Analysis
-
max time kernel
177s -
max time network
204s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2022 11:36
Static task
static1
Behavioral task
behavioral1
Sample
bb88ff1c8a9fedda601ee817f7baf597f39f725322320fe6c39805e1a51ac6af.exe
Resource
win7-20220812-en
General
-
Target
bb88ff1c8a9fedda601ee817f7baf597f39f725322320fe6c39805e1a51ac6af.exe
-
Size
331KB
-
MD5
eb2cc33b05f167b62155d3afdd33bca2
-
SHA1
884068cd29cc9ff4d8a1a1d898f5a868d547c334
-
SHA256
bb88ff1c8a9fedda601ee817f7baf597f39f725322320fe6c39805e1a51ac6af
-
SHA512
9cc8623fcf7fc335e38b04f5aa84575f2467c0a5f0f731d1f17cca78fb6bca7d520affc3c0fe84e24610f80d13c1ed4a92201c5a305da89d60aebb088282d096
-
SSDEEP
6144:SM41YTICjnbHv1eNJa0rr7DxodlqFYZwfjJVYv0yGKb52Wf:SKjLv03aYDxodluYZw7JV+2Wf
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
explorer.exesysglobl.exeiedvtool.exepid process 5108 explorer.exe 4868 sysglobl.exe 1960 iedvtool.exe -
Processes:
resource yara_rule behavioral2/memory/3632-140-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/3632-141-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/3632-142-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/3632-145-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/3632-144-0x0000000000400000-0x00000000004C9000-memory.dmp upx -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
bb88ff1c8a9fedda601ee817f7baf597f39f725322320fe6c39805e1a51ac6af.exeexplorer.exesysglobl.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation bb88ff1c8a9fedda601ee817f7baf597f39f725322320fe6c39805e1a51ac6af.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation explorer.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation sysglobl.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
sysglobl.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\© Windows Live Messenger Music Status Plugin Module = "C:\\Users\\Admin\\AppData\\Local\\Temp\\sysglobl.exe" sysglobl.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
explorer.exeiedvtool.exedescription pid process target process PID 5108 set thread context of 3632 5108 explorer.exe AppLaunch.exe PID 1960 set thread context of 4104 1960 iedvtool.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
explorer.exesysglobl.exeiedvtool.exepid process 5108 explorer.exe 5108 explorer.exe 5108 explorer.exe 5108 explorer.exe 5108 explorer.exe 4868 sysglobl.exe 5108 explorer.exe 5108 explorer.exe 5108 explorer.exe 5108 explorer.exe 5108 explorer.exe 5108 explorer.exe 5108 explorer.exe 5108 explorer.exe 5108 explorer.exe 5108 explorer.exe 5108 explorer.exe 5108 explorer.exe 5108 explorer.exe 5108 explorer.exe 5108 explorer.exe 5108 explorer.exe 5108 explorer.exe 5108 explorer.exe 5108 explorer.exe 5108 explorer.exe 5108 explorer.exe 5108 explorer.exe 5108 explorer.exe 5108 explorer.exe 5108 explorer.exe 1960 iedvtool.exe 1960 iedvtool.exe 5108 explorer.exe 1960 iedvtool.exe 5108 explorer.exe 1960 iedvtool.exe 1960 iedvtool.exe 1960 iedvtool.exe 5108 explorer.exe 5108 explorer.exe 1960 iedvtool.exe 1960 iedvtool.exe 5108 explorer.exe 5108 explorer.exe 1960 iedvtool.exe 1960 iedvtool.exe 5108 explorer.exe 5108 explorer.exe 1960 iedvtool.exe 1960 iedvtool.exe 5108 explorer.exe 5108 explorer.exe 1960 iedvtool.exe 5108 explorer.exe 1960 iedvtool.exe 5108 explorer.exe 5108 explorer.exe 1960 iedvtool.exe 1960 iedvtool.exe 5108 explorer.exe 1960 iedvtool.exe 1960 iedvtool.exe 5108 explorer.exe -
Suspicious use of AdjustPrivilegeToken 52 IoCs
Processes:
bb88ff1c8a9fedda601ee817f7baf597f39f725322320fe6c39805e1a51ac6af.exeexplorer.exeAppLaunch.exesysglobl.exeiedvtool.exeAppLaunch.exedescription pid process Token: SeDebugPrivilege 4696 bb88ff1c8a9fedda601ee817f7baf597f39f725322320fe6c39805e1a51ac6af.exe Token: SeDebugPrivilege 5108 explorer.exe Token: SeIncreaseQuotaPrivilege 3632 AppLaunch.exe Token: SeSecurityPrivilege 3632 AppLaunch.exe Token: SeTakeOwnershipPrivilege 3632 AppLaunch.exe Token: SeLoadDriverPrivilege 3632 AppLaunch.exe Token: SeSystemProfilePrivilege 3632 AppLaunch.exe Token: SeSystemtimePrivilege 3632 AppLaunch.exe Token: SeProfSingleProcessPrivilege 3632 AppLaunch.exe Token: SeIncBasePriorityPrivilege 3632 AppLaunch.exe Token: SeCreatePagefilePrivilege 3632 AppLaunch.exe Token: SeBackupPrivilege 3632 AppLaunch.exe Token: SeRestorePrivilege 3632 AppLaunch.exe Token: SeShutdownPrivilege 3632 AppLaunch.exe Token: SeDebugPrivilege 3632 AppLaunch.exe Token: SeSystemEnvironmentPrivilege 3632 AppLaunch.exe Token: SeChangeNotifyPrivilege 3632 AppLaunch.exe Token: SeRemoteShutdownPrivilege 3632 AppLaunch.exe Token: SeUndockPrivilege 3632 AppLaunch.exe Token: SeManageVolumePrivilege 3632 AppLaunch.exe Token: SeImpersonatePrivilege 3632 AppLaunch.exe Token: SeCreateGlobalPrivilege 3632 AppLaunch.exe Token: 33 3632 AppLaunch.exe Token: 34 3632 AppLaunch.exe Token: 35 3632 AppLaunch.exe Token: 36 3632 AppLaunch.exe Token: SeDebugPrivilege 4868 sysglobl.exe Token: SeDebugPrivilege 1960 iedvtool.exe Token: SeIncreaseQuotaPrivilege 4104 AppLaunch.exe Token: SeSecurityPrivilege 4104 AppLaunch.exe Token: SeTakeOwnershipPrivilege 4104 AppLaunch.exe Token: SeLoadDriverPrivilege 4104 AppLaunch.exe Token: SeSystemProfilePrivilege 4104 AppLaunch.exe Token: SeSystemtimePrivilege 4104 AppLaunch.exe Token: SeProfSingleProcessPrivilege 4104 AppLaunch.exe Token: SeIncBasePriorityPrivilege 4104 AppLaunch.exe Token: SeCreatePagefilePrivilege 4104 AppLaunch.exe Token: SeBackupPrivilege 4104 AppLaunch.exe Token: SeRestorePrivilege 4104 AppLaunch.exe Token: SeShutdownPrivilege 4104 AppLaunch.exe Token: SeDebugPrivilege 4104 AppLaunch.exe Token: SeSystemEnvironmentPrivilege 4104 AppLaunch.exe Token: SeChangeNotifyPrivilege 4104 AppLaunch.exe Token: SeRemoteShutdownPrivilege 4104 AppLaunch.exe Token: SeUndockPrivilege 4104 AppLaunch.exe Token: SeManageVolumePrivilege 4104 AppLaunch.exe Token: SeImpersonatePrivilege 4104 AppLaunch.exe Token: SeCreateGlobalPrivilege 4104 AppLaunch.exe Token: 33 4104 AppLaunch.exe Token: 34 4104 AppLaunch.exe Token: 35 4104 AppLaunch.exe Token: 36 4104 AppLaunch.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
AppLaunch.exepid process 3632 AppLaunch.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
bb88ff1c8a9fedda601ee817f7baf597f39f725322320fe6c39805e1a51ac6af.exeexplorer.exesysglobl.exeiedvtool.exedescription pid process target process PID 4696 wrote to memory of 5108 4696 bb88ff1c8a9fedda601ee817f7baf597f39f725322320fe6c39805e1a51ac6af.exe explorer.exe PID 4696 wrote to memory of 5108 4696 bb88ff1c8a9fedda601ee817f7baf597f39f725322320fe6c39805e1a51ac6af.exe explorer.exe PID 4696 wrote to memory of 5108 4696 bb88ff1c8a9fedda601ee817f7baf597f39f725322320fe6c39805e1a51ac6af.exe explorer.exe PID 5108 wrote to memory of 3632 5108 explorer.exe AppLaunch.exe PID 5108 wrote to memory of 3632 5108 explorer.exe AppLaunch.exe PID 5108 wrote to memory of 3632 5108 explorer.exe AppLaunch.exe PID 5108 wrote to memory of 3632 5108 explorer.exe AppLaunch.exe PID 5108 wrote to memory of 3632 5108 explorer.exe AppLaunch.exe PID 5108 wrote to memory of 3632 5108 explorer.exe AppLaunch.exe PID 5108 wrote to memory of 3632 5108 explorer.exe AppLaunch.exe PID 5108 wrote to memory of 3632 5108 explorer.exe AppLaunch.exe PID 5108 wrote to memory of 4868 5108 explorer.exe sysglobl.exe PID 5108 wrote to memory of 4868 5108 explorer.exe sysglobl.exe PID 5108 wrote to memory of 4868 5108 explorer.exe sysglobl.exe PID 4868 wrote to memory of 1960 4868 sysglobl.exe iedvtool.exe PID 4868 wrote to memory of 1960 4868 sysglobl.exe iedvtool.exe PID 4868 wrote to memory of 1960 4868 sysglobl.exe iedvtool.exe PID 1960 wrote to memory of 4104 1960 iedvtool.exe AppLaunch.exe PID 1960 wrote to memory of 4104 1960 iedvtool.exe AppLaunch.exe PID 1960 wrote to memory of 4104 1960 iedvtool.exe AppLaunch.exe PID 1960 wrote to memory of 4104 1960 iedvtool.exe AppLaunch.exe PID 1960 wrote to memory of 4104 1960 iedvtool.exe AppLaunch.exe PID 1960 wrote to memory of 4104 1960 iedvtool.exe AppLaunch.exe PID 1960 wrote to memory of 4104 1960 iedvtool.exe AppLaunch.exe PID 1960 wrote to memory of 4104 1960 iedvtool.exe AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb88ff1c8a9fedda601ee817f7baf597f39f725322320fe6c39805e1a51ac6af.exe"C:\Users\Admin\AppData\Local\Temp\bb88ff1c8a9fedda601ee817f7baf597f39f725322320fe6c39805e1a51ac6af.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\sysglobl.exe"C:\Users\Admin\AppData\Local\Temp\sysglobl.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\iedvtool.exe"C:\Users\Admin\AppData\Local\Temp\iedvtool.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe5⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\SysInfo.txtFilesize
102B
MD59ce7cd302354cd9620e92b882dc708a7
SHA11760eebb77ffe46e49caba7d0e488cfe504053e5
SHA2562437275ae372d5259895be8b178b57cef465775d020f00e8440f2d9c01948d9c
SHA512693ff1642b5f4739cc9a8bedb8f4f8033a40407f6793e21b724257f9516cd383c1f911b823a25e0af5a803b2749b76f4881ad09d31926589f71bd8d91c023327
-
C:\Users\Admin\AppData\Local\Temp\iedvtool.exeFilesize
331KB
MD5eb2cc33b05f167b62155d3afdd33bca2
SHA1884068cd29cc9ff4d8a1a1d898f5a868d547c334
SHA256bb88ff1c8a9fedda601ee817f7baf597f39f725322320fe6c39805e1a51ac6af
SHA5129cc8623fcf7fc335e38b04f5aa84575f2467c0a5f0f731d1f17cca78fb6bca7d520affc3c0fe84e24610f80d13c1ed4a92201c5a305da89d60aebb088282d096
-
C:\Users\Admin\AppData\Local\Temp\iedvtool.exeFilesize
331KB
MD5eb2cc33b05f167b62155d3afdd33bca2
SHA1884068cd29cc9ff4d8a1a1d898f5a868d547c334
SHA256bb88ff1c8a9fedda601ee817f7baf597f39f725322320fe6c39805e1a51ac6af
SHA5129cc8623fcf7fc335e38b04f5aa84575f2467c0a5f0f731d1f17cca78fb6bca7d520affc3c0fe84e24610f80d13c1ed4a92201c5a305da89d60aebb088282d096
-
C:\Users\Admin\AppData\Local\Temp\sysglobl.exeFilesize
5KB
MD5f497644617b3acfeb96112688987bdca
SHA1f053af1485c7ed5da986c0ddf156a4e30fe21fe0
SHA2569da37d8226e60103d6e1a5457e24f195d3fbc664b71ab759aeeb231a8c93f2ed
SHA512934a1057a7c11e7eb015b9c666c632953197128775abccb779014c179f5653b728aa5383fd668147528b7148c9e444bd6a0df8a7a9ca8c30712c6c3a3c2e17e1
-
C:\Users\Admin\AppData\Local\Temp\sysglobl.exeFilesize
5KB
MD5f497644617b3acfeb96112688987bdca
SHA1f053af1485c7ed5da986c0ddf156a4e30fe21fe0
SHA2569da37d8226e60103d6e1a5457e24f195d3fbc664b71ab759aeeb231a8c93f2ed
SHA512934a1057a7c11e7eb015b9c666c632953197128775abccb779014c179f5653b728aa5383fd668147528b7148c9e444bd6a0df8a7a9ca8c30712c6c3a3c2e17e1
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exeFilesize
331KB
MD5eb2cc33b05f167b62155d3afdd33bca2
SHA1884068cd29cc9ff4d8a1a1d898f5a868d547c334
SHA256bb88ff1c8a9fedda601ee817f7baf597f39f725322320fe6c39805e1a51ac6af
SHA5129cc8623fcf7fc335e38b04f5aa84575f2467c0a5f0f731d1f17cca78fb6bca7d520affc3c0fe84e24610f80d13c1ed4a92201c5a305da89d60aebb088282d096
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exeFilesize
331KB
MD5eb2cc33b05f167b62155d3afdd33bca2
SHA1884068cd29cc9ff4d8a1a1d898f5a868d547c334
SHA256bb88ff1c8a9fedda601ee817f7baf597f39f725322320fe6c39805e1a51ac6af
SHA5129cc8623fcf7fc335e38b04f5aa84575f2467c0a5f0f731d1f17cca78fb6bca7d520affc3c0fe84e24610f80d13c1ed4a92201c5a305da89d60aebb088282d096
-
memory/1960-162-0x0000000074E20000-0x00000000753D1000-memory.dmpFilesize
5.7MB
-
memory/1960-159-0x0000000074E20000-0x00000000753D1000-memory.dmpFilesize
5.7MB
-
memory/1960-150-0x0000000000000000-mapping.dmp
-
memory/3632-139-0x0000000000000000-mapping.dmp
-
memory/3632-141-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/3632-144-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/3632-145-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/3632-140-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/3632-142-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/4104-153-0x0000000000000000-mapping.dmp
-
memory/4696-133-0x0000000074E20000-0x00000000753D1000-memory.dmpFilesize
5.7MB
-
memory/4696-137-0x0000000074E20000-0x00000000753D1000-memory.dmpFilesize
5.7MB
-
memory/4868-152-0x0000000074E20000-0x00000000753D1000-memory.dmpFilesize
5.7MB
-
memory/4868-146-0x0000000000000000-mapping.dmp
-
memory/4868-161-0x0000000074E20000-0x00000000753D1000-memory.dmpFilesize
5.7MB
-
memory/5108-143-0x0000000074E20000-0x00000000753D1000-memory.dmpFilesize
5.7MB
-
memory/5108-160-0x0000000074E20000-0x00000000753D1000-memory.dmpFilesize
5.7MB
-
memory/5108-134-0x0000000000000000-mapping.dmp