Analysis
-
max time kernel
165s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 16:27
Static task
static1
Behavioral task
behavioral1
Sample
9608be066f824c5d08873a5c70301d7168f0130e486d00cc074e2f83426c6616.exe
Resource
win7-20221111-en
General
-
Target
9608be066f824c5d08873a5c70301d7168f0130e486d00cc074e2f83426c6616.exe
-
Size
407KB
-
MD5
98518cfa1ad6fb3be1bcd3ba5fd0847d
-
SHA1
ba6e43ad2bbc0ac1da8e2063649e86ffcbcd6e26
-
SHA256
9608be066f824c5d08873a5c70301d7168f0130e486d00cc074e2f83426c6616
-
SHA512
bdede47ac2ba4a17aa62a0aa7452e966428ce0a98456ef138a5170da710fc9664a8b4f31410d92edb98b99887569bb5d6e9b93e539c988ada3a7203187e4df79
-
SSDEEP
6144:NbS/QTjhUqBfxrwEnuNcSsm7IoYGW0VvBXCAt6kihCj:NQtqB5urTIoYWBQkv
Malware Config
Signatures
-
NirSoft WebBrowserPassView 2 IoCs
Password recovery tool for various web browsers
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Windows Update.exe WebBrowserPassView C:\Users\Admin\AppData\Roaming\Windows Update.exe WebBrowserPassView -
Nirsoft 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Windows Update.exe Nirsoft C:\Users\Admin\AppData\Roaming\Windows Update.exe Nirsoft -
Executes dropped EXE 1 IoCs
Processes:
Windows Update.exepid process 1172 Windows Update.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
9608be066f824c5d08873a5c70301d7168f0130e486d00cc074e2f83426c6616.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 9608be066f824c5d08873a5c70301d7168f0130e486d00cc074e2f83426c6616.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 92 whatismyipaddress.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
9608be066f824c5d08873a5c70301d7168f0130e486d00cc074e2f83426c6616.exedescription pid process target process PID 4732 wrote to memory of 1172 4732 9608be066f824c5d08873a5c70301d7168f0130e486d00cc074e2f83426c6616.exe Windows Update.exe PID 4732 wrote to memory of 1172 4732 9608be066f824c5d08873a5c70301d7168f0130e486d00cc074e2f83426c6616.exe Windows Update.exe PID 4732 wrote to memory of 1172 4732 9608be066f824c5d08873a5c70301d7168f0130e486d00cc074e2f83426c6616.exe Windows Update.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9608be066f824c5d08873a5c70301d7168f0130e486d00cc074e2f83426c6616.exe"C:\Users\Admin\AppData\Local\Temp\9608be066f824c5d08873a5c70301d7168f0130e486d00cc074e2f83426c6616.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Users\Admin\AppData\Roaming\Windows Update.exe"C:\Users\Admin\AppData\Roaming\Windows Update.exe"2⤵
- Executes dropped EXE
PID:1172
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
102B
MD51c120a0ac5077750b290f14a3f3e026b
SHA18854921b58b4ac35ef13c83361d64d3bcc97ed01
SHA2568b12e5460a8fef3973196261dbc617ba8164fb12661aa08568d0bdc2f6d8906a
SHA512dbb918e4c267822e13c11c834a31ddc60d1f3b2604266bc2ac948d9539e6e89a491da67f0077df4a135ab3ee39cb4658c89bf1c8752a86961b4591c08f7b6e65
-
Filesize
407KB
MD598518cfa1ad6fb3be1bcd3ba5fd0847d
SHA1ba6e43ad2bbc0ac1da8e2063649e86ffcbcd6e26
SHA2569608be066f824c5d08873a5c70301d7168f0130e486d00cc074e2f83426c6616
SHA512bdede47ac2ba4a17aa62a0aa7452e966428ce0a98456ef138a5170da710fc9664a8b4f31410d92edb98b99887569bb5d6e9b93e539c988ada3a7203187e4df79
-
Filesize
407KB
MD598518cfa1ad6fb3be1bcd3ba5fd0847d
SHA1ba6e43ad2bbc0ac1da8e2063649e86ffcbcd6e26
SHA2569608be066f824c5d08873a5c70301d7168f0130e486d00cc074e2f83426c6616
SHA512bdede47ac2ba4a17aa62a0aa7452e966428ce0a98456ef138a5170da710fc9664a8b4f31410d92edb98b99887569bb5d6e9b93e539c988ada3a7203187e4df79