Analysis

  • max time kernel
    163s
  • max time network
    173s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-11-2022 13:12

General

  • Target

    a2b74bbf07c32c440a3cb903d871823a618521b9364d73dea7f2a8f5b4cf0bfc.exe

  • Size

    140KB

  • MD5

    5c37c82ce6248d5eaea227cf174a7220

  • SHA1

    125f1fb1df8fd19150ebb38082c44417f40d256c

  • SHA256

    a2b74bbf07c32c440a3cb903d871823a618521b9364d73dea7f2a8f5b4cf0bfc

  • SHA512

    b06e59993b32cac4703f13bafb22ef56db54e5cb759e2785ea2c6dee55a29be5a898ce97fb73e83a71368f6378f3dd528472bfb1c61ce13d53d1416380066c15

  • SSDEEP

    3072:/b4s/l8iiDXiYukRy9Vd746gh4Z91gCBzTz4y3/UHj7Nzspl+fXo:/B/l0Xi3uyJ7Mhy9dx3s3f4

Malware Config

Signatures

  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • VMProtect packed file 6 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a2b74bbf07c32c440a3cb903d871823a618521b9364d73dea7f2a8f5b4cf0bfc.exe
    "C:\Users\Admin\AppData\Local\Temp\a2b74bbf07c32c440a3cb903d871823a618521b9364d73dea7f2a8f5b4cf0bfc.exe"
    1⤵
    • Sets DLL path for service in the registry
    • Checks computer location settings
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:4876
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\240575640.bat" "
      2⤵
        PID:5036
    • C:\Windows\SysWOW64\svchost.exe
      C:\Windows\SysWOW64\svchost.exe -k ServTestDos -s ServTestDos
      1⤵
      • Loads dropped DLL
      • Checks processor information in registry
      PID:1560

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\240575640.bat

      Filesize

      239B

      MD5

      30bc94a1820f2f02cd5052b9ad7801b0

      SHA1

      62715184c85c909c5c46927912b51175bcf9ab3d

      SHA256

      b220b2a8895ca5a8ec3ffb452174f4facdf4ddf80e0ddb12ef944c959c53de2b

      SHA512

      43b49799ba252882cfd6e05a42fffd677d19ee762697a35689b5a0f2383293edb1d33acd9d4db1fccbe122a43877dc3e1167b2628bbdad24ccb6b2e13ff3b36f

    • C:\Windows\ServTestDos.dll

      Filesize

      140KB

      MD5

      66920e430745ff0b65134e98d3cc851d

      SHA1

      4e0040a563975aa3022b9b154230544e9c2e6a8d

      SHA256

      270c7a6e56a60c2aa4d50ecf7049a55d37d7b4feb6836b068a346e08a7986c03

      SHA512

      adbdc2f56edf7ae7a29a349fb1eca210239ef33e6eb3eb39296359b8fc3132c37de575ffdabf9f1567e89a52bd88dcdd1696ec5b5d68e6c9f1f1a107f0695d14

    • \??\c:\windows\servtestdos.dll

      Filesize

      140KB

      MD5

      66920e430745ff0b65134e98d3cc851d

      SHA1

      4e0040a563975aa3022b9b154230544e9c2e6a8d

      SHA256

      270c7a6e56a60c2aa4d50ecf7049a55d37d7b4feb6836b068a346e08a7986c03

      SHA512

      adbdc2f56edf7ae7a29a349fb1eca210239ef33e6eb3eb39296359b8fc3132c37de575ffdabf9f1567e89a52bd88dcdd1696ec5b5d68e6c9f1f1a107f0695d14

    • memory/1560-136-0x00000000758D0000-0x0000000075917000-memory.dmp

      Filesize

      284KB

    • memory/1560-137-0x00000000758D0000-0x0000000075917000-memory.dmp

      Filesize

      284KB

    • memory/4876-132-0x00000000004E0000-0x0000000000527000-memory.dmp

      Filesize

      284KB

    • memory/4876-133-0x00000000004E0000-0x0000000000527000-memory.dmp

      Filesize

      284KB

    • memory/5036-138-0x0000000000000000-mapping.dmp