Analysis
-
max time kernel
146s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 18:41
Static task
static1
Behavioral task
behavioral1
Sample
e3e89aaefa689381867c87d37ebaddc5f351c3376f64a6fe2c2972e3a44f4b98.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e3e89aaefa689381867c87d37ebaddc5f351c3376f64a6fe2c2972e3a44f4b98.exe
Resource
win10v2004-20220812-en
General
-
Target
e3e89aaefa689381867c87d37ebaddc5f351c3376f64a6fe2c2972e3a44f4b98.exe
-
Size
216KB
-
MD5
44a136ae67accab96d8ab53a5f54d000
-
SHA1
903bbada00149c417266e0fa7b298640f9080bcc
-
SHA256
e3e89aaefa689381867c87d37ebaddc5f351c3376f64a6fe2c2972e3a44f4b98
-
SHA512
5a0aedd698d909fcc4fb9481f65908e72bd371dc9fe155b21f3973f4ac840cb9b1568d7025379afe5fce14f4ac8f5e24c438dacdfee5a599c3f933340319cda5
-
SSDEEP
3072:ol3qOf+5or1QcMgmST9F+bAsOekqMhOdFAeRV8HDO4O2Vurl3dQ4GCH:dOf+5UpMdkF+8sOKmw+eR8kFdO
Malware Config
Signatures
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\UXTvMlrT.exe aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\UXTvMlrT.exe aspack_v212_v242 -
Executes dropped EXE 1 IoCs
Processes:
UXTvMlrT.exepid process 4804 UXTvMlrT.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
UXTvMlrT.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation UXTvMlrT.exe -
Drops file in Program Files directory 64 IoCs
Processes:
UXTvMlrT.exedescription ioc process File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jabswitch.exe UXTvMlrT.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\klist.exe UXTvMlrT.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PPTICO.EXE UXTvMlrT.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\FullTrustNotifier.exe UXTvMlrT.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\jp2launcher.exe UXTvMlrT.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\ssvagent.exe UXTvMlrT.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\AppVLP.exe UXTvMlrT.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoasb.exe UXTvMlrT.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\Cortana.exe UXTvMlrT.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe UXTvMlrT.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\YourPhone.exe UXTvMlrT.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.Loader.exe UXTvMlrT.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SDXHelperBgt.exe UXTvMlrT.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe UXTvMlrT.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32Info.exe UXTvMlrT.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe UXTvMlrT.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\Win32Bridge.Server.exe UXTvMlrT.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\ktab.exe UXTvMlrT.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_x64__8wekyb3d8bbwe\GetHelp.exe UXTvMlrT.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe UXTvMlrT.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\lib\nbexec64.exe UXTvMlrT.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\java.exe UXTvMlrT.exe File opened for modification C:\Program Files\Microsoft Office 15\ClientX64\OfficeClickToRun.exe UXTvMlrT.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGamingOverlay_2.34.28001.0_x64__8wekyb3d8bbwe\GameBar.exe UXTvMlrT.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jconsole.exe UXTvMlrT.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\rmic.exe UXTvMlrT.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\setup.exe UXTvMlrT.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\klist.exe UXTvMlrT.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\GRAPH.EXE UXTvMlrT.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoev.exe UXTvMlrT.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_x64__8wekyb3d8bbwe\Microsoft.MicrosoftSolitaireCollection.exe UXTvMlrT.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\chrome_pwa_launcher.exe UXTvMlrT.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\kinit.exe UXTvMlrT.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOICONS.EXE UXTvMlrT.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{9FE34FF4-CC04-4D7E-96B4-2FFAA3FF5050}\chrome_installer.exe UXTvMlrT.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOSREC.EXE UXTvMlrT.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ADelRCP.exe UXTvMlrT.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javapackager.exe UXTvMlrT.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jcmd.exe UXTvMlrT.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\jjs.exe UXTvMlrT.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\tnameserv.exe UXTvMlrT.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoadfsb.exe UXTvMlrT.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\pack200.exe UXTvMlrT.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\tnameserv.exe UXTvMlrT.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\FLTLDR.EXE UXTvMlrT.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\orbd.exe UXTvMlrT.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\policytool.exe UXTvMlrT.exe File opened for modification C:\Program Files\Windows Mail\wabmig.exe UXTvMlrT.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\extcheck.exe UXTvMlrT.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jstack.exe UXTvMlrT.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\java-rmi.exe UXTvMlrT.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\lib\nbexec.exe UXTvMlrT.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\excelcnv.exe UXTvMlrT.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SDXHelper.exe UXTvMlrT.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeBridge\SkypeBridge.exe UXTvMlrT.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jjs.exe UXTvMlrT.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\wsgen.exe UXTvMlrT.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\jp2launcher.exe UXTvMlrT.exe File opened for modification C:\Program Files (x86)\Windows Mail\wab.exe UXTvMlrT.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\javacpl.exe UXTvMlrT.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PDFREFLOW.EXE UXTvMlrT.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe UXTvMlrT.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\java.exe UXTvMlrT.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\AppInstallerElevatedAppServiceClient.exe UXTvMlrT.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
e3e89aaefa689381867c87d37ebaddc5f351c3376f64a6fe2c2972e3a44f4b98.exeUXTvMlrT.exedescription pid process target process PID 2024 wrote to memory of 4804 2024 e3e89aaefa689381867c87d37ebaddc5f351c3376f64a6fe2c2972e3a44f4b98.exe UXTvMlrT.exe PID 2024 wrote to memory of 4804 2024 e3e89aaefa689381867c87d37ebaddc5f351c3376f64a6fe2c2972e3a44f4b98.exe UXTvMlrT.exe PID 2024 wrote to memory of 4804 2024 e3e89aaefa689381867c87d37ebaddc5f351c3376f64a6fe2c2972e3a44f4b98.exe UXTvMlrT.exe PID 4804 wrote to memory of 3616 4804 UXTvMlrT.exe cmd.exe PID 4804 wrote to memory of 3616 4804 UXTvMlrT.exe cmd.exe PID 4804 wrote to memory of 3616 4804 UXTvMlrT.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e3e89aaefa689381867c87d37ebaddc5f351c3376f64a6fe2c2972e3a44f4b98.exe"C:\Users\Admin\AppData\Local\Temp\e3e89aaefa689381867c87d37ebaddc5f351c3376f64a6fe2c2972e3a44f4b98.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\UXTvMlrT.exeC:\Users\Admin\AppData\Local\Temp\UXTvMlrT.exe2⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\019f0d8e.bat" "3⤵PID:3616
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
191B
MD5fa8bee4d22bce0ebd606e33431797e8e
SHA131a470ef0f445a7ae8e1a7958970a13df0123e9d
SHA256927430c2549ce31cb4abcd4050b269556bad43c4a414008864cc520c36c4beaa
SHA5122a63e819bbd4d425d2f99531f2323620b10ea029cb0389e2c3739371cef4c8fe7fd5cbada893428b87a0d189b9d3dd3685c4645e2bebd8f165fe79527bfaeb3e
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e