Analysis
-
max time kernel
170s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 23:22
Static task
static1
Behavioral task
behavioral1
Sample
cf4668ee1fc1cccfaec7eea2123bf6c1c06fcbac189b8a893dab2c443d526277.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
cf4668ee1fc1cccfaec7eea2123bf6c1c06fcbac189b8a893dab2c443d526277.exe
Resource
win10v2004-20220812-en
General
-
Target
cf4668ee1fc1cccfaec7eea2123bf6c1c06fcbac189b8a893dab2c443d526277.exe
-
Size
1.3MB
-
MD5
b508a0d602fa785703bd2137159b5765
-
SHA1
4ca19968a69f11b308576eba1c0883855c39cb3d
-
SHA256
cf4668ee1fc1cccfaec7eea2123bf6c1c06fcbac189b8a893dab2c443d526277
-
SHA512
0264018ab367a85cb746db332ef33518a90095324ada25bdd317cdf45fb1874ec0ad268ca919dd858ae8834b37a7c1618253ac6c8660194a4df141883d8ddeed
-
SSDEEP
24576:Btb20pkaCqT5TBWgNQ7aAfl56kACVuYFYG6A:SVg5tQ7a4v6kAGP5
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2056 97752.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation cf4668ee1fc1cccfaec7eea2123bf6c1c06fcbac189b8a893dab2c443d526277.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ChromeUpdater = "C:\\Users\\Admin\\AppData\\Local\\GoogleInc\\Update.exe" vbc.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000a000000022e2e-133.dat autoit_exe behavioral2/files/0x000a000000022e2e-134.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2056 set thread context of 1436 2056 97752.exe 81 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NTFS ADS 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\cf4668ee1fc1cccfaec7eea2123bf6c1c06fcbac189b8a893dab2c443d526277.exe:Zone.Identifier:$DATA cf4668ee1fc1cccfaec7eea2123bf6c1c06fcbac189b8a893dab2c443d526277.exe File created C:\Users\Admin\AppData\Roaming\97752.exe\:Zone.Identifier:$DATA cf4668ee1fc1cccfaec7eea2123bf6c1c06fcbac189b8a893dab2c443d526277.exe File opened for modification C:\Users\Admin\AppData\Roaming\97752.exe:Zone.Identifier:$DATA 97752.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1436 vbc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1436 vbc.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 3516 cf4668ee1fc1cccfaec7eea2123bf6c1c06fcbac189b8a893dab2c443d526277.exe 3516 cf4668ee1fc1cccfaec7eea2123bf6c1c06fcbac189b8a893dab2c443d526277.exe 3516 cf4668ee1fc1cccfaec7eea2123bf6c1c06fcbac189b8a893dab2c443d526277.exe 3516 cf4668ee1fc1cccfaec7eea2123bf6c1c06fcbac189b8a893dab2c443d526277.exe 3516 cf4668ee1fc1cccfaec7eea2123bf6c1c06fcbac189b8a893dab2c443d526277.exe 2056 97752.exe 2056 97752.exe 2056 97752.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 3516 cf4668ee1fc1cccfaec7eea2123bf6c1c06fcbac189b8a893dab2c443d526277.exe 3516 cf4668ee1fc1cccfaec7eea2123bf6c1c06fcbac189b8a893dab2c443d526277.exe 3516 cf4668ee1fc1cccfaec7eea2123bf6c1c06fcbac189b8a893dab2c443d526277.exe 3516 cf4668ee1fc1cccfaec7eea2123bf6c1c06fcbac189b8a893dab2c443d526277.exe 3516 cf4668ee1fc1cccfaec7eea2123bf6c1c06fcbac189b8a893dab2c443d526277.exe 2056 97752.exe 2056 97752.exe 2056 97752.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1436 vbc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3516 wrote to memory of 2056 3516 cf4668ee1fc1cccfaec7eea2123bf6c1c06fcbac189b8a893dab2c443d526277.exe 79 PID 3516 wrote to memory of 2056 3516 cf4668ee1fc1cccfaec7eea2123bf6c1c06fcbac189b8a893dab2c443d526277.exe 79 PID 3516 wrote to memory of 2056 3516 cf4668ee1fc1cccfaec7eea2123bf6c1c06fcbac189b8a893dab2c443d526277.exe 79 PID 2056 wrote to memory of 1436 2056 97752.exe 81 PID 2056 wrote to memory of 1436 2056 97752.exe 81 PID 2056 wrote to memory of 1436 2056 97752.exe 81 PID 2056 wrote to memory of 1436 2056 97752.exe 81 PID 2056 wrote to memory of 1436 2056 97752.exe 81 PID 2056 wrote to memory of 1436 2056 97752.exe 81 PID 2056 wrote to memory of 1436 2056 97752.exe 81 PID 2056 wrote to memory of 1436 2056 97752.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf4668ee1fc1cccfaec7eea2123bf6c1c06fcbac189b8a893dab2c443d526277.exe"C:\Users\Admin\AppData\Local\Temp\cf4668ee1fc1cccfaec7eea2123bf6c1c06fcbac189b8a893dab2c443d526277.exe"1⤵
- Checks computer location settings
- NTFS ADS
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Users\Admin\AppData\Roaming\97752.exe"C:\Users\Admin\AppData\Roaming\97752.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- NTFS ADS
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1436
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58db5d85d4e4fdd5502d657ac2f777304
SHA1c0e5a0782cf843aa2e82c36a1df367d8ea5c03d4
SHA256af005b46e08dddc9820363673bc425500f5ed7ab5c30f26f3ce273b8f9971f5c
SHA512acc00a26d8177723fe8c8caf413e88d72c446d9a56d459b8748102a90cbfb1a56e9df9c2d7db40eb5b6d4888ec9519e7af715d23644d99ceb33fd0c8081835ff
-
Filesize
273KB
MD58422ea66e940ea10776e8cd0baf2c9c0
SHA18c28acabc5dcfa4ac0fe1d5a333b8ff9ff3dd3f5
SHA25670c4b987c82e3353a074b2057480558089eff3a3f28050ba9dc92ce32ac14791
SHA512a03c996f83fa0f78e5f416e4cba3c1ce9fc633407433ed38cf46467fad290c0eca98d90a69520b148cdfde9f1ac013a36a62e5cee17ba852beb70ad474062c82
-
Filesize
1.3MB
MD5b508a0d602fa785703bd2137159b5765
SHA14ca19968a69f11b308576eba1c0883855c39cb3d
SHA256cf4668ee1fc1cccfaec7eea2123bf6c1c06fcbac189b8a893dab2c443d526277
SHA5120264018ab367a85cb746db332ef33518a90095324ada25bdd317cdf45fb1874ec0ad268ca919dd858ae8834b37a7c1618253ac6c8660194a4df141883d8ddeed
-
Filesize
1.3MB
MD5b508a0d602fa785703bd2137159b5765
SHA14ca19968a69f11b308576eba1c0883855c39cb3d
SHA256cf4668ee1fc1cccfaec7eea2123bf6c1c06fcbac189b8a893dab2c443d526277
SHA5120264018ab367a85cb746db332ef33518a90095324ada25bdd317cdf45fb1874ec0ad268ca919dd858ae8834b37a7c1618253ac6c8660194a4df141883d8ddeed