Analysis
-
max time kernel
167s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 10:46
Static task
static1
Behavioral task
behavioral1
Sample
182e39ddd0bbbe70fc96af6d32568b6f3dfef938980b97c7fdd072b038cd99b2.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
182e39ddd0bbbe70fc96af6d32568b6f3dfef938980b97c7fdd072b038cd99b2.exe
Resource
win10v2004-20221111-en
General
-
Target
182e39ddd0bbbe70fc96af6d32568b6f3dfef938980b97c7fdd072b038cd99b2.exe
-
Size
755KB
-
MD5
f053edde8707fc4575626c6250987bf0
-
SHA1
a64d282a8d191e38eccae844aeebe5213b5ff892
-
SHA256
182e39ddd0bbbe70fc96af6d32568b6f3dfef938980b97c7fdd072b038cd99b2
-
SHA512
f1f355a109c81bed76e4ae0cb07d5d47b3aba4e1ff5b28b4242f4bed70e02d00c2899642ef852fa77d16064beb73cb6e33ee4b1533ab502f07b9c5f252b0d03b
-
SSDEEP
12288:dE3zRbnrB0iGz8941+aWWNJRtvyhybYHOe7rny2lUobTrB0tGz8f41+aW3NJEKxV:dEjRbn10J1+/WNJTvyFtiobT1X91+/3z
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
UpdaterService.exepid process 4940 UpdaterService.exe -
Loads dropped DLL 15 IoCs
Processes:
182e39ddd0bbbe70fc96af6d32568b6f3dfef938980b97c7fdd072b038cd99b2.exepid process 3412 182e39ddd0bbbe70fc96af6d32568b6f3dfef938980b97c7fdd072b038cd99b2.exe 3412 182e39ddd0bbbe70fc96af6d32568b6f3dfef938980b97c7fdd072b038cd99b2.exe 3412 182e39ddd0bbbe70fc96af6d32568b6f3dfef938980b97c7fdd072b038cd99b2.exe 3412 182e39ddd0bbbe70fc96af6d32568b6f3dfef938980b97c7fdd072b038cd99b2.exe 3412 182e39ddd0bbbe70fc96af6d32568b6f3dfef938980b97c7fdd072b038cd99b2.exe 3412 182e39ddd0bbbe70fc96af6d32568b6f3dfef938980b97c7fdd072b038cd99b2.exe 3412 182e39ddd0bbbe70fc96af6d32568b6f3dfef938980b97c7fdd072b038cd99b2.exe 3412 182e39ddd0bbbe70fc96af6d32568b6f3dfef938980b97c7fdd072b038cd99b2.exe 3412 182e39ddd0bbbe70fc96af6d32568b6f3dfef938980b97c7fdd072b038cd99b2.exe 3412 182e39ddd0bbbe70fc96af6d32568b6f3dfef938980b97c7fdd072b038cd99b2.exe 3412 182e39ddd0bbbe70fc96af6d32568b6f3dfef938980b97c7fdd072b038cd99b2.exe 3412 182e39ddd0bbbe70fc96af6d32568b6f3dfef938980b97c7fdd072b038cd99b2.exe 3412 182e39ddd0bbbe70fc96af6d32568b6f3dfef938980b97c7fdd072b038cd99b2.exe 3412 182e39ddd0bbbe70fc96af6d32568b6f3dfef938980b97c7fdd072b038cd99b2.exe 3412 182e39ddd0bbbe70fc96af6d32568b6f3dfef938980b97c7fdd072b038cd99b2.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 10 IoCs
Processes:
182e39ddd0bbbe70fc96af6d32568b6f3dfef938980b97c7fdd072b038cd99b2.exedescription ioc process File created C:\Program Files (x86)\SoftwareUpdater\KeyGen.dll 182e39ddd0bbbe70fc96af6d32568b6f3dfef938980b97c7fdd072b038cd99b2.exe File opened for modification C:\Program Files (x86)\SoftwareUpdater\AppsUpdaterSem.exe.config 182e39ddd0bbbe70fc96af6d32568b6f3dfef938980b97c7fdd072b038cd99b2.exe File created C:\Program Files (x86)\SoftwareUpdater\UpdaterService.exe 182e39ddd0bbbe70fc96af6d32568b6f3dfef938980b97c7fdd072b038cd99b2.exe File created C:\Program Files (x86)\SoftwareUpdater\uninstall.exe 182e39ddd0bbbe70fc96af6d32568b6f3dfef938980b97c7fdd072b038cd99b2.exe File created C:\Program Files (x86)\SoftwareUpdater\AppsUpdaterSem.exe.config 182e39ddd0bbbe70fc96af6d32568b6f3dfef938980b97c7fdd072b038cd99b2.exe File created C:\Program Files (x86)\SoftwareUpdater\AppsUpdater.exe.config 182e39ddd0bbbe70fc96af6d32568b6f3dfef938980b97c7fdd072b038cd99b2.exe File created C:\Program Files (x86)\SoftwareUpdater\Interop.Shell32.dll 182e39ddd0bbbe70fc96af6d32568b6f3dfef938980b97c7fdd072b038cd99b2.exe File created C:\Program Files (x86)\SoftwareUpdater\translations.xml 182e39ddd0bbbe70fc96af6d32568b6f3dfef938980b97c7fdd072b038cd99b2.exe File created C:\Program Files (x86)\SoftwareUpdater\AppsUpdater.exe 182e39ddd0bbbe70fc96af6d32568b6f3dfef938980b97c7fdd072b038cd99b2.exe File created C:\Program Files (x86)\SoftwareUpdater\config.xml 182e39ddd0bbbe70fc96af6d32568b6f3dfef938980b97c7fdd072b038cd99b2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 4140 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 4140 taskkill.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
182e39ddd0bbbe70fc96af6d32568b6f3dfef938980b97c7fdd072b038cd99b2.exedescription pid process target process PID 3412 wrote to memory of 4140 3412 182e39ddd0bbbe70fc96af6d32568b6f3dfef938980b97c7fdd072b038cd99b2.exe taskkill.exe PID 3412 wrote to memory of 4140 3412 182e39ddd0bbbe70fc96af6d32568b6f3dfef938980b97c7fdd072b038cd99b2.exe taskkill.exe PID 3412 wrote to memory of 4140 3412 182e39ddd0bbbe70fc96af6d32568b6f3dfef938980b97c7fdd072b038cd99b2.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\182e39ddd0bbbe70fc96af6d32568b6f3dfef938980b97c7fdd072b038cd99b2.exe"C:\Users\Admin\AppData\Local\Temp\182e39ddd0bbbe70fc96af6d32568b6f3dfef938980b97c7fdd072b038cd99b2.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im AppsUpdater.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4140
-
C:\Program Files (x86)\SoftwareUpdater\UpdaterService.exe"C:\Program Files (x86)\SoftwareUpdater\UpdaterService.exe"1⤵
- Executes dropped EXE
PID:4940
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD534bd67e213a67ec101bc79af76278b4c
SHA1422e087b1ba4ec7339d8b3442665dedc58550b76
SHA25683338257e486cfab3b6064439d7a8eef9462af6c050cecc69306de225d4588f5
SHA512b4b0f89b0a0c4273fc261e8cc9ce2dae2dc16d74899b025daf02780ee31872d337e5412d18c11f424efed3aa6df8356f105e056703952de24a3de6460f6ad826
-
Filesize
38KB
MD534bd67e213a67ec101bc79af76278b4c
SHA1422e087b1ba4ec7339d8b3442665dedc58550b76
SHA25683338257e486cfab3b6064439d7a8eef9462af6c050cecc69306de225d4588f5
SHA512b4b0f89b0a0c4273fc261e8cc9ce2dae2dc16d74899b025daf02780ee31872d337e5412d18c11f424efed3aa6df8356f105e056703952de24a3de6460f6ad826
-
Filesize
61KB
MD5d63975ce28f801f236c4aca5af726961
SHA13d93ad9816d3b3dba1e63dfcbfa3bd05f787a8c9
SHA256e0c580bbe48a483075c21277c6e0f23f3cbd6ce3eb2ccd3bf48cf68f05628f43
SHA5128357e1955560bf0c42a8f4091550c87c19b4939bf1e6a53a54173d1c163b133b9c517014af6f7614eddc0c9bbf93b3b987c4977b024b10b05b3dc4eb20141810
-
Filesize
61KB
MD5d63975ce28f801f236c4aca5af726961
SHA13d93ad9816d3b3dba1e63dfcbfa3bd05f787a8c9
SHA256e0c580bbe48a483075c21277c6e0f23f3cbd6ce3eb2ccd3bf48cf68f05628f43
SHA5128357e1955560bf0c42a8f4091550c87c19b4939bf1e6a53a54173d1c163b133b9c517014af6f7614eddc0c9bbf93b3b987c4977b024b10b05b3dc4eb20141810
-
Filesize
61KB
MD5d63975ce28f801f236c4aca5af726961
SHA13d93ad9816d3b3dba1e63dfcbfa3bd05f787a8c9
SHA256e0c580bbe48a483075c21277c6e0f23f3cbd6ce3eb2ccd3bf48cf68f05628f43
SHA5128357e1955560bf0c42a8f4091550c87c19b4939bf1e6a53a54173d1c163b133b9c517014af6f7614eddc0c9bbf93b3b987c4977b024b10b05b3dc4eb20141810
-
Filesize
61KB
MD5d63975ce28f801f236c4aca5af726961
SHA13d93ad9816d3b3dba1e63dfcbfa3bd05f787a8c9
SHA256e0c580bbe48a483075c21277c6e0f23f3cbd6ce3eb2ccd3bf48cf68f05628f43
SHA5128357e1955560bf0c42a8f4091550c87c19b4939bf1e6a53a54173d1c163b133b9c517014af6f7614eddc0c9bbf93b3b987c4977b024b10b05b3dc4eb20141810
-
Filesize
61KB
MD5d63975ce28f801f236c4aca5af726961
SHA13d93ad9816d3b3dba1e63dfcbfa3bd05f787a8c9
SHA256e0c580bbe48a483075c21277c6e0f23f3cbd6ce3eb2ccd3bf48cf68f05628f43
SHA5128357e1955560bf0c42a8f4091550c87c19b4939bf1e6a53a54173d1c163b133b9c517014af6f7614eddc0c9bbf93b3b987c4977b024b10b05b3dc4eb20141810
-
Filesize
61KB
MD5d63975ce28f801f236c4aca5af726961
SHA13d93ad9816d3b3dba1e63dfcbfa3bd05f787a8c9
SHA256e0c580bbe48a483075c21277c6e0f23f3cbd6ce3eb2ccd3bf48cf68f05628f43
SHA5128357e1955560bf0c42a8f4091550c87c19b4939bf1e6a53a54173d1c163b133b9c517014af6f7614eddc0c9bbf93b3b987c4977b024b10b05b3dc4eb20141810
-
Filesize
61KB
MD5d63975ce28f801f236c4aca5af726961
SHA13d93ad9816d3b3dba1e63dfcbfa3bd05f787a8c9
SHA256e0c580bbe48a483075c21277c6e0f23f3cbd6ce3eb2ccd3bf48cf68f05628f43
SHA5128357e1955560bf0c42a8f4091550c87c19b4939bf1e6a53a54173d1c163b133b9c517014af6f7614eddc0c9bbf93b3b987c4977b024b10b05b3dc4eb20141810
-
Filesize
61KB
MD5d63975ce28f801f236c4aca5af726961
SHA13d93ad9816d3b3dba1e63dfcbfa3bd05f787a8c9
SHA256e0c580bbe48a483075c21277c6e0f23f3cbd6ce3eb2ccd3bf48cf68f05628f43
SHA5128357e1955560bf0c42a8f4091550c87c19b4939bf1e6a53a54173d1c163b133b9c517014af6f7614eddc0c9bbf93b3b987c4977b024b10b05b3dc4eb20141810
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
277KB
MD58a4cf95fd1eb60ebf730d66446397f16
SHA17da71a17d2011c08b9c8330b0092a41ff3b73eee
SHA2561f4bb0a5cd7aec4f8395bcefb0556c5d38c5ff870c30aa00df925633240d2a39
SHA512a2e2fe009bb9baf18bef564df00e282503fd31c8a85361db23847447471db5af1b58c370d5d16fb21efc32a4ca94e2d0ea5d5e23397625a14292a445efb69ea2
-
Filesize
277KB
MD58a4cf95fd1eb60ebf730d66446397f16
SHA17da71a17d2011c08b9c8330b0092a41ff3b73eee
SHA2561f4bb0a5cd7aec4f8395bcefb0556c5d38c5ff870c30aa00df925633240d2a39
SHA512a2e2fe009bb9baf18bef564df00e282503fd31c8a85361db23847447471db5af1b58c370d5d16fb21efc32a4ca94e2d0ea5d5e23397625a14292a445efb69ea2
-
Filesize
223KB
MD586a2a4ceda4d7c0a126c8c9619126bb3
SHA119d5395fe74374819fd8b6d0eee8500bec5dc31e
SHA256be40d5c9593ebcb2331b22cc4c8f9e87cf08266827bc6ad1c2ecdb2d52f9c2df
SHA5124bb63964e06a4f573a9d6e0bb21c329fd5198884d10c636e395e0bb5158981757d53a277eca47a7a9acfd2b20761a11ae9d9f8b0c402bf62bcdd672b724b01e9
-
Filesize
223KB
MD586a2a4ceda4d7c0a126c8c9619126bb3
SHA119d5395fe74374819fd8b6d0eee8500bec5dc31e
SHA256be40d5c9593ebcb2331b22cc4c8f9e87cf08266827bc6ad1c2ecdb2d52f9c2df
SHA5124bb63964e06a4f573a9d6e0bb21c329fd5198884d10c636e395e0bb5158981757d53a277eca47a7a9acfd2b20761a11ae9d9f8b0c402bf62bcdd672b724b01e9