Analysis
-
max time kernel
152s -
max time network
197s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 15:44
Static task
static1
Behavioral task
behavioral1
Sample
dc848d72c7885494b4a55cca209944a6e8a27ada2b4020829f57c0bcede37b0d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
dc848d72c7885494b4a55cca209944a6e8a27ada2b4020829f57c0bcede37b0d.exe
Resource
win10v2004-20221111-en
General
-
Target
dc848d72c7885494b4a55cca209944a6e8a27ada2b4020829f57c0bcede37b0d.exe
-
Size
437KB
-
MD5
00d2f2d26012cf7af715768e33f83504
-
SHA1
e665130336b73ccc586f4e366a29ae1229d4dc49
-
SHA256
dc848d72c7885494b4a55cca209944a6e8a27ada2b4020829f57c0bcede37b0d
-
SHA512
5fe464cc9d11cd5ea2dc2deb78a24abdad764e7c8bc36fb0cb04147e0861c69abf9c49c54807264be80cc60d9cbe94dad5594b6dffb5de926e1f23719bfaaa83
-
SSDEEP
6144:nim1FMLBBvpIjSUdhFZH6l0b1rLWgRYuC:KLBvdkaYVC
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Vk AvtoOtvet.exepid process 2356 Vk AvtoOtvet.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
dc848d72c7885494b4a55cca209944a6e8a27ada2b4020829f57c0bcede37b0d.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dc848d72c7885494b4a55cca209944a6e8a27ada2b4020829f57c0bcede37b0d.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
dc848d72c7885494b4a55cca209944a6e8a27ada2b4020829f57c0bcede37b0d.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation dc848d72c7885494b4a55cca209944a6e8a27ada2b4020829f57c0bcede37b0d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
dw20.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
dw20.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
dc848d72c7885494b4a55cca209944a6e8a27ada2b4020829f57c0bcede37b0d.exepid process 2504 dc848d72c7885494b4a55cca209944a6e8a27ada2b4020829f57c0bcede37b0d.exe 2504 dc848d72c7885494b4a55cca209944a6e8a27ada2b4020829f57c0bcede37b0d.exe 2504 dc848d72c7885494b4a55cca209944a6e8a27ada2b4020829f57c0bcede37b0d.exe 2504 dc848d72c7885494b4a55cca209944a6e8a27ada2b4020829f57c0bcede37b0d.exe 2504 dc848d72c7885494b4a55cca209944a6e8a27ada2b4020829f57c0bcede37b0d.exe 2504 dc848d72c7885494b4a55cca209944a6e8a27ada2b4020829f57c0bcede37b0d.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
dw20.exedescription pid process Token: SeRestorePrivilege 548 dw20.exe Token: SeBackupPrivilege 548 dw20.exe Token: SeBackupPrivilege 548 dw20.exe Token: SeBackupPrivilege 548 dw20.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
Vk AvtoOtvet.exepid process 2356 Vk AvtoOtvet.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
Vk AvtoOtvet.exepid process 2356 Vk AvtoOtvet.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
Vk AvtoOtvet.exepid process 2356 Vk AvtoOtvet.exe 2356 Vk AvtoOtvet.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
dc848d72c7885494b4a55cca209944a6e8a27ada2b4020829f57c0bcede37b0d.exeVk AvtoOtvet.exedescription pid process target process PID 2504 wrote to memory of 2356 2504 dc848d72c7885494b4a55cca209944a6e8a27ada2b4020829f57c0bcede37b0d.exe Vk AvtoOtvet.exe PID 2504 wrote to memory of 2356 2504 dc848d72c7885494b4a55cca209944a6e8a27ada2b4020829f57c0bcede37b0d.exe Vk AvtoOtvet.exe PID 2504 wrote to memory of 2356 2504 dc848d72c7885494b4a55cca209944a6e8a27ada2b4020829f57c0bcede37b0d.exe Vk AvtoOtvet.exe PID 2356 wrote to memory of 548 2356 Vk AvtoOtvet.exe dw20.exe PID 2356 wrote to memory of 548 2356 Vk AvtoOtvet.exe dw20.exe PID 2356 wrote to memory of 548 2356 Vk AvtoOtvet.exe dw20.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc848d72c7885494b4a55cca209944a6e8a27ada2b4020829f57c0bcede37b0d.exe"C:\Users\Admin\AppData\Local\Temp\dc848d72c7885494b4a55cca209944a6e8a27ada2b4020829f57c0bcede37b0d.exe"1⤵
- Checks BIOS information in registry
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\Vk AvtoOtvet.exe"C:\Users\Admin\AppData\Local\Temp\Vk AvtoOtvet.exe"2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 18723⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:548
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD58f3aac76491c5e19eb6adcc4ff06cf59
SHA116f48285f9b33e7f4a1f5e0f8ed9a303d795a355
SHA25633569eb53940f6b8805bed3ec93735370c8e1d7cb82f58ea1739350f58dec2c7
SHA5125684581350a40e6b0505f790bf6815aff6ed07b6805f6bae7e5963875d6cba0af8fd2efd4618c915d7ce491334148ac94acdb824c6c909f81b6b647a65c83d2c
-
Filesize
59KB
MD58f3aac76491c5e19eb6adcc4ff06cf59
SHA116f48285f9b33e7f4a1f5e0f8ed9a303d795a355
SHA25633569eb53940f6b8805bed3ec93735370c8e1d7cb82f58ea1739350f58dec2c7
SHA5125684581350a40e6b0505f790bf6815aff6ed07b6805f6bae7e5963875d6cba0af8fd2efd4618c915d7ce491334148ac94acdb824c6c909f81b6b647a65c83d2c