Analysis
-
max time kernel
161s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 11:54
Static task
static1
Behavioral task
behavioral1
Sample
1711ea526738aaf92b92ed158b96d8d4c626adc6e98b70da6308903e1efc7487.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1711ea526738aaf92b92ed158b96d8d4c626adc6e98b70da6308903e1efc7487.exe
Resource
win10v2004-20221111-en
General
-
Target
1711ea526738aaf92b92ed158b96d8d4c626adc6e98b70da6308903e1efc7487.exe
-
Size
770KB
-
MD5
5fb5607b0f61bb044ff17e28388df490
-
SHA1
a5e0e097746b63d8ee36701dd040e16784df5da2
-
SHA256
1711ea526738aaf92b92ed158b96d8d4c626adc6e98b70da6308903e1efc7487
-
SHA512
37fa97795ae202377263b62dce420acad9397c17aefe1ac8ea35be43bd386bdb1aa0a0ef4a0ad659359269a29180bb0036d2c7310e8b511a1136df4ac4afa25d
-
SSDEEP
12288:+MzEoDzA1NLzZJncwAVDZI2r1xZyLA6y3TlWW+X+a3qml9nkDRTXj69mfx:t7wnLzZ0Dr1xP6y3t+Z3Vl9nATzGGx
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
vhwmdff.exevhwmdff.exepid process 3472 vhwmdff.exe 3888 vhwmdff.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
vhwmdff.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation vhwmdff.exe -
Loads dropped DLL 4 IoCs
Processes:
1711ea526738aaf92b92ed158b96d8d4c626adc6e98b70da6308903e1efc7487.exevhwmdff.exepid process 3492 1711ea526738aaf92b92ed158b96d8d4c626adc6e98b70da6308903e1efc7487.exe 3492 1711ea526738aaf92b92ed158b96d8d4c626adc6e98b70da6308903e1efc7487.exe 3472 vhwmdff.exe 3472 vhwmdff.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
1711ea526738aaf92b92ed158b96d8d4c626adc6e98b70da6308903e1efc7487.exevhwmdff.exedescription pid process target process PID 3492 set thread context of 2864 3492 1711ea526738aaf92b92ed158b96d8d4c626adc6e98b70da6308903e1efc7487.exe 1711ea526738aaf92b92ed158b96d8d4c626adc6e98b70da6308903e1efc7487.exe PID 3472 set thread context of 3888 3472 vhwmdff.exe vhwmdff.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2668 3888 WerFault.exe vhwmdff.exe -
NSIS installer 6 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\vhwmdff.exe nsis_installer_1 C:\Users\Admin\AppData\Local\Temp\vhwmdff.exe nsis_installer_2 C:\Users\Admin\AppData\Local\Temp\vhwmdff.exe nsis_installer_1 C:\Users\Admin\AppData\Local\Temp\vhwmdff.exe nsis_installer_2 C:\Users\Admin\AppData\Local\Temp\vhwmdff.exe nsis_installer_1 C:\Users\Admin\AppData\Local\Temp\vhwmdff.exe nsis_installer_2 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
1711ea526738aaf92b92ed158b96d8d4c626adc6e98b70da6308903e1efc7487.exevhwmdff.exepid process 2864 1711ea526738aaf92b92ed158b96d8d4c626adc6e98b70da6308903e1efc7487.exe 2864 1711ea526738aaf92b92ed158b96d8d4c626adc6e98b70da6308903e1efc7487.exe 3888 vhwmdff.exe 3888 vhwmdff.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
vhwmdff.exedescription pid process Token: SeDebugPrivilege 3888 vhwmdff.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
1711ea526738aaf92b92ed158b96d8d4c626adc6e98b70da6308903e1efc7487.exevhwmdff.exevhwmdff.exedescription pid process target process PID 3492 wrote to memory of 2864 3492 1711ea526738aaf92b92ed158b96d8d4c626adc6e98b70da6308903e1efc7487.exe 1711ea526738aaf92b92ed158b96d8d4c626adc6e98b70da6308903e1efc7487.exe PID 3492 wrote to memory of 2864 3492 1711ea526738aaf92b92ed158b96d8d4c626adc6e98b70da6308903e1efc7487.exe 1711ea526738aaf92b92ed158b96d8d4c626adc6e98b70da6308903e1efc7487.exe PID 3492 wrote to memory of 2864 3492 1711ea526738aaf92b92ed158b96d8d4c626adc6e98b70da6308903e1efc7487.exe 1711ea526738aaf92b92ed158b96d8d4c626adc6e98b70da6308903e1efc7487.exe PID 3492 wrote to memory of 2864 3492 1711ea526738aaf92b92ed158b96d8d4c626adc6e98b70da6308903e1efc7487.exe 1711ea526738aaf92b92ed158b96d8d4c626adc6e98b70da6308903e1efc7487.exe PID 3492 wrote to memory of 2864 3492 1711ea526738aaf92b92ed158b96d8d4c626adc6e98b70da6308903e1efc7487.exe 1711ea526738aaf92b92ed158b96d8d4c626adc6e98b70da6308903e1efc7487.exe PID 3492 wrote to memory of 2864 3492 1711ea526738aaf92b92ed158b96d8d4c626adc6e98b70da6308903e1efc7487.exe 1711ea526738aaf92b92ed158b96d8d4c626adc6e98b70da6308903e1efc7487.exe PID 3472 wrote to memory of 3888 3472 vhwmdff.exe vhwmdff.exe PID 3472 wrote to memory of 3888 3472 vhwmdff.exe vhwmdff.exe PID 3472 wrote to memory of 3888 3472 vhwmdff.exe vhwmdff.exe PID 3472 wrote to memory of 3888 3472 vhwmdff.exe vhwmdff.exe PID 3472 wrote to memory of 3888 3472 vhwmdff.exe vhwmdff.exe PID 3472 wrote to memory of 3888 3472 vhwmdff.exe vhwmdff.exe PID 3888 wrote to memory of 2700 3888 vhwmdff.exe Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\1711ea526738aaf92b92ed158b96d8d4c626adc6e98b70da6308903e1efc7487.exe"C:\Users\Admin\AppData\Local\Temp\1711ea526738aaf92b92ed158b96d8d4c626adc6e98b70da6308903e1efc7487.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\1711ea526738aaf92b92ed158b96d8d4c626adc6e98b70da6308903e1efc7487.exe"C:\Users\Admin\AppData\Local\Temp\1711ea526738aaf92b92ed158b96d8d4c626adc6e98b70da6308903e1efc7487.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\vhwmdff.exeC:\Users\Admin\AppData\Local\Temp\vhwmdff.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\vhwmdff.exe"C:\Users\Admin\AppData\Local\Temp\vhwmdff.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3888 -s 6803⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 3888 -ip 38881⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\bar\lesions.wcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Local\Temp\nsd2C0.tmp\lesions.dllFilesize
58KB
MD57f932b6120900b3173396748c5c6eb56
SHA105ebef281fb7848636c06a18b29626baaf993214
SHA256efce73f68630ceab971c912c0a5887eb2b4c7b48f1e7faeb8cf52e03281a7055
SHA512b5b59e25a5bae9fdae64309d10a0604cb7fe93f97f30b63cd0778aa7db7aa8b5c6a969c8539bdf63fb212c7f4efb4ea76a80076c84c237450897a248f15704f1
-
C:\Users\Admin\AppData\Local\Temp\nsd2C0.tmp\lesions.dllFilesize
58KB
MD57f932b6120900b3173396748c5c6eb56
SHA105ebef281fb7848636c06a18b29626baaf993214
SHA256efce73f68630ceab971c912c0a5887eb2b4c7b48f1e7faeb8cf52e03281a7055
SHA512b5b59e25a5bae9fdae64309d10a0604cb7fe93f97f30b63cd0778aa7db7aa8b5c6a969c8539bdf63fb212c7f4efb4ea76a80076c84c237450897a248f15704f1
-
C:\Users\Admin\AppData\Local\Temp\nsw3F0D.tmp\lesions.dllFilesize
58KB
MD57f932b6120900b3173396748c5c6eb56
SHA105ebef281fb7848636c06a18b29626baaf993214
SHA256efce73f68630ceab971c912c0a5887eb2b4c7b48f1e7faeb8cf52e03281a7055
SHA512b5b59e25a5bae9fdae64309d10a0604cb7fe93f97f30b63cd0778aa7db7aa8b5c6a969c8539bdf63fb212c7f4efb4ea76a80076c84c237450897a248f15704f1
-
C:\Users\Admin\AppData\Local\Temp\nsw3F0D.tmp\lesions.dllFilesize
58KB
MD57f932b6120900b3173396748c5c6eb56
SHA105ebef281fb7848636c06a18b29626baaf993214
SHA256efce73f68630ceab971c912c0a5887eb2b4c7b48f1e7faeb8cf52e03281a7055
SHA512b5b59e25a5bae9fdae64309d10a0604cb7fe93f97f30b63cd0778aa7db7aa8b5c6a969c8539bdf63fb212c7f4efb4ea76a80076c84c237450897a248f15704f1
-
C:\Users\Admin\AppData\Local\Temp\vhwmdff.exeFilesize
770KB
MD55fb5607b0f61bb044ff17e28388df490
SHA1a5e0e097746b63d8ee36701dd040e16784df5da2
SHA2561711ea526738aaf92b92ed158b96d8d4c626adc6e98b70da6308903e1efc7487
SHA51237fa97795ae202377263b62dce420acad9397c17aefe1ac8ea35be43bd386bdb1aa0a0ef4a0ad659359269a29180bb0036d2c7310e8b511a1136df4ac4afa25d
-
C:\Users\Admin\AppData\Local\Temp\vhwmdff.exeFilesize
770KB
MD55fb5607b0f61bb044ff17e28388df490
SHA1a5e0e097746b63d8ee36701dd040e16784df5da2
SHA2561711ea526738aaf92b92ed158b96d8d4c626adc6e98b70da6308903e1efc7487
SHA51237fa97795ae202377263b62dce420acad9397c17aefe1ac8ea35be43bd386bdb1aa0a0ef4a0ad659359269a29180bb0036d2c7310e8b511a1136df4ac4afa25d
-
C:\Users\Admin\AppData\Local\Temp\vhwmdff.exeFilesize
770KB
MD55fb5607b0f61bb044ff17e28388df490
SHA1a5e0e097746b63d8ee36701dd040e16784df5da2
SHA2561711ea526738aaf92b92ed158b96d8d4c626adc6e98b70da6308903e1efc7487
SHA51237fa97795ae202377263b62dce420acad9397c17aefe1ac8ea35be43bd386bdb1aa0a0ef4a0ad659359269a29180bb0036d2c7310e8b511a1136df4ac4afa25d
-
memory/2700-153-0x00000000035F0000-0x0000000003655000-memory.dmpFilesize
404KB
-
memory/2864-136-0x0000000000400000-0x00000000004B1000-memory.dmpFilesize
708KB
-
memory/2864-140-0x0000000000990000-0x0000000000BEF000-memory.dmpFilesize
2.4MB
-
memory/2864-139-0x0000000000400000-0x00000000004B0A00-memory.dmpFilesize
706KB
-
memory/2864-138-0x0000000000760000-0x000000000098E000-memory.dmpFilesize
2.2MB
-
memory/2864-135-0x0000000000000000-mapping.dmp
-
memory/3472-146-0x0000000000770000-0x0000000000788000-memory.dmpFilesize
96KB
-
memory/3492-134-0x0000000002280000-0x0000000002298000-memory.dmpFilesize
96KB
-
memory/3888-147-0x0000000000000000-mapping.dmp
-
memory/3888-152-0x0000000000A30000-0x0000000000C8F000-memory.dmpFilesize
2.4MB