Analysis
-
max time kernel
142s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2022 17:22
Static task
static1
Behavioral task
behavioral1
Sample
ddd2efa1eb9350edbab428cc82de2174273282f5a3265af55d60b0cb66f8f5fd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ddd2efa1eb9350edbab428cc82de2174273282f5a3265af55d60b0cb66f8f5fd.exe
Resource
win10v2004-20220812-en
General
-
Target
ddd2efa1eb9350edbab428cc82de2174273282f5a3265af55d60b0cb66f8f5fd.exe
-
Size
1.1MB
-
MD5
7a7e8863fce822388083e7c22944423a
-
SHA1
21308b3954e9defbfcd10711e17e8a2c359750cd
-
SHA256
ddd2efa1eb9350edbab428cc82de2174273282f5a3265af55d60b0cb66f8f5fd
-
SHA512
e8a0b9fb1beea0772ab23b88da00570d1d096625df2bc01479a8e343f1904b31974cae6da3d86bf69d6e0c65b0ae33ed9fd4a89f6ac355b082b5606c27dd90fa
-
SSDEEP
24576:wELTkXBwWja4SlukeeKL0xJaqT//aqT8E94Tf3C:px6
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Windows Update.exepid process 2492 Windows Update.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ddd2efa1eb9350edbab428cc82de2174273282f5a3265af55d60b0cb66f8f5fd.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation ddd2efa1eb9350edbab428cc82de2174273282f5a3265af55d60b0cb66f8f5fd.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
Processes:
vbc.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts vbc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Windows Update.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Roaming\\WindowsUpdate.exe" Windows Update.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 15 whatismyipaddress.com -
Suspicious use of SetThreadContext 2 IoCs
Processes:
Windows Update.exedescription pid process target process PID 2492 set thread context of 3304 2492 Windows Update.exe vbc.exe PID 2492 set thread context of 2272 2492 Windows Update.exe vbc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
Windows Update.exepid process 2492 Windows Update.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
Windows Update.exevbc.exevbc.exedescription pid process Token: SeDebugPrivilege 2492 Windows Update.exe Token: SeDebugPrivilege 3304 vbc.exe Token: SeDebugPrivilege 2272 vbc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Windows Update.exepid process 2492 Windows Update.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
ddd2efa1eb9350edbab428cc82de2174273282f5a3265af55d60b0cb66f8f5fd.exeWindows Update.exedescription pid process target process PID 4252 wrote to memory of 2492 4252 ddd2efa1eb9350edbab428cc82de2174273282f5a3265af55d60b0cb66f8f5fd.exe Windows Update.exe PID 4252 wrote to memory of 2492 4252 ddd2efa1eb9350edbab428cc82de2174273282f5a3265af55d60b0cb66f8f5fd.exe Windows Update.exe PID 4252 wrote to memory of 2492 4252 ddd2efa1eb9350edbab428cc82de2174273282f5a3265af55d60b0cb66f8f5fd.exe Windows Update.exe PID 2492 wrote to memory of 3304 2492 Windows Update.exe vbc.exe PID 2492 wrote to memory of 3304 2492 Windows Update.exe vbc.exe PID 2492 wrote to memory of 3304 2492 Windows Update.exe vbc.exe PID 2492 wrote to memory of 3304 2492 Windows Update.exe vbc.exe PID 2492 wrote to memory of 3304 2492 Windows Update.exe vbc.exe PID 2492 wrote to memory of 3304 2492 Windows Update.exe vbc.exe PID 2492 wrote to memory of 3304 2492 Windows Update.exe vbc.exe PID 2492 wrote to memory of 3304 2492 Windows Update.exe vbc.exe PID 2492 wrote to memory of 3304 2492 Windows Update.exe vbc.exe PID 2492 wrote to memory of 2272 2492 Windows Update.exe vbc.exe PID 2492 wrote to memory of 2272 2492 Windows Update.exe vbc.exe PID 2492 wrote to memory of 2272 2492 Windows Update.exe vbc.exe PID 2492 wrote to memory of 2272 2492 Windows Update.exe vbc.exe PID 2492 wrote to memory of 2272 2492 Windows Update.exe vbc.exe PID 2492 wrote to memory of 2272 2492 Windows Update.exe vbc.exe PID 2492 wrote to memory of 2272 2492 Windows Update.exe vbc.exe PID 2492 wrote to memory of 2272 2492 Windows Update.exe vbc.exe PID 2492 wrote to memory of 2272 2492 Windows Update.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ddd2efa1eb9350edbab428cc82de2174273282f5a3265af55d60b0cb66f8f5fd.exe"C:\Users\Admin\AppData\Local\Temp\ddd2efa1eb9350edbab428cc82de2174273282f5a3265af55d60b0cb66f8f5fd.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Windows Update.exe"C:\Users\Admin\AppData\Roaming\Windows Update.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" -f "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"3⤵
- Accesses Microsoft Outlook accounts
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" -f "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"3⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\SysInfo.txtFilesize
102B
MD565412e7f31233f4740f28adb35eec8a2
SHA161ff9a57008b6971db343ee0bead5deb8f495efa
SHA2560bda4973b2d9e2df093bc02542bce63266fbf726733423b53cfcaea611320a9d
SHA512473ec53518cf48c2b7579cf3017d6cafda12fad096892436fb19f298792623ec234a05d874fc495e268b79025e8dc89c7a1b36007c387cc71a2f3fe225d823b6
-
C:\Users\Admin\AppData\Local\Temp\holdermail.txtFilesize
327B
MD51265c5140a2f68b05b92aa1a25a2abb6
SHA1627a660e9d2a41c8c4a662ca44fdb68a1356bc82
SHA256694bae0c1ebf6f8eeb8d902b1bfad57ed9a42dea6d3e327a0137a1c9f4f0c6b9
SHA512ad6a1dd57ec84459f28926d07e25f2c4f49dc67ff95b8400e85c3bcb8eccc471dbac5e2b1a2758fb563866ecacc2fae4657dfb85197fb4cd2547eef334b8a216
-
C:\Users\Admin\AppData\Local\Temp\holdermail.txtFilesize
1KB
MD501e7975c708365983265ae40d604beb4
SHA1f1c793c9b7a312d355cd944928ba9272bbeec44e
SHA25695d7aeb5f67dc33d0b62d02b26a5d469436f58f2246fd95189a8b86220bc9a40
SHA5129c67c306fbb0e191ea7af01388c6a99714c353590d99887ddd0b0ceee3f6cd3af2e7b2c8d1d22a5a34dac746e4b2156876d935a658afc9a1d38597fd4922e023
-
C:\Users\Admin\AppData\Roaming\Windows Update.exeFilesize
1.1MB
MD57a7e8863fce822388083e7c22944423a
SHA121308b3954e9defbfcd10711e17e8a2c359750cd
SHA256ddd2efa1eb9350edbab428cc82de2174273282f5a3265af55d60b0cb66f8f5fd
SHA512e8a0b9fb1beea0772ab23b88da00570d1d096625df2bc01479a8e343f1904b31974cae6da3d86bf69d6e0c65b0ae33ed9fd4a89f6ac355b082b5606c27dd90fa
-
C:\Users\Admin\AppData\Roaming\Windows Update.exeFilesize
1.1MB
MD57a7e8863fce822388083e7c22944423a
SHA121308b3954e9defbfcd10711e17e8a2c359750cd
SHA256ddd2efa1eb9350edbab428cc82de2174273282f5a3265af55d60b0cb66f8f5fd
SHA512e8a0b9fb1beea0772ab23b88da00570d1d096625df2bc01479a8e343f1904b31974cae6da3d86bf69d6e0c65b0ae33ed9fd4a89f6ac355b082b5606c27dd90fa
-
memory/2272-152-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB
-
memory/2272-150-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB
-
memory/2272-149-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB
-
memory/2272-148-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB
-
memory/2272-147-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB
-
memory/2272-146-0x0000000000000000-mapping.dmp
-
memory/2492-137-0x0000000074AB0000-0x0000000075061000-memory.dmpFilesize
5.7MB
-
memory/2492-139-0x0000000074AB0000-0x0000000075061000-memory.dmpFilesize
5.7MB
-
memory/2492-133-0x0000000000000000-mapping.dmp
-
memory/3304-143-0x0000000000400000-0x000000000048E000-memory.dmpFilesize
568KB
-
memory/3304-145-0x0000000000400000-0x000000000048E000-memory.dmpFilesize
568KB
-
memory/3304-142-0x0000000000400000-0x000000000048E000-memory.dmpFilesize
568KB
-
memory/3304-141-0x0000000000400000-0x000000000048E000-memory.dmpFilesize
568KB
-
memory/3304-140-0x0000000000000000-mapping.dmp
-
memory/4252-132-0x0000000074AB0000-0x0000000075061000-memory.dmpFilesize
5.7MB
-
memory/4252-136-0x0000000074AB0000-0x0000000075061000-memory.dmpFilesize
5.7MB