Analysis
-
max time kernel
163s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2022 13:12
Behavioral task
behavioral1
Sample
a2b74bbf07c32c440a3cb903d871823a618521b9364d73dea7f2a8f5b4cf0bfc.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a2b74bbf07c32c440a3cb903d871823a618521b9364d73dea7f2a8f5b4cf0bfc.exe
Resource
win10v2004-20220812-en
General
-
Target
a2b74bbf07c32c440a3cb903d871823a618521b9364d73dea7f2a8f5b4cf0bfc.exe
-
Size
140KB
-
MD5
5c37c82ce6248d5eaea227cf174a7220
-
SHA1
125f1fb1df8fd19150ebb38082c44417f40d256c
-
SHA256
a2b74bbf07c32c440a3cb903d871823a618521b9364d73dea7f2a8f5b4cf0bfc
-
SHA512
b06e59993b32cac4703f13bafb22ef56db54e5cb759e2785ea2c6dee55a29be5a898ce97fb73e83a71368f6378f3dd528472bfb1c61ce13d53d1416380066c15
-
SSDEEP
3072:/b4s/l8iiDXiYukRy9Vd746gh4Z91gCBzTz4y3/UHj7Nzspl+fXo:/B/l0Xi3uyJ7Mhy9dx3s3f4
Malware Config
Signatures
-
Sets DLL path for service in the registry 2 TTPs 1 IoCs
Processes:
a2b74bbf07c32c440a3cb903d871823a618521b9364d73dea7f2a8f5b4cf0bfc.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\ServTestDos\Parameters\ServiceDll = "C:\\Windows\\ServTestDos.dll" a2b74bbf07c32c440a3cb903d871823a618521b9364d73dea7f2a8f5b4cf0bfc.exe -
Processes:
resource yara_rule behavioral2/memory/4876-132-0x00000000004E0000-0x0000000000527000-memory.dmp vmprotect behavioral2/memory/4876-133-0x00000000004E0000-0x0000000000527000-memory.dmp vmprotect \??\c:\windows\servtestdos.dll vmprotect C:\Windows\ServTestDos.dll vmprotect behavioral2/memory/1560-136-0x00000000758D0000-0x0000000075917000-memory.dmp vmprotect behavioral2/memory/1560-137-0x00000000758D0000-0x0000000075917000-memory.dmp vmprotect -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
a2b74bbf07c32c440a3cb903d871823a618521b9364d73dea7f2a8f5b4cf0bfc.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b74bbf07c32c440a3cb903d871823a618521b9364d73dea7f2a8f5b4cf0bfc.exe -
Loads dropped DLL 1 IoCs
Processes:
svchost.exepid process 1560 svchost.exe -
Drops file in Windows directory 2 IoCs
Processes:
a2b74bbf07c32c440a3cb903d871823a618521b9364d73dea7f2a8f5b4cf0bfc.exedescription ioc process File created C:\Windows\ServTestDos.dll a2b74bbf07c32c440a3cb903d871823a618521b9364d73dea7f2a8f5b4cf0bfc.exe File opened for modification C:\Windows\ServTestDos.dll a2b74bbf07c32c440a3cb903d871823a618521b9364d73dea7f2a8f5b4cf0bfc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
svchost.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
a2b74bbf07c32c440a3cb903d871823a618521b9364d73dea7f2a8f5b4cf0bfc.exedescription pid process target process PID 4876 wrote to memory of 5036 4876 a2b74bbf07c32c440a3cb903d871823a618521b9364d73dea7f2a8f5b4cf0bfc.exe cmd.exe PID 4876 wrote to memory of 5036 4876 a2b74bbf07c32c440a3cb903d871823a618521b9364d73dea7f2a8f5b4cf0bfc.exe cmd.exe PID 4876 wrote to memory of 5036 4876 a2b74bbf07c32c440a3cb903d871823a618521b9364d73dea7f2a8f5b4cf0bfc.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2b74bbf07c32c440a3cb903d871823a618521b9364d73dea7f2a8f5b4cf0bfc.exe"C:\Users\Admin\AppData\Local\Temp\a2b74bbf07c32c440a3cb903d871823a618521b9364d73dea7f2a8f5b4cf0bfc.exe"1⤵
- Sets DLL path for service in the registry
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\240575640.bat" "2⤵PID:5036
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k ServTestDos -s ServTestDos1⤵
- Loads dropped DLL
- Checks processor information in registry
PID:1560
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
239B
MD530bc94a1820f2f02cd5052b9ad7801b0
SHA162715184c85c909c5c46927912b51175bcf9ab3d
SHA256b220b2a8895ca5a8ec3ffb452174f4facdf4ddf80e0ddb12ef944c959c53de2b
SHA51243b49799ba252882cfd6e05a42fffd677d19ee762697a35689b5a0f2383293edb1d33acd9d4db1fccbe122a43877dc3e1167b2628bbdad24ccb6b2e13ff3b36f
-
Filesize
140KB
MD566920e430745ff0b65134e98d3cc851d
SHA14e0040a563975aa3022b9b154230544e9c2e6a8d
SHA256270c7a6e56a60c2aa4d50ecf7049a55d37d7b4feb6836b068a346e08a7986c03
SHA512adbdc2f56edf7ae7a29a349fb1eca210239ef33e6eb3eb39296359b8fc3132c37de575ffdabf9f1567e89a52bd88dcdd1696ec5b5d68e6c9f1f1a107f0695d14
-
Filesize
140KB
MD566920e430745ff0b65134e98d3cc851d
SHA14e0040a563975aa3022b9b154230544e9c2e6a8d
SHA256270c7a6e56a60c2aa4d50ecf7049a55d37d7b4feb6836b068a346e08a7986c03
SHA512adbdc2f56edf7ae7a29a349fb1eca210239ef33e6eb3eb39296359b8fc3132c37de575ffdabf9f1567e89a52bd88dcdd1696ec5b5d68e6c9f1f1a107f0695d14