Analysis
-
max time kernel
164s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 17:07
Static task
static1
Behavioral task
behavioral1
Sample
0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe
Resource
win10v2004-20221111-en
General
-
Target
0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe
-
Size
2.4MB
-
MD5
3cc08484a5832e084968697b3482500c
-
SHA1
7c44cdba35af72cbd2f8a024192b251350ccb501
-
SHA256
0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e
-
SHA512
64cfc7a9a7bbceee98a272bc853f480e5784af2a84db6bb809829ad580b4bad99a45d38453fc867c1426913a83512dc6c01301e3eba6fe526ebfa33b51820c7f
-
SSDEEP
49152:FstL1S9LWLl1hYRtUwSLOekVK7vObWhLzaBkiZoStBWGJoEr9KF:FstULm1hYtSCwObULGBhKE7rc
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/736-141-0x0000000000400000-0x0000000000A07000-memory.dmp upx behavioral2/memory/736-144-0x0000000000400000-0x0000000000A07000-memory.dmp upx behavioral2/memory/736-145-0x0000000000400000-0x0000000000A07000-memory.dmp upx behavioral2/memory/736-146-0x0000000000400000-0x0000000000A07000-memory.dmp upx behavioral2/memory/736-147-0x0000000000400000-0x0000000000A07000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exedescription pid process target process PID 908 set thread context of 3660 908 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe PID 3660 set thread context of 736 3660 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 8 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
Processes:
0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exepid process 736 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe 736 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe 736 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe 736 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe 736 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe 736 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe -
Suspicious use of SendNotifyMessage 6 IoCs
Processes:
0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exepid process 736 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe 736 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe 736 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe 736 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe 736 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe 736 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exepid process 908 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe 3660 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe 736 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exedescription pid process target process PID 908 wrote to memory of 3660 908 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe PID 908 wrote to memory of 3660 908 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe PID 908 wrote to memory of 3660 908 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe PID 908 wrote to memory of 3660 908 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe PID 908 wrote to memory of 3660 908 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe PID 908 wrote to memory of 3660 908 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe PID 908 wrote to memory of 3660 908 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe PID 908 wrote to memory of 3660 908 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe PID 3660 wrote to memory of 736 3660 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe PID 3660 wrote to memory of 736 3660 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe PID 3660 wrote to memory of 736 3660 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe PID 3660 wrote to memory of 736 3660 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe PID 3660 wrote to memory of 736 3660 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe PID 3660 wrote to memory of 736 3660 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe PID 3660 wrote to memory of 736 3660 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe PID 3660 wrote to memory of 736 3660 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe PID 736 wrote to memory of 4200 736 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe cscript.exe PID 736 wrote to memory of 4200 736 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe cscript.exe PID 736 wrote to memory of 4200 736 0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe cscript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe"C:\Users\Admin\AppData\Local\Temp\0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Users\Admin\AppData\Local\Temp\0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exeC:\Users\Admin\AppData\Local\Temp\0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe2⤵
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Users\Admin\AppData\Local\Temp\0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exeC:\Users\Admin\AppData\Local\Temp\0ad090ea42302cec5037dfe111014682cf0b72ae34c3c2d83d6705c59f170d0e.exe3⤵
- Checks computer location settings
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Windows\SysWOW64\cscript.exe"C:\Windows\system32\cscript.exe" "C:\Users\Admin\AppData\Local\Temp\teste.vbs"4⤵PID:4200
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD581051bcc2cf1bedf378224b0a93e2877
SHA1ba8ab5a0280b953aa97435ff8946cbcbb2755a27
SHA2567eb70257593da06f682a3ddda54a9d260d4fc514f645237f5ca74b08f8da61a6
SHA5121b302a2f1e624a5fb5ad94ddc4e5f8bfd74d26fa37512d0e5face303d8c40eee0d0ffa3649f5da43f439914d128166cb6c4774a7caa3b174d7535451eb697b5d
-
Filesize
841B
MD5615964e5ab63a70f0e205a476c48e356
SHA1292620321db69d57ba23fa98d2a89484ddcf83d0
SHA25638a2c0e90a7c86eb5355710dd205f22f84dbba59e688cd3da6394af8c924a102
SHA51269886825baf2075f8e6cdc50b0b34f92d5d06d42db4586396fb3db806fef79986ba5754c7b1251b007cde4f943efe9e3d27800dd7e15f8084fd7e7e6046c3ccc