Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 09:54
Static task
static1
Behavioral task
behavioral1
Sample
41707206bb6ac790542519a9cad6a438c71e5b1e3eeef5f95f99f7cd19126d9f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
41707206bb6ac790542519a9cad6a438c71e5b1e3eeef5f95f99f7cd19126d9f.exe
Resource
win10v2004-20220812-en
General
-
Target
41707206bb6ac790542519a9cad6a438c71e5b1e3eeef5f95f99f7cd19126d9f.exe
-
Size
296KB
-
MD5
3d7a5b83b6c8fdd5df34cbb0d23483de
-
SHA1
e774dc8e30008338844f096c6ade70e2c092052d
-
SHA256
41707206bb6ac790542519a9cad6a438c71e5b1e3eeef5f95f99f7cd19126d9f
-
SHA512
804a888abd4982913cc1c1e1585040fb6be47c1ca37b5be9eb6c52d6c419c038dfaf18f670e1fa942f2f316fac49e4e613beb39a4a54d21d6df7371bb5947182
-
SSDEEP
6144:Nnh4rMUW2f5mn4cwBPQD4od7FwDvKbrAGeGYiRqVVc67HJz:zf1o2faKbrAGeuRqVCqF
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 10 IoCs
Processes:
reg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\URFNZWN8PN.exe = "C:\\Users\\Admin\\AppData\\Roaming\\URFNZWN8PN.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe = "C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\vbc.exe:*:Enabled:Windows Messanger" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe -
Executes dropped EXE 2 IoCs
Processes:
tmp7B4F.tmp.exetmp7B4F.tmp.exepid process 532 tmp7B4F.tmp.exe 4180 tmp7B4F.tmp.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
41707206bb6ac790542519a9cad6a438c71e5b1e3eeef5f95f99f7cd19126d9f.exetmp7B4F.tmp.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 41707206bb6ac790542519a9cad6a438c71e5b1e3eeef5f95f99f7cd19126d9f.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp7B4F.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
41707206bb6ac790542519a9cad6a438c71e5b1e3eeef5f95f99f7cd19126d9f.exetmp7B4F.tmp.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1078409990.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp7B4F.tmp.exe" 41707206bb6ac790542519a9cad6a438c71e5b1e3eeef5f95f99f7cd19126d9f.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\109097301.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp7B4F.tmp.exe\"" tmp7B4F.tmp.exe -
Drops desktop.ini file(s) 2 IoCs
Processes:
41707206bb6ac790542519a9cad6a438c71e5b1e3eeef5f95f99f7cd19126d9f.exedescription ioc process File opened for modification C:\Windows\assembly\Desktop.ini 41707206bb6ac790542519a9cad6a438c71e5b1e3eeef5f95f99f7cd19126d9f.exe File created C:\Windows\assembly\Desktop.ini 41707206bb6ac790542519a9cad6a438c71e5b1e3eeef5f95f99f7cd19126d9f.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
41707206bb6ac790542519a9cad6a438c71e5b1e3eeef5f95f99f7cd19126d9f.exedescription pid process target process PID 2492 set thread context of 788 2492 41707206bb6ac790542519a9cad6a438c71e5b1e3eeef5f95f99f7cd19126d9f.exe vbc.exe -
Drops file in Windows directory 3 IoCs
Processes:
41707206bb6ac790542519a9cad6a438c71e5b1e3eeef5f95f99f7cd19126d9f.exedescription ioc process File opened for modification C:\Windows\assembly 41707206bb6ac790542519a9cad6a438c71e5b1e3eeef5f95f99f7cd19126d9f.exe File created C:\Windows\assembly\Desktop.ini 41707206bb6ac790542519a9cad6a438c71e5b1e3eeef5f95f99f7cd19126d9f.exe File opened for modification C:\Windows\assembly\Desktop.ini 41707206bb6ac790542519a9cad6a438c71e5b1e3eeef5f95f99f7cd19126d9f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 4 IoCs
Processes:
reg.exereg.exereg.exereg.exepid process 3744 reg.exe 5048 reg.exe 1508 reg.exe 1504 reg.exe -
Suspicious use of AdjustPrivilegeToken 38 IoCs
Processes:
41707206bb6ac790542519a9cad6a438c71e5b1e3eeef5f95f99f7cd19126d9f.exetmp7B4F.tmp.exevbc.exetmp7B4F.tmp.exedescription pid process Token: SeDebugPrivilege 2492 41707206bb6ac790542519a9cad6a438c71e5b1e3eeef5f95f99f7cd19126d9f.exe Token: SeDebugPrivilege 532 tmp7B4F.tmp.exe Token: 1 788 vbc.exe Token: SeCreateTokenPrivilege 788 vbc.exe Token: SeAssignPrimaryTokenPrivilege 788 vbc.exe Token: SeLockMemoryPrivilege 788 vbc.exe Token: SeIncreaseQuotaPrivilege 788 vbc.exe Token: SeMachineAccountPrivilege 788 vbc.exe Token: SeTcbPrivilege 788 vbc.exe Token: SeSecurityPrivilege 788 vbc.exe Token: SeTakeOwnershipPrivilege 788 vbc.exe Token: SeLoadDriverPrivilege 788 vbc.exe Token: SeSystemProfilePrivilege 788 vbc.exe Token: SeSystemtimePrivilege 788 vbc.exe Token: SeProfSingleProcessPrivilege 788 vbc.exe Token: SeIncBasePriorityPrivilege 788 vbc.exe Token: SeCreatePagefilePrivilege 788 vbc.exe Token: SeCreatePermanentPrivilege 788 vbc.exe Token: SeBackupPrivilege 788 vbc.exe Token: SeRestorePrivilege 788 vbc.exe Token: SeShutdownPrivilege 788 vbc.exe Token: SeDebugPrivilege 788 vbc.exe Token: SeAuditPrivilege 788 vbc.exe Token: SeSystemEnvironmentPrivilege 788 vbc.exe Token: SeChangeNotifyPrivilege 788 vbc.exe Token: SeRemoteShutdownPrivilege 788 vbc.exe Token: SeUndockPrivilege 788 vbc.exe Token: SeSyncAgentPrivilege 788 vbc.exe Token: SeEnableDelegationPrivilege 788 vbc.exe Token: SeManageVolumePrivilege 788 vbc.exe Token: SeImpersonatePrivilege 788 vbc.exe Token: SeCreateGlobalPrivilege 788 vbc.exe Token: 31 788 vbc.exe Token: 32 788 vbc.exe Token: 33 788 vbc.exe Token: 34 788 vbc.exe Token: 35 788 vbc.exe Token: SeDebugPrivilege 4180 tmp7B4F.tmp.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
vbc.exepid process 788 vbc.exe 788 vbc.exe 788 vbc.exe 788 vbc.exe 788 vbc.exe 788 vbc.exe 788 vbc.exe 788 vbc.exe -
Suspicious use of WriteProcessMemory 38 IoCs
Processes:
41707206bb6ac790542519a9cad6a438c71e5b1e3eeef5f95f99f7cd19126d9f.exetmp7B4F.tmp.exevbc.execmd.execmd.execmd.execmd.exedescription pid process target process PID 2492 wrote to memory of 532 2492 41707206bb6ac790542519a9cad6a438c71e5b1e3eeef5f95f99f7cd19126d9f.exe tmp7B4F.tmp.exe PID 2492 wrote to memory of 532 2492 41707206bb6ac790542519a9cad6a438c71e5b1e3eeef5f95f99f7cd19126d9f.exe tmp7B4F.tmp.exe PID 2492 wrote to memory of 532 2492 41707206bb6ac790542519a9cad6a438c71e5b1e3eeef5f95f99f7cd19126d9f.exe tmp7B4F.tmp.exe PID 532 wrote to memory of 4180 532 tmp7B4F.tmp.exe tmp7B4F.tmp.exe PID 532 wrote to memory of 4180 532 tmp7B4F.tmp.exe tmp7B4F.tmp.exe PID 532 wrote to memory of 4180 532 tmp7B4F.tmp.exe tmp7B4F.tmp.exe PID 2492 wrote to memory of 788 2492 41707206bb6ac790542519a9cad6a438c71e5b1e3eeef5f95f99f7cd19126d9f.exe vbc.exe PID 2492 wrote to memory of 788 2492 41707206bb6ac790542519a9cad6a438c71e5b1e3eeef5f95f99f7cd19126d9f.exe vbc.exe PID 2492 wrote to memory of 788 2492 41707206bb6ac790542519a9cad6a438c71e5b1e3eeef5f95f99f7cd19126d9f.exe vbc.exe PID 2492 wrote to memory of 788 2492 41707206bb6ac790542519a9cad6a438c71e5b1e3eeef5f95f99f7cd19126d9f.exe vbc.exe PID 2492 wrote to memory of 788 2492 41707206bb6ac790542519a9cad6a438c71e5b1e3eeef5f95f99f7cd19126d9f.exe vbc.exe PID 2492 wrote to memory of 788 2492 41707206bb6ac790542519a9cad6a438c71e5b1e3eeef5f95f99f7cd19126d9f.exe vbc.exe PID 2492 wrote to memory of 788 2492 41707206bb6ac790542519a9cad6a438c71e5b1e3eeef5f95f99f7cd19126d9f.exe vbc.exe PID 2492 wrote to memory of 788 2492 41707206bb6ac790542519a9cad6a438c71e5b1e3eeef5f95f99f7cd19126d9f.exe vbc.exe PID 788 wrote to memory of 5016 788 vbc.exe cmd.exe PID 788 wrote to memory of 5016 788 vbc.exe cmd.exe PID 788 wrote to memory of 5016 788 vbc.exe cmd.exe PID 788 wrote to memory of 4820 788 vbc.exe cmd.exe PID 788 wrote to memory of 4820 788 vbc.exe cmd.exe PID 788 wrote to memory of 4820 788 vbc.exe cmd.exe PID 788 wrote to memory of 4744 788 vbc.exe cmd.exe PID 788 wrote to memory of 4744 788 vbc.exe cmd.exe PID 788 wrote to memory of 4744 788 vbc.exe cmd.exe PID 788 wrote to memory of 5032 788 vbc.exe cmd.exe PID 788 wrote to memory of 5032 788 vbc.exe cmd.exe PID 788 wrote to memory of 5032 788 vbc.exe cmd.exe PID 4744 wrote to memory of 1504 4744 cmd.exe reg.exe PID 4744 wrote to memory of 1504 4744 cmd.exe reg.exe PID 4744 wrote to memory of 1504 4744 cmd.exe reg.exe PID 5032 wrote to memory of 1508 5032 cmd.exe reg.exe PID 5032 wrote to memory of 1508 5032 cmd.exe reg.exe PID 5032 wrote to memory of 1508 5032 cmd.exe reg.exe PID 5016 wrote to memory of 3744 5016 cmd.exe reg.exe PID 5016 wrote to memory of 3744 5016 cmd.exe reg.exe PID 5016 wrote to memory of 3744 5016 cmd.exe reg.exe PID 4820 wrote to memory of 5048 4820 cmd.exe reg.exe PID 4820 wrote to memory of 5048 4820 cmd.exe reg.exe PID 4820 wrote to memory of 5048 4820 cmd.exe reg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\41707206bb6ac790542519a9cad6a438c71e5b1e3eeef5f95f99f7cd19126d9f.exe"C:\Users\Admin\AppData\Local\Temp\41707206bb6ac790542519a9cad6a438c71e5b1e3eeef5f95f99f7cd19126d9f.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Drops desktop.ini file(s)
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\tmp7B4F.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp7B4F.tmp.exe" /pq2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Users\Admin\AppData\Local\Temp\tmp7B4F.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp7B4F.tmp.exe" /px3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:4180 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\\vbc.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- Modifies registry key
PID:3744 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- Modifies registry key
PID:1504 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\URFNZWN8PN.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\URFNZWN8PN.exe:*:Enabled:Windows Messanger" /f3⤵
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\URFNZWN8PN.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\URFNZWN8PN.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- Modifies registry key
PID:1508 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /t REG_SZ /d "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe:*:Enabled:Windows Messanger" /f3⤵
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /t REG_SZ /d "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- Modifies registry key
PID:5048
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
400B
MD50a9b4592cd49c3c21f6767c2dabda92f
SHA1f534297527ae5ccc0ecb2221ddeb8e58daeb8b74
SHA256c7effe9cb81a70d738dee863991afefab040290d4c4b78b4202383bcb9f88fcd
SHA5126b878df474e5bbfb8e9e265f15a76560c2ef151dcebc6388c82d7f6f86ffaf83f5ade5a09f1842e493cb6c8fd63b0b88d088c728fd725f7139f965a5ee332307
-
Filesize
296KB
MD53d7a5b83b6c8fdd5df34cbb0d23483de
SHA1e774dc8e30008338844f096c6ade70e2c092052d
SHA25641707206bb6ac790542519a9cad6a438c71e5b1e3eeef5f95f99f7cd19126d9f
SHA512804a888abd4982913cc1c1e1585040fb6be47c1ca37b5be9eb6c52d6c419c038dfaf18f670e1fa942f2f316fac49e4e613beb39a4a54d21d6df7371bb5947182
-
Filesize
296KB
MD53d7a5b83b6c8fdd5df34cbb0d23483de
SHA1e774dc8e30008338844f096c6ade70e2c092052d
SHA25641707206bb6ac790542519a9cad6a438c71e5b1e3eeef5f95f99f7cd19126d9f
SHA512804a888abd4982913cc1c1e1585040fb6be47c1ca37b5be9eb6c52d6c419c038dfaf18f670e1fa942f2f316fac49e4e613beb39a4a54d21d6df7371bb5947182
-
Filesize
296KB
MD53d7a5b83b6c8fdd5df34cbb0d23483de
SHA1e774dc8e30008338844f096c6ade70e2c092052d
SHA25641707206bb6ac790542519a9cad6a438c71e5b1e3eeef5f95f99f7cd19126d9f
SHA512804a888abd4982913cc1c1e1585040fb6be47c1ca37b5be9eb6c52d6c419c038dfaf18f670e1fa942f2f316fac49e4e613beb39a4a54d21d6df7371bb5947182