Analysis

  • max time kernel
    91s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2022 03:36

General

  • Target

    286bc1d84eb04c6200a6bf90c3bab4db22d93bd8feb4cec33531e0a2fe8c29b4.exe

  • Size

    979KB

  • MD5

    ea8e329ad6e62c4e9e8667a852c00d18

  • SHA1

    bf5d2dec0e6c4320858be294a021ea7c35578c95

  • SHA256

    286bc1d84eb04c6200a6bf90c3bab4db22d93bd8feb4cec33531e0a2fe8c29b4

  • SHA512

    71b7e78b8621e4a97a9ef4d932112ab8003790ed8b0268e0204a4c93101634271ceac2eed09a56ccbc3c5428bd5fa9ba95014a81643f6749a6e565fa5f3780f7

  • SSDEEP

    24576:0czJqVSvDmv5oZ6KQxSAU5+ITTC9R6iiMRaM74:0cMJRu6KQAAC7/CW/OM

Malware Config

Signatures

  • Executes dropped EXE 9 IoCs
  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\286bc1d84eb04c6200a6bf90c3bab4db22d93bd8feb4cec33531e0a2fe8c29b4.exe
    "C:\Users\Admin\AppData\Local\Temp\286bc1d84eb04c6200a6bf90c3bab4db22d93bd8feb4cec33531e0a2fe8c29b4.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2496
    • C:\Users\Admin\AppData\Local\Temp\server_et.exe
      "C:\Users\Admin\AppData\Local\Temp\server_et.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2128
      • C:\Users\Admin\AppData\Roaming\mservice32_t.exe
        "C:\Users\Admin\AppData\Roaming\mservice32_t.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        PID:1424
    • C:\Users\Admin\AppData\Local\Temp\patch2.exe
      "C:\Users\Admin\AppData\Local\Temp\patch2.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:1292
      • C:\Users\Admin\AppData\Local\Temp\updater.exe
        "C:\Users\Admin\AppData\Local\Temp\updater.exe"
        3⤵
        • Executes dropped EXE
        • Modifies Internet Explorer settings
        • Suspicious use of WriteProcessMemory
        PID:1844
        • C:\Windows\SysWOW64\regsvr32.exe
          regsvr32.exe /u /s "C:\Users\Admin\AppData\Roaming\IE\bho.dll"
          4⤵
          • Loads dropped DLL
          PID:3260
        • C:\Windows\SysWOW64\regsvr32.exe
          regsvr32.exe /s "C:\Users\Admin\AppData\Roaming\IE\bho.dll"
          4⤵
          • Loads dropped DLL
          • Installs/modifies Browser Helper Object
          • Modifies registry class
          PID:3912
    • C:\Users\Admin\AppData\Local\Temp\update.exe
      "C:\Users\Admin\AppData\Local\Temp\update.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:4932
      • C:\Users\Admin\AppData\Local\Temp\i.exe
        "C:\Users\Admin\AppData\Local\Temp\i.exe" -pwr
        3⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:2888
        • C:\Users\Admin\AppData\Local\Temp\dumpre.exe
          "C:\Users\Admin\AppData\Local\Temp\dumpre.exe"
          4⤵
          • Executes dropped EXE
          PID:836
        • C:\Users\Admin\AppData\Local\Temp\vmreg.exe
          "C:\Users\Admin\AppData\Local\Temp\vmreg.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          PID:800
    • C:\Users\Admin\AppData\Local\Temp\mc.exe
      "C:\Users\Admin\AppData\Local\Temp\mc.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      PID:1336

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\dumpre.exe
    Filesize

    130KB

    MD5

    6fc7bb9ea9fae15ca3b8262a91ee7d9d

    SHA1

    a1a38baef6aef222cabe8fc3b53f9ce6a2a53bdd

    SHA256

    95186b2a941532ba72f32ddf863673d15adb67fc04e3f9572f237167ae0de67d

    SHA512

    488f950a447e63e795f1ec229e045808df91ae5421c628c8fafc40997edab28f2c38ba4d8140a508f7791d1f063846a2f205197979d23a3b603b1ef5c039afe2

  • C:\Users\Admin\AppData\Local\Temp\dumpre.exe
    Filesize

    130KB

    MD5

    6fc7bb9ea9fae15ca3b8262a91ee7d9d

    SHA1

    a1a38baef6aef222cabe8fc3b53f9ce6a2a53bdd

    SHA256

    95186b2a941532ba72f32ddf863673d15adb67fc04e3f9572f237167ae0de67d

    SHA512

    488f950a447e63e795f1ec229e045808df91ae5421c628c8fafc40997edab28f2c38ba4d8140a508f7791d1f063846a2f205197979d23a3b603b1ef5c039afe2

  • C:\Users\Admin\AppData\Local\Temp\i.exe
    Filesize

    169KB

    MD5

    10d4234b1e71fbcdb968e4b0394c0b7d

    SHA1

    67f197c040944e1c3d222c2f2634a8c09229d6e4

    SHA256

    2108e601a1d774d68f0d686b5bdd43e475bba0eec5ad8be95be4e0f321de1eaa

    SHA512

    5bea53194082c7fce3a11f227920a12378f7e061a5294e5b67fe6d5710f29638f87cfda7b8b4fc6e6c83a7c180ec184cfcaa78fe888e15f1ffe61fff992537dc

  • C:\Users\Admin\AppData\Local\Temp\i.exe
    Filesize

    169KB

    MD5

    10d4234b1e71fbcdb968e4b0394c0b7d

    SHA1

    67f197c040944e1c3d222c2f2634a8c09229d6e4

    SHA256

    2108e601a1d774d68f0d686b5bdd43e475bba0eec5ad8be95be4e0f321de1eaa

    SHA512

    5bea53194082c7fce3a11f227920a12378f7e061a5294e5b67fe6d5710f29638f87cfda7b8b4fc6e6c83a7c180ec184cfcaa78fe888e15f1ffe61fff992537dc

  • C:\Users\Admin\AppData\Local\Temp\mc.exe
    Filesize

    106KB

    MD5

    18efdb37e71d23292eec9932df472512

    SHA1

    4be8a740f6c7eee22fb7a313f044466e9fe33d18

    SHA256

    59695317a1359b4d366e2cc3b9741e54f1efc4a76b5472b03e46259cdff4bb1a

    SHA512

    bcddeda7e87c073cea1d0d855f18693a197e49bd98fcaeaf5dac2d5b2b76590f2d6c8fc2c41405f9139f38e03dec61441198f871fbac40ed52489004b79bf8f9

  • C:\Users\Admin\AppData\Local\Temp\mc.exe
    Filesize

    106KB

    MD5

    18efdb37e71d23292eec9932df472512

    SHA1

    4be8a740f6c7eee22fb7a313f044466e9fe33d18

    SHA256

    59695317a1359b4d366e2cc3b9741e54f1efc4a76b5472b03e46259cdff4bb1a

    SHA512

    bcddeda7e87c073cea1d0d855f18693a197e49bd98fcaeaf5dac2d5b2b76590f2d6c8fc2c41405f9139f38e03dec61441198f871fbac40ed52489004b79bf8f9

  • C:\Users\Admin\AppData\Local\Temp\patch2.exe
    Filesize

    328KB

    MD5

    82730e03d20dea9f7966ee9cedf76a7a

    SHA1

    8ad131a58e14252904b133109e02f7ebed5d27a4

    SHA256

    05ad98de48f2d4185fd4559eeffeff4ae54c39e41b8f6b22a7626c3c331202eb

    SHA512

    32cd1fdb817027c7c0a9fce099e5a130ed99cc011df12f8d50c0006c07a02ac132bf6254fcdac5f18d7291abe131d59085ede276487cb83274ca13d5c389bfe9

  • C:\Users\Admin\AppData\Local\Temp\patch2.exe
    Filesize

    328KB

    MD5

    82730e03d20dea9f7966ee9cedf76a7a

    SHA1

    8ad131a58e14252904b133109e02f7ebed5d27a4

    SHA256

    05ad98de48f2d4185fd4559eeffeff4ae54c39e41b8f6b22a7626c3c331202eb

    SHA512

    32cd1fdb817027c7c0a9fce099e5a130ed99cc011df12f8d50c0006c07a02ac132bf6254fcdac5f18d7291abe131d59085ede276487cb83274ca13d5c389bfe9

  • C:\Users\Admin\AppData\Local\Temp\server_et.exe
    Filesize

    903KB

    MD5

    a8f44d734b6e95a70f47245c07028ec0

    SHA1

    9481ab70f2bf172c5549c4afd9408e72c305e917

    SHA256

    31c400f8e548c23897e86b93628171290afaf22dbc1113bcc266e26306dd03a0

    SHA512

    95df7f8e31501b108fad47ca22da9bd762e4eb0041e544e5f5bea24b82a58a4998634c67ba2c2217fd525d3df047dcc11297c52676f7c9089dc62d40dc0e0fa2

  • C:\Users\Admin\AppData\Local\Temp\server_et.exe
    Filesize

    903KB

    MD5

    a8f44d734b6e95a70f47245c07028ec0

    SHA1

    9481ab70f2bf172c5549c4afd9408e72c305e917

    SHA256

    31c400f8e548c23897e86b93628171290afaf22dbc1113bcc266e26306dd03a0

    SHA512

    95df7f8e31501b108fad47ca22da9bd762e4eb0041e544e5f5bea24b82a58a4998634c67ba2c2217fd525d3df047dcc11297c52676f7c9089dc62d40dc0e0fa2

  • C:\Users\Admin\AppData\Local\Temp\update.exe
    Filesize

    216KB

    MD5

    3d3530409167d34acf9825929a88033e

    SHA1

    271e678323e7c1f6a852296a324527bd2df308fa

    SHA256

    7d01df0b72592bcf58fa64b7c7a1464696ba6266ca0106cfe4c8e26fc03cb841

    SHA512

    8e5e927e96448c1b8356fb6447e20b9e6550579b8ac51bfa77ff0eb082c06202b9179b902c94bc7c539d1be63870fe40634494462bef4337baec7bc369a016e1

  • C:\Users\Admin\AppData\Local\Temp\update.exe
    Filesize

    216KB

    MD5

    3d3530409167d34acf9825929a88033e

    SHA1

    271e678323e7c1f6a852296a324527bd2df308fa

    SHA256

    7d01df0b72592bcf58fa64b7c7a1464696ba6266ca0106cfe4c8e26fc03cb841

    SHA512

    8e5e927e96448c1b8356fb6447e20b9e6550579b8ac51bfa77ff0eb082c06202b9179b902c94bc7c539d1be63870fe40634494462bef4337baec7bc369a016e1

  • C:\Users\Admin\AppData\Local\Temp\updater.exe
    Filesize

    576KB

    MD5

    23c3e21e11769fa21b4b17ab0eb4250f

    SHA1

    41d0ce224a482c4877d8220f53c739d9998981e9

    SHA256

    49369c4c6b90e17a286a67f36dab7c1098f97a7c4d5b0b5ae8837382a81a93c3

    SHA512

    a076edd23bfc7ce6ccd1bcc9b856e1e04f90cfc4fdba8a3ece83eef2054e44c7a5ed6f41611f8b7a8f2f2e88d7aefb16ae875ba87f5cd71f3d38d638180c6711

  • C:\Users\Admin\AppData\Local\Temp\updater.exe
    Filesize

    576KB

    MD5

    23c3e21e11769fa21b4b17ab0eb4250f

    SHA1

    41d0ce224a482c4877d8220f53c739d9998981e9

    SHA256

    49369c4c6b90e17a286a67f36dab7c1098f97a7c4d5b0b5ae8837382a81a93c3

    SHA512

    a076edd23bfc7ce6ccd1bcc9b856e1e04f90cfc4fdba8a3ece83eef2054e44c7a5ed6f41611f8b7a8f2f2e88d7aefb16ae875ba87f5cd71f3d38d638180c6711

  • C:\Users\Admin\AppData\Local\Temp\vmreg.exe
    Filesize

    48KB

    MD5

    adc3cd4fcb5e20b9aad75035649e8be8

    SHA1

    26651bca5678b43830f2a0b6d21479e99bec97d7

    SHA256

    6fc8aa6a77233514bc2a41692281c7fac5ba9ab8f478d2c3cf920112081a15bd

    SHA512

    d18c5459923b3563d884694eab3dd6df9261dbf85c1eb0ea3a3c1a4574d2913faaf32ee24a333b7be998f1474ecfd77cd33c94c4c0f3cea78f42fc03bcf66f94

  • C:\Users\Admin\AppData\Local\Temp\vmreg.exe
    Filesize

    48KB

    MD5

    adc3cd4fcb5e20b9aad75035649e8be8

    SHA1

    26651bca5678b43830f2a0b6d21479e99bec97d7

    SHA256

    6fc8aa6a77233514bc2a41692281c7fac5ba9ab8f478d2c3cf920112081a15bd

    SHA512

    d18c5459923b3563d884694eab3dd6df9261dbf85c1eb0ea3a3c1a4574d2913faaf32ee24a333b7be998f1474ecfd77cd33c94c4c0f3cea78f42fc03bcf66f94

  • C:\Users\Admin\AppData\Roaming\IE\bho.dll
    Filesize

    206KB

    MD5

    ace9d6a8328248b2c8ed462f29dd9a69

    SHA1

    180f3ee5c577c09d2679d881ec5924dd86713bdc

    SHA256

    3d9055865640b6ac554ab779ccce15eac9f365b61ff69134c752447afaed3fed

    SHA512

    bd2b6d4acb9ba15d8771902e5182e33aa002a28a3d36dffde7a00ef5a1139a6499dfc3731e60f09cc3123d1076c4d20759a61d593971be33756cea17268bf325

  • C:\Users\Admin\AppData\Roaming\IE\bho.dll
    Filesize

    206KB

    MD5

    ace9d6a8328248b2c8ed462f29dd9a69

    SHA1

    180f3ee5c577c09d2679d881ec5924dd86713bdc

    SHA256

    3d9055865640b6ac554ab779ccce15eac9f365b61ff69134c752447afaed3fed

    SHA512

    bd2b6d4acb9ba15d8771902e5182e33aa002a28a3d36dffde7a00ef5a1139a6499dfc3731e60f09cc3123d1076c4d20759a61d593971be33756cea17268bf325

  • C:\Users\Admin\AppData\Roaming\IE\bho.dll
    Filesize

    206KB

    MD5

    ace9d6a8328248b2c8ed462f29dd9a69

    SHA1

    180f3ee5c577c09d2679d881ec5924dd86713bdc

    SHA256

    3d9055865640b6ac554ab779ccce15eac9f365b61ff69134c752447afaed3fed

    SHA512

    bd2b6d4acb9ba15d8771902e5182e33aa002a28a3d36dffde7a00ef5a1139a6499dfc3731e60f09cc3123d1076c4d20759a61d593971be33756cea17268bf325

  • C:\Users\Admin\AppData\Roaming\mservice32_t.exe
    Filesize

    903KB

    MD5

    a8f44d734b6e95a70f47245c07028ec0

    SHA1

    9481ab70f2bf172c5549c4afd9408e72c305e917

    SHA256

    31c400f8e548c23897e86b93628171290afaf22dbc1113bcc266e26306dd03a0

    SHA512

    95df7f8e31501b108fad47ca22da9bd762e4eb0041e544e5f5bea24b82a58a4998634c67ba2c2217fd525d3df047dcc11297c52676f7c9089dc62d40dc0e0fa2

  • C:\Users\Admin\AppData\Roaming\mservice32_t.exe
    Filesize

    903KB

    MD5

    a8f44d734b6e95a70f47245c07028ec0

    SHA1

    9481ab70f2bf172c5549c4afd9408e72c305e917

    SHA256

    31c400f8e548c23897e86b93628171290afaf22dbc1113bcc266e26306dd03a0

    SHA512

    95df7f8e31501b108fad47ca22da9bd762e4eb0041e544e5f5bea24b82a58a4998634c67ba2c2217fd525d3df047dcc11297c52676f7c9089dc62d40dc0e0fa2

  • memory/800-163-0x0000000000000000-mapping.dmp
  • memory/836-160-0x0000000000000000-mapping.dmp
  • memory/1292-135-0x0000000000000000-mapping.dmp
  • memory/1336-141-0x0000000000000000-mapping.dmp
  • memory/1336-148-0x00000000009C0000-0x00000000009EE000-memory.dmp
    Filesize

    184KB

  • memory/1336-153-0x00000000009C0000-0x00000000009EE000-memory.dmp
    Filesize

    184KB

  • memory/1336-166-0x00000000009C0000-0x00000000009EE000-memory.dmp
    Filesize

    184KB

  • memory/1424-143-0x0000000000000000-mapping.dmp
  • memory/1844-147-0x0000000000000000-mapping.dmp
  • memory/2128-132-0x0000000000000000-mapping.dmp
  • memory/2888-152-0x0000000000000000-mapping.dmp
  • memory/3260-151-0x0000000000000000-mapping.dmp
  • memory/3912-158-0x0000000000000000-mapping.dmp
  • memory/4932-138-0x0000000000000000-mapping.dmp