Admin\AppData\Local\Temp\49b2cbb64440101fa6b838082a1ce986fe4bd1869069aef5f83167fad5f456c8.exe
      "C:\Users\Admin\AppData\Local\Temp\49b2cbb64440101fa6b838082a1ce986fe4bd1869069aef5f83167fad5f456c8.exe"
      2⤵
      • UAC bypass
      • Checks computer location settings
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:3884
      • C:\Windows\SysWOW64\netsh.exe
        "C:\Windows\System32\netsh.exe" Firewall set opmode disable
        3⤵
        • Modifies Windows Firewall
        PID:4268
      • C:\ProgramData\3cfdec86b2da3c13a849930b80390b04\CrrupatfSjetol.exe
        "C:\ProgramData\3cfdec86b2da3c13a849930b80390b04\CrrupatfSjetol.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4560
        • C:\ProgramData\3cfdec86b2da3c13a849930b80390b04\CrrupatfSjetol.exe
          "C:\ProgramData\3cfdec86b2da3c13a849930b80390b04\CrrupatfSjetol.exe"
          4⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Modifies registry class
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4284
          • C:\Windows\SysWOW64\netsh.exe
            "C:\Windows\System32\netsh.exe" Firewall set opmode disable
            5⤵
            • Modifies Windows Firewall
            PID:4160
          • C:\Windows\SysWOW64\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\ProgramData\EqUxaAe.vbs"
            5⤵
              PID:1340

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\.{1e69ee4b-0de4-3437-8433-efecf940be05}\1e69ee4b0de434378433efecf940be05

      Filesize

      43B

      MD5

      0bd8e76be43df15e7b2d18debffef8ae

      SHA1

      6e768abe1ee221192975f117e2c1b87a6de73d61

      SHA256

      892bd6b1407445706cf182760e92e44bef414a7efb0a94d06cc97fea13c2a836

      SHA512

      92aaec89a341cc49d504e29f587fbbb75e30a6a3b8017acc8cb53c6b76d5140525e31e19846641c53b5ce511eb67d2fbee294a78ba5819dd058646493a31ff35

    • C:\ProgramData\3cfdec86b2da3c13a849930b80390b04\CrrupatfSjetol.exe

      Filesize

      124KB

      MD5

      70d24101bbf1b1c0586eda8cb43b0b86

      SHA1

      05b7f3c58ddee28044006efb66020597a7d52c36

      SHA256

      49b2cbb64440101fa6b838082a1ce986fe4bd1869069aef5f83167fad5f456c8

      SHA512

      b2d4f60dd2999d8fa739a89ed08ed2fc9f3946647667d72960c0b0c9a5ca91aa803641d7961372726e6faaeb853ff9b95df1f473afe771ff8a38748364d2e569

    • C:\ProgramData\3cfdec86b2da3c13a849930b80390b04\CrrupatfSjetol.exe

      Filesize

      124KB

      MD5

      70d24101bbf1b1c0586eda8cb43b0b86

      SHA1

      05b7f3c58ddee28044006efb66020597a7d52c36

      SHA256

      49b2cbb64440101fa6b838082a1ce986fe4bd1869069aef5f83167fad5f456c8

      SHA512

      b2d4f60dd2999d8fa739a89ed08ed2fc9f3946647667d72960c0b0c9a5ca91aa803641d7961372726e6faaeb853ff9b95df1f473afe771ff8a38748364d2e569

    • C:\ProgramData\3cfdec86b2da3c13a849930b80390b04\CrrupatfSjetol.exe

      Filesize

      124KB

      MD5

      70d24101bbf1b1c0586eda8cb43b0b86

      SHA1

      05b7f3c58ddee28044006efb66020597a7d52c36

      SHA256

      49b2cbb64440101fa6b838082a1ce986fe4bd1869069aef5f83167fad5f456c8

      SHA512

      b2d4f60dd2999d8fa739a89ed08ed2fc9f3946647667d72960c0b0c9a5ca91aa803641d7961372726e6faaeb853ff9b95df1f473afe771ff8a38748364d2e569

    • C:\ProgramData\EqUxaAe.vbs

      Filesize

      689B

      MD5

      db56613925842313574ddf5804481154

      SHA1

      a03f00a05568382094eff1237abd6a73b3e34296

      SHA256

      83aca24ead88621658155cf6b429a793aa846d4db7ff7f19240e258c78cf8e60

      SHA512

      0c8ab162c550000b339f7fbe1044f67ba7b9dbc3375489314f534c47a1b37b2c6b4f6b0c9c32571bbc88aa47ec81a68efd9f300a31ccb26f9cec8d5a6a079573

    • memory/1340-149-0x0000000000000000-mapping.dmp

    • memory/1400-141-0x0000000074F40000-0x00000000754F1000-memory.dmp

      Filesize

      5.7MB

    • memory/1400-132-0x0000000074F40000-0x00000000754F1000-memory.dmp

      Filesize

      5.7MB

    • memory/3884-140-0x0000000074F40000-0x00000000754F1000-memory.dmp

      Filesize

      5.7MB

    • memory/3884-135-0x0000000074F40000-0x00000000754F1000-memory.dmp

      Filesize

      5.7MB

    • memory/3884-134-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/3884-133-0x0000000000000000-mapping.dmp

    • memory/4160-147-0x0000000000000000-mapping.dmp

    • memory/4268-136-0x0000000000000000-mapping.dmp

    • memory/4284-148-0x0000000074F40000-0x00000000754F1000-memory.dmp

      Filesize

      5.7MB

    • memory/4284-143-0x0000000000000000-mapping.dmp

    • memory/4284-152-0x0000000074F40000-0x00000000754F1000-memory.dmp

      Filesize

      5.7MB

    • memory/4560-142-0x0000000074F40000-0x00000000754F1000-memory.dmp

      Filesize

      5.7MB

    • memory/4560-137-0x0000000000000000-mapping.dmp

    • memory/4560-151-0x0000000074F40000-0x00000000754F1000-memory.dmp

      Filesize

      5.7MB