Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 12:05
Static task
static1
Behavioral task
behavioral1
Sample
PT2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
PT2.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
ho tro.exe
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
ho tro.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
hotro.dll
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
hotro.dll
Resource
win10v2004-20221111-en
General
-
Target
PT2.exe
-
Size
2.0MB
-
MD5
3b5d02a465997d981ea5c9684cda7def
-
SHA1
ef02b7170c64531618291491109d838762455625
-
SHA256
99b771a89d4b9c820ce279e2a56ce9572848a42dd3076e66e1cc2494531688a5
-
SHA512
5c6ee43049034101c6d6fe3ff9f21b5a54bddc80fe100f4dea97d26b06ee4bbb0c0cce0fe104f9e1de3d0ceef36d21fe7f0c4436ee4996c00d4c78d4d75e72cc
-
SSDEEP
49152:CoJ9Nyhdl0L7VKYvKpATtnweNjk+fJgHFJlIcqpd:gl27jvKpATtwe7Bsick
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
UJV.exepid process 344 UJV.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
PT2.exeUJV.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation PT2.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation UJV.exe -
Loads dropped DLL 2 IoCs
Processes:
UJV.exepid process 344 UJV.exe 344 UJV.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
UJV.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run UJV.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\UJV Start = "C:\\ProgramData\\VOFIOJ\\UJV.exe" UJV.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
UJV.exepid process 344 UJV.exe 344 UJV.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
UJV.exepid process 344 UJV.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
UJV.exedescription pid process Token: SeIncBasePriorityPrivilege 344 UJV.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
UJV.exepid process 344 UJV.exe 344 UJV.exe 344 UJV.exe 344 UJV.exe 344 UJV.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
PT2.exeUJV.exedescription pid process target process PID 1380 wrote to memory of 344 1380 PT2.exe UJV.exe PID 1380 wrote to memory of 344 1380 PT2.exe UJV.exe PID 1380 wrote to memory of 344 1380 PT2.exe UJV.exe PID 344 wrote to memory of 1872 344 UJV.exe cmd.exe PID 344 wrote to memory of 1872 344 UJV.exe cmd.exe PID 344 wrote to memory of 1872 344 UJV.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PT2.exe"C:\Users\Admin\AppData\Local\Temp\PT2.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\ProgramData\VOFIOJ\UJV.exe"C:\ProgramData\VOFIOJ\UJV.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:344 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\PROGRA~3\VOFIOJ\UJV.exe > nul3⤵PID:1872
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5e613bd44480e9951d2267e72d12d0d63
SHA19ea9d6f7992593fc95caa2d55c8f4ef4e0cf53b8
SHA2569f0fcbb98a7709f9398152f894dc6c07272383b3d1becd0e1b85cb0d397b8427
SHA5126980e464418e012f4b0ec2938e758c684df97b9237e7fcf971e6333742a5cf18f5198a2d5b7c99cfe4a068c5c0f3b35f46c78b24bb491e2af636dcec0f663bb0
-
Filesize
79KB
MD587b3b2ba61b2aed49ff80bbec78fc58c
SHA15316ae2e8751a256f1d51fe0cc42cdb9a9356863
SHA2561950d033b108bec6bdcca39d2b61dfef4f0dc605ac2a39abea5792bff6720fe1
SHA512ac575540183d6c6d16a4e04586a64cb7fe27797b120dc24a7cd856f990ce0c0b89f54eaa21efd4ca318133547a4399590c0ec5f6360d353edda9d6eeb374bdd4
-
Filesize
79KB
MD587b3b2ba61b2aed49ff80bbec78fc58c
SHA15316ae2e8751a256f1d51fe0cc42cdb9a9356863
SHA2561950d033b108bec6bdcca39d2b61dfef4f0dc605ac2a39abea5792bff6720fe1
SHA512ac575540183d6c6d16a4e04586a64cb7fe27797b120dc24a7cd856f990ce0c0b89f54eaa21efd4ca318133547a4399590c0ec5f6360d353edda9d6eeb374bdd4
-
Filesize
79KB
MD587b3b2ba61b2aed49ff80bbec78fc58c
SHA15316ae2e8751a256f1d51fe0cc42cdb9a9356863
SHA2561950d033b108bec6bdcca39d2b61dfef4f0dc605ac2a39abea5792bff6720fe1
SHA512ac575540183d6c6d16a4e04586a64cb7fe27797b120dc24a7cd856f990ce0c0b89f54eaa21efd4ca318133547a4399590c0ec5f6360d353edda9d6eeb374bdd4
-
Filesize
54KB
MD56dcc15c5e6cc541c96c2277f3ef1f7f0
SHA1d4b8de412f6fca7114d4f07a5a61ee8588deaab7
SHA256d9454df000e02f2bf8334c2c9db631d1a9a84a07d7a9aa9f760d0a79328188d1
SHA5127451633007d8ddbbbebca7a6aa9635a6201e8144404693e9ff47294081355872a223e1c6aa769359b8d8a928d5de72a655fd4aac0c786a260b4d44acb1c36f9b
-
Filesize
2.4MB
MD54b53869b34fc792d373f564223f62ccb
SHA110e578a46eeaae0998950c9b0a3613de1f4ee49d
SHA2561835db40ad9d8329dd38fbe1c04b427ce36c13cb3ad8e6a36f45c614c64c49be
SHA51268c080a40f53f7ac5795f30b760645fbeaae04b67621f86df83deeb267d8ba3dfc5d2ba993e1b27236ee6a6e6af02231a2e7d3ca10695680462289c340005172
-
Filesize
2.4MB
MD54b53869b34fc792d373f564223f62ccb
SHA110e578a46eeaae0998950c9b0a3613de1f4ee49d
SHA2561835db40ad9d8329dd38fbe1c04b427ce36c13cb3ad8e6a36f45c614c64c49be
SHA51268c080a40f53f7ac5795f30b760645fbeaae04b67621f86df83deeb267d8ba3dfc5d2ba993e1b27236ee6a6e6af02231a2e7d3ca10695680462289c340005172