Analysis
-
max time kernel
171s -
max time network
206s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2022 09:33
Static task
static1
Behavioral task
behavioral1
Sample
acacad6f583f41aef322e29aad8e41c2d7ae4e9192fa450da2495934de1744c1.exe
Resource
win7-20221111-en
General
-
Target
acacad6f583f41aef322e29aad8e41c2d7ae4e9192fa450da2495934de1744c1.exe
-
Size
1.9MB
-
MD5
db367c514ab76f8d78125f38173f16a3
-
SHA1
952cca78e59b6e2235d128c7f0669e22c552a83d
-
SHA256
acacad6f583f41aef322e29aad8e41c2d7ae4e9192fa450da2495934de1744c1
-
SHA512
a84f043167960be13874951a563c95453760c251e3fa1634a519ac4fa499250f826735ddc30e65fae9bc94cbe0eabeaf71794af6c7ce7d3d462a2d7d9a3df2a1
-
SSDEEP
24576:qTfEWQMHi9jzdDnAOnCncwDg6TX8lXqLwr63mYmHfAlOFpe8Qk+Th/DNs0o+:UcW4fTWTTslXqLw+3m5Al98uTBhs0o+
Malware Config
Extracted
socelars
http://www.zhxxjs.pw/Info/
http://www.allinfo.pw/
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
acacad6f583f41aef322e29aad8e41c2d7ae4e9192fa450da2495934de1744c1.tmpDiskScan.exepid process 4532 acacad6f583f41aef322e29aad8e41c2d7ae4e9192fa450da2495934de1744c1.tmp 2796 DiskScan.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
acacad6f583f41aef322e29aad8e41c2d7ae4e9192fa450da2495934de1744c1.tmpdescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation acacad6f583f41aef322e29aad8e41c2d7ae4e9192fa450da2495934de1744c1.tmp -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4284 2796 WerFault.exe DiskScan.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
acacad6f583f41aef322e29aad8e41c2d7ae4e9192fa450da2495934de1744c1.tmppid process 4532 acacad6f583f41aef322e29aad8e41c2d7ae4e9192fa450da2495934de1744c1.tmp 4532 acacad6f583f41aef322e29aad8e41c2d7ae4e9192fa450da2495934de1744c1.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
acacad6f583f41aef322e29aad8e41c2d7ae4e9192fa450da2495934de1744c1.tmppid process 4532 acacad6f583f41aef322e29aad8e41c2d7ae4e9192fa450da2495934de1744c1.tmp -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
acacad6f583f41aef322e29aad8e41c2d7ae4e9192fa450da2495934de1744c1.exeacacad6f583f41aef322e29aad8e41c2d7ae4e9192fa450da2495934de1744c1.tmpdescription pid process target process PID 1224 wrote to memory of 4532 1224 acacad6f583f41aef322e29aad8e41c2d7ae4e9192fa450da2495934de1744c1.exe acacad6f583f41aef322e29aad8e41c2d7ae4e9192fa450da2495934de1744c1.tmp PID 1224 wrote to memory of 4532 1224 acacad6f583f41aef322e29aad8e41c2d7ae4e9192fa450da2495934de1744c1.exe acacad6f583f41aef322e29aad8e41c2d7ae4e9192fa450da2495934de1744c1.tmp PID 1224 wrote to memory of 4532 1224 acacad6f583f41aef322e29aad8e41c2d7ae4e9192fa450da2495934de1744c1.exe acacad6f583f41aef322e29aad8e41c2d7ae4e9192fa450da2495934de1744c1.tmp PID 4532 wrote to memory of 2796 4532 acacad6f583f41aef322e29aad8e41c2d7ae4e9192fa450da2495934de1744c1.tmp DiskScan.exe PID 4532 wrote to memory of 2796 4532 acacad6f583f41aef322e29aad8e41c2d7ae4e9192fa450da2495934de1744c1.tmp DiskScan.exe PID 4532 wrote to memory of 2796 4532 acacad6f583f41aef322e29aad8e41c2d7ae4e9192fa450da2495934de1744c1.tmp DiskScan.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\acacad6f583f41aef322e29aad8e41c2d7ae4e9192fa450da2495934de1744c1.exe"C:\Users\Admin\AppData\Local\Temp\acacad6f583f41aef322e29aad8e41c2d7ae4e9192fa450da2495934de1744c1.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-QEFE0.tmp\acacad6f583f41aef322e29aad8e41c2d7ae4e9192fa450da2495934de1744c1.tmp"C:\Users\Admin\AppData\Local\Temp\is-QEFE0.tmp\acacad6f583f41aef322e29aad8e41c2d7ae4e9192fa450da2495934de1744c1.tmp" /SL5="$A004E,1255174,809984,C:\Users\Admin\AppData\Local\Temp\acacad6f583f41aef322e29aad8e41c2d7ae4e9192fa450da2495934de1744c1.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\DiskProtect190901\DiskScan.exe"C:\Users\Admin\AppData\Local\Temp\DiskProtect190901\DiskScan.exe"3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2796 -s 11124⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2796 -ip 27961⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\DiskProtect190901\DiskScan.exeFilesize
1.1MB
MD58b657eec7beb7b278c47cd4cdeffbe29
SHA139d23a0ebea029b9878346abb74bc31e9b77d2c3
SHA256cd5c9d9a60600e130f6da42f661906909214d156d2500bd7d9657592eecf6019
SHA512c52488f58d9822fa00885f254fc2738562cd0933b32e0edb3cd406cca33b150f185ab294bd860d3750e4c98ab8084effef4a562df9ada42ee385e71b7d4a9fb1
-
C:\Users\Admin\AppData\Local\Temp\DiskProtect190901\DiskScan.exeFilesize
1.1MB
MD58b657eec7beb7b278c47cd4cdeffbe29
SHA139d23a0ebea029b9878346abb74bc31e9b77d2c3
SHA256cd5c9d9a60600e130f6da42f661906909214d156d2500bd7d9657592eecf6019
SHA512c52488f58d9822fa00885f254fc2738562cd0933b32e0edb3cd406cca33b150f185ab294bd860d3750e4c98ab8084effef4a562df9ada42ee385e71b7d4a9fb1
-
C:\Users\Admin\AppData\Local\Temp\is-QEFE0.tmp\acacad6f583f41aef322e29aad8e41c2d7ae4e9192fa450da2495934de1744c1.tmpFilesize
2.5MB
MD5b791cce5df067cdb8b8a8eae20d3c8f4
SHA19558d6e5de346d2e444ac869e885d101dcf94b83
SHA256c4905f1105c0d90fa77d346c8b088ac6a1a18326c0d356f24fee45ef6484955e
SHA512fada58d582d51406728cf6018110e0f8acef09b9f55fcb22252660524b98f33b7695c4f0cd3e4bfa6b47c4e82d7a335665a3be86f6ea3218ea30ffa7c025444f
-
C:\Users\Admin\AppData\Local\Temp\is-QEFE0.tmp\acacad6f583f41aef322e29aad8e41c2d7ae4e9192fa450da2495934de1744c1.tmpFilesize
2.5MB
MD5b791cce5df067cdb8b8a8eae20d3c8f4
SHA19558d6e5de346d2e444ac869e885d101dcf94b83
SHA256c4905f1105c0d90fa77d346c8b088ac6a1a18326c0d356f24fee45ef6484955e
SHA512fada58d582d51406728cf6018110e0f8acef09b9f55fcb22252660524b98f33b7695c4f0cd3e4bfa6b47c4e82d7a335665a3be86f6ea3218ea30ffa7c025444f
-
memory/1224-132-0x0000000000400000-0x00000000004D3000-memory.dmpFilesize
844KB
-
memory/1224-134-0x0000000000400000-0x00000000004D3000-memory.dmpFilesize
844KB
-
memory/1224-141-0x0000000000400000-0x00000000004D3000-memory.dmpFilesize
844KB
-
memory/2796-138-0x0000000000000000-mapping.dmp
-
memory/4532-135-0x0000000000000000-mapping.dmp