Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2022 23:39
Static task
static1
Behavioral task
behavioral1
Sample
189e395afb4efe7bc8e300b644c1b290.exe
Resource
win7-20220812-en
General
-
Target
189e395afb4efe7bc8e300b644c1b290.exe
-
Size
1.8MB
-
MD5
189e395afb4efe7bc8e300b644c1b290
-
SHA1
eabb53d1508bc5855360b387beb91429eff26f60
-
SHA256
b1852de0ce746f19baffdcb3a694b3a65a5dc813e2dfc0046da9474401f1ecbb
-
SHA512
90ae2566ca1b63840c9a088b754c7097e823a4c24ea7436948c2566d052031f7f18d9666e4e150eed2e09b76df14b41c1e6fd1975ee0dd89baca5602c72b0141
-
SSDEEP
49152:rOf7VkgZ41jwavGHKtNq8zE6AIQwX+LwULebD/M:rOfBx41PvrtNlAchOLIM
Malware Config
Extracted
systembc
89.22.225.242:4193
195.2.93.22:4193
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
qui quequeh jos popipo fiqui xobeneja xepo.exepid process 2212 qui quequeh jos popipo fiqui xobeneja xepo.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
189e395afb4efe7bc8e300b644c1b290.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 189e395afb4efe7bc8e300b644c1b290.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
189e395afb4efe7bc8e300b644c1b290.exequi quequeh jos popipo fiqui xobeneja xepo.exepid process 4992 189e395afb4efe7bc8e300b644c1b290.exe 4992 189e395afb4efe7bc8e300b644c1b290.exe 4992 189e395afb4efe7bc8e300b644c1b290.exe 4992 189e395afb4efe7bc8e300b644c1b290.exe 4992 189e395afb4efe7bc8e300b644c1b290.exe 4992 189e395afb4efe7bc8e300b644c1b290.exe 4992 189e395afb4efe7bc8e300b644c1b290.exe 4992 189e395afb4efe7bc8e300b644c1b290.exe 4992 189e395afb4efe7bc8e300b644c1b290.exe 4992 189e395afb4efe7bc8e300b644c1b290.exe 2212 qui quequeh jos popipo fiqui xobeneja xepo.exe 2212 qui quequeh jos popipo fiqui xobeneja xepo.exe 2212 qui quequeh jos popipo fiqui xobeneja xepo.exe 2212 qui quequeh jos popipo fiqui xobeneja xepo.exe 2212 qui quequeh jos popipo fiqui xobeneja xepo.exe 2212 qui quequeh jos popipo fiqui xobeneja xepo.exe 2212 qui quequeh jos popipo fiqui xobeneja xepo.exe 2212 qui quequeh jos popipo fiqui xobeneja xepo.exe 2212 qui quequeh jos popipo fiqui xobeneja xepo.exe 2212 qui quequeh jos popipo fiqui xobeneja xepo.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
189e395afb4efe7bc8e300b644c1b290.execmd.exedescription pid process target process PID 4992 wrote to memory of 4308 4992 189e395afb4efe7bc8e300b644c1b290.exe schtasks.exe PID 4992 wrote to memory of 4308 4992 189e395afb4efe7bc8e300b644c1b290.exe schtasks.exe PID 4992 wrote to memory of 4308 4992 189e395afb4efe7bc8e300b644c1b290.exe schtasks.exe PID 4992 wrote to memory of 2212 4992 189e395afb4efe7bc8e300b644c1b290.exe qui quequeh jos popipo fiqui xobeneja xepo.exe PID 4992 wrote to memory of 2212 4992 189e395afb4efe7bc8e300b644c1b290.exe qui quequeh jos popipo fiqui xobeneja xepo.exe PID 4992 wrote to memory of 2212 4992 189e395afb4efe7bc8e300b644c1b290.exe qui quequeh jos popipo fiqui xobeneja xepo.exe PID 4992 wrote to memory of 2164 4992 189e395afb4efe7bc8e300b644c1b290.exe cmd.exe PID 4992 wrote to memory of 2164 4992 189e395afb4efe7bc8e300b644c1b290.exe cmd.exe PID 4992 wrote to memory of 2164 4992 189e395afb4efe7bc8e300b644c1b290.exe cmd.exe PID 2164 wrote to memory of 4892 2164 cmd.exe chcp.com PID 2164 wrote to memory of 4892 2164 cmd.exe chcp.com PID 2164 wrote to memory of 4892 2164 cmd.exe chcp.com PID 2164 wrote to memory of 3724 2164 cmd.exe PING.EXE PID 2164 wrote to memory of 3724 2164 cmd.exe PING.EXE PID 2164 wrote to memory of 3724 2164 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\189e395afb4efe7bc8e300b644c1b290.exe"C:\Users\Admin\AppData\Local\Temp\189e395afb4efe7bc8e300b644c1b290.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /tn COMSurrogate /f /sc onlogon /rl highest /tr "C:\Users\Admin\bisita gaxamo\qui quequeh jos popipo fiqui xobeneja xepo.exe"2⤵
- Creates scheduled task(s)
PID:4308 -
C:\Users\Admin\bisita gaxamo\qui quequeh jos popipo fiqui xobeneja xepo.exe"C:\Users\Admin\bisita gaxamo\qui quequeh jos popipo fiqui xobeneja xepo.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2212 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\189e395afb4efe7bc8e300b644c1b290.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:4892
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:3724
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
690.9MB
MD5c52464f2e2581b83b24f966ffe4389cc
SHA18ea7bf55241491cbf615ff4a096f1b1dc62d5dbb
SHA2562de7552e86d19e4e8dbc97315bdae4017e74108c26381fbf8fbac473f7b913ec
SHA51232e43b480859b0f2296f0b1f78c61e2ead361d7afcfd07e26f34fa2798a22966578b97d8bd5acfb983bffbc0c13a8e29d3bc502c3e9eda3fce799e2d2b2eca55