Analysis
-
max time kernel
152s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2022, 21:25
Static task
static1
Behavioral task
behavioral1
Sample
48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe
Resource
win10v2004-20220812-en
General
-
Target
48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe
-
Size
78KB
-
MD5
bc1883b07b47423bd30645e54db4775c
-
SHA1
2b96b8027083c5c44189ac03bafcc71df82a8ee1
-
SHA256
48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8
-
SHA512
6185931b4a06cd38dfaaecd4a60160bf7b07fa9bec3a1a2da0a1bbcda5ad7cf7f78b1a55810e065a1c6f29c7b5bbd64d584172e3d7386f6195ba1c8b4b28a85e
-
SSDEEP
1536:Kgzoa0BgdObHOjEb+96omECPxuXfDZEEkU3rHt81Hqf:Lzoa0yQnOhmEHCEkgry1H
Malware Config
Extracted
tofsee
185.4.227.76
188.165.132.183
rgtryhbgddtyh.biz
wertdghbyrukl.ch
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4768 wwfeqcpr.exe 5004 wwfeqcpr.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSConfig = "\"C:\\Users\\Admin\\wwfeqcpr.exe\"" 48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4364 set thread context of 3672 4364 48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe 78 PID 4768 set thread context of 5004 4768 wwfeqcpr.exe 80 PID 5004 set thread context of 4920 5004 wwfeqcpr.exe 81 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2028 4920 WerFault.exe 81 -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4364 wrote to memory of 3672 4364 48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe 78 PID 4364 wrote to memory of 3672 4364 48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe 78 PID 4364 wrote to memory of 3672 4364 48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe 78 PID 4364 wrote to memory of 3672 4364 48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe 78 PID 4364 wrote to memory of 3672 4364 48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe 78 PID 4364 wrote to memory of 3672 4364 48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe 78 PID 4364 wrote to memory of 3672 4364 48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe 78 PID 4364 wrote to memory of 3672 4364 48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe 78 PID 4364 wrote to memory of 3672 4364 48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe 78 PID 3672 wrote to memory of 4768 3672 48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe 79 PID 3672 wrote to memory of 4768 3672 48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe 79 PID 3672 wrote to memory of 4768 3672 48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe 79 PID 4768 wrote to memory of 5004 4768 wwfeqcpr.exe 80 PID 4768 wrote to memory of 5004 4768 wwfeqcpr.exe 80 PID 4768 wrote to memory of 5004 4768 wwfeqcpr.exe 80 PID 4768 wrote to memory of 5004 4768 wwfeqcpr.exe 80 PID 4768 wrote to memory of 5004 4768 wwfeqcpr.exe 80 PID 4768 wrote to memory of 5004 4768 wwfeqcpr.exe 80 PID 4768 wrote to memory of 5004 4768 wwfeqcpr.exe 80 PID 4768 wrote to memory of 5004 4768 wwfeqcpr.exe 80 PID 4768 wrote to memory of 5004 4768 wwfeqcpr.exe 80 PID 5004 wrote to memory of 4920 5004 wwfeqcpr.exe 81 PID 5004 wrote to memory of 4920 5004 wwfeqcpr.exe 81 PID 5004 wrote to memory of 4920 5004 wwfeqcpr.exe 81 PID 5004 wrote to memory of 4920 5004 wwfeqcpr.exe 81 PID 5004 wrote to memory of 4920 5004 wwfeqcpr.exe 81 PID 3672 wrote to memory of 2468 3672 48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe 85 PID 3672 wrote to memory of 2468 3672 48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe 85 PID 3672 wrote to memory of 2468 3672 48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe"C:\Users\Admin\AppData\Local\Temp\48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe"C:\Users\Admin\AppData\Local\Temp\48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Users\Admin\wwfeqcpr.exe"C:\Users\Admin\wwfeqcpr.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Users\Admin\wwfeqcpr.exe"C:\Users\Admin\wwfeqcpr.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵PID:4920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4920 -s 1926⤵
- Program crash
PID:2028
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3637.bat" "3⤵PID:2468
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 176 -p 4920 -ip 49201⤵PID:4628
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
302B
MD5bb034c8d8aa382466cf0e6587b229702
SHA1d67b347b02eca51be13e0a6e09eedf4702f1933c
SHA256eb42f40d7110c83317e5dcdaaa3694fd18619bbda0e0db28f03bb06240b5403b
SHA512a8637d88052fdc154cc0b2be2486f6ac9de1f2a116d2dfe4604475f06f8f77dc9d1ac4b7539100b505b58115ea8da98a561f5fcacd72096f510d208425106283
-
Filesize
78KB
MD5bc1883b07b47423bd30645e54db4775c
SHA12b96b8027083c5c44189ac03bafcc71df82a8ee1
SHA25648c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8
SHA5126185931b4a06cd38dfaaecd4a60160bf7b07fa9bec3a1a2da0a1bbcda5ad7cf7f78b1a55810e065a1c6f29c7b5bbd64d584172e3d7386f6195ba1c8b4b28a85e
-
Filesize
78KB
MD5bc1883b07b47423bd30645e54db4775c
SHA12b96b8027083c5c44189ac03bafcc71df82a8ee1
SHA25648c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8
SHA5126185931b4a06cd38dfaaecd4a60160bf7b07fa9bec3a1a2da0a1bbcda5ad7cf7f78b1a55810e065a1c6f29c7b5bbd64d584172e3d7386f6195ba1c8b4b28a85e
-
Filesize
78KB
MD5bc1883b07b47423bd30645e54db4775c
SHA12b96b8027083c5c44189ac03bafcc71df82a8ee1
SHA25648c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8
SHA5126185931b4a06cd38dfaaecd4a60160bf7b07fa9bec3a1a2da0a1bbcda5ad7cf7f78b1a55810e065a1c6f29c7b5bbd64d584172e3d7386f6195ba1c8b4b28a85e