Analysis
-
max time kernel
183s -
max time network
200s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 17:17
Static task
static1
Behavioral task
behavioral1
Sample
381fa08a936f706f9425de8488fa05c6ae3a785aee3e80b5d431190d8c51bd45.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
381fa08a936f706f9425de8488fa05c6ae3a785aee3e80b5d431190d8c51bd45.exe
Resource
win10v2004-20221111-en
General
-
Target
381fa08a936f706f9425de8488fa05c6ae3a785aee3e80b5d431190d8c51bd45.exe
-
Size
171KB
-
MD5
5549061d2e7611b35d9e43a0f65852d2
-
SHA1
3ba933bcd5b8fe00bac9bd744a21a726e01c0ddc
-
SHA256
381fa08a936f706f9425de8488fa05c6ae3a785aee3e80b5d431190d8c51bd45
-
SHA512
b8d50871863c5c8087591c6104ba5cc73c796e2e6600ea173bbfca92356204cca5aa5be4e057b3e05753410e47d0b27e8a9869c28cf91f62ca8087568c58b08c
-
SSDEEP
3072:iBAp5XhKpN4eOyVTGfhEClj8jTk+0hGC4nJuQVCKTp6:xbXE9OiTGfhEClq9dCsTCKTE
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
WScript.exeflow pid process 57 2328 WScript.exe -
Drops file in Drivers directory 3 IoCs
Processes:
cmd.exeWScript.exedescription ioc process File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\System32\drivers\etc\hîsts WScript.exe File opened for modification C:\Windows\System32\drivers\etc\hosts WScript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
381fa08a936f706f9425de8488fa05c6ae3a785aee3e80b5d431190d8c51bd45.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 381fa08a936f706f9425de8488fa05c6ae3a785aee3e80b5d431190d8c51bd45.exe -
Drops file in Program Files directory 5 IoCs
Processes:
381fa08a936f706f9425de8488fa05c6ae3a785aee3e80b5d431190d8c51bd45.exedescription ioc process File opened for modification C:\Program Files (x86)\1\2\daet.vbs 381fa08a936f706f9425de8488fa05c6ae3a785aee3e80b5d431190d8c51bd45.exe File opened for modification C:\Program Files (x86)\1\2\ekstaz.vbs 381fa08a936f706f9425de8488fa05c6ae3a785aee3e80b5d431190d8c51bd45.exe File opened for modification C:\Program Files (x86)\1\2\kids.txt 381fa08a936f706f9425de8488fa05c6ae3a785aee3e80b5d431190d8c51bd45.exe File opened for modification C:\Program Files (x86)\1\2\gam.txt 381fa08a936f706f9425de8488fa05c6ae3a785aee3e80b5d431190d8c51bd45.exe File opened for modification C:\Program Files (x86)\1\2\sogazr.bat 381fa08a936f706f9425de8488fa05c6ae3a785aee3e80b5d431190d8c51bd45.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
381fa08a936f706f9425de8488fa05c6ae3a785aee3e80b5d431190d8c51bd45.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 381fa08a936f706f9425de8488fa05c6ae3a785aee3e80b5d431190d8c51bd45.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
381fa08a936f706f9425de8488fa05c6ae3a785aee3e80b5d431190d8c51bd45.exedescription pid process target process PID 4236 wrote to memory of 3648 4236 381fa08a936f706f9425de8488fa05c6ae3a785aee3e80b5d431190d8c51bd45.exe cmd.exe PID 4236 wrote to memory of 3648 4236 381fa08a936f706f9425de8488fa05c6ae3a785aee3e80b5d431190d8c51bd45.exe cmd.exe PID 4236 wrote to memory of 3648 4236 381fa08a936f706f9425de8488fa05c6ae3a785aee3e80b5d431190d8c51bd45.exe cmd.exe PID 4236 wrote to memory of 2328 4236 381fa08a936f706f9425de8488fa05c6ae3a785aee3e80b5d431190d8c51bd45.exe WScript.exe PID 4236 wrote to memory of 2328 4236 381fa08a936f706f9425de8488fa05c6ae3a785aee3e80b5d431190d8c51bd45.exe WScript.exe PID 4236 wrote to memory of 2328 4236 381fa08a936f706f9425de8488fa05c6ae3a785aee3e80b5d431190d8c51bd45.exe WScript.exe PID 4236 wrote to memory of 4964 4236 381fa08a936f706f9425de8488fa05c6ae3a785aee3e80b5d431190d8c51bd45.exe WScript.exe PID 4236 wrote to memory of 4964 4236 381fa08a936f706f9425de8488fa05c6ae3a785aee3e80b5d431190d8c51bd45.exe WScript.exe PID 4236 wrote to memory of 4964 4236 381fa08a936f706f9425de8488fa05c6ae3a785aee3e80b5d431190d8c51bd45.exe WScript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\381fa08a936f706f9425de8488fa05c6ae3a785aee3e80b5d431190d8c51bd45.exe"C:\Users\Admin\AppData\Local\Temp\381fa08a936f706f9425de8488fa05c6ae3a785aee3e80b5d431190d8c51bd45.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\1\2\sogazr.bat" "2⤵
- Drops file in Drivers directory
PID:3648 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\1\2\daet.vbs"2⤵
- Blocklisted process makes network request
PID:2328 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\1\2\ekstaz.vbs"2⤵
- Drops file in Drivers directory
PID:4964
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
548B
MD523e1994afc048f22201e051d316c4ad5
SHA1be5bf58340910e350bc312f063965279009e9ca2
SHA25691a99c244d4b359e4ef52496c60e49be7b10026e0e3b5e44c53101f17c097913
SHA512828da221179c02231069b5fa2b97532f006ee339a7c6c5fe8ef8fccecdf791561ce9f7aea66260d1592bc599812598fc2e02eaf62ba2b8193776666c674c30de
-
Filesize
579B
MD5398ac27a74bcdba86f2791c7da01ae9e
SHA17f6b22dda201daafdf12b34b62422d044c7de335
SHA25602a747ad63dc0d1110b5d1a1b5ccd038e15081ac7f55ad80bbbe7c8ccb811628
SHA5123b4bc4c793814d489ceb0276172c016048140f4c43385768bbea1c627909a28162e9266f31823b49a8204ebab70567049642697f6b1635c1b038552f54a7d4b7
-
Filesize
1B
MD5fc1262746424402278e88f6c1f02f581
SHA177ac341feebeb7c0a7ff8f9c6540531500693bac
SHA25694455e3ed9f716bea425ef99b51fae47128769a1a0cd04244221e4e14631ab83
SHA512f9cd8ac2f900da287babe09ec5a017506809531fa60d273a75eb2d5c7d9ad2d7596b4deb3dfd01638295e06a572c306fc0014dd36def8aa6c72de426a9bacff6
-
Filesize
5B
MD5fa54236b51312560a33f74061da7c1a2
SHA1d3a9987bae22aae745550850ac6fbe63b1f1baf8
SHA256cd52b33f6f37c16d112057b4c1e256e785ff2f24e6653e4220427a06843be849
SHA512686029033b58cf6e68dcf00ac5d921eda87db4191f68e6fde059071a0eb6342858f4ab650b33a628d292d918bfb454fbb9b9b6b3ff9807c573f2446ac482ecec
-
Filesize
3KB
MD52aa3f4da1dc0a98c70866f66b63a3f97
SHA1b26bb29f2fc16326b1ddee2df119f5c9231c8484
SHA2566377a61e500c6930b979ca3837085c171539c9e7ac64a1d9ce4d6c0e5d6b0387
SHA5129799808583da6030237e587370b93da72d7c486386d2167c8c2c02ecf733d052961e39f73666bf79a3fc5024f4c138b4c609a553c32088b8b6819b14635e850d
-
Filesize
1KB
MD5ec594855290bef0dab963e6c3da5e7f9
SHA1f9f062f06b8869010902d40cfa40e89476292c8d
SHA256ff770401f9ba83b76f6fb3f819ca5f47041c40e542e98a0837397c5d2bbb1c98
SHA512adbf319675b6762d8d4804a56d3720f800564903a9e19feae11a4417ad0e99debf5e45e2a8c395e3106b2011efc5e7c7ef00047380b58b3f2139177f408f7446