Analysis
-
max time kernel
183s -
max time network
246s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 14:26
Static task
static1
Behavioral task
behavioral1
Sample
91efea42fecceb536239ffd59dc9c0ab873ee744ce2b64ee0e7ea31bc9564cc0.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
91efea42fecceb536239ffd59dc9c0ab873ee744ce2b64ee0e7ea31bc9564cc0.exe
Resource
win10v2004-20221111-en
General
-
Target
91efea42fecceb536239ffd59dc9c0ab873ee744ce2b64ee0e7ea31bc9564cc0.exe
-
Size
367KB
-
MD5
73cd715094f2de0ef393e0fcb900434a
-
SHA1
c154b55a5e5ecab16f7b823552861d4d2c5268da
-
SHA256
91efea42fecceb536239ffd59dc9c0ab873ee744ce2b64ee0e7ea31bc9564cc0
-
SHA512
7114230f658bf8a633842800299cc45af6ee5a0ea94cd3c9a8100b88cb4ba6780aa5706b19a28209c3e2c79f42542d1e6f2434a745993f9f9d24600031507e7e
-
SSDEEP
6144:J1dlZro5yiOXUf80T2RwpF4qxTp5TRV2X4NpiVuesYUCpll:J1dlZo5yDAiwp/TptRoX47iwesYll
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 3848 144.exe 1136 server.exe 376 server.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation 91efea42fecceb536239ffd59dc9c0ab873ee744ce2b64ee0e7ea31bc9564cc0.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 144.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 144.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Extracted\fõBŸ*ᕸ5Áå¬áPµäü¤Á©ÑŽœ7az$°é¯‚2î¿.Up<®$ÆÖ7 ´._aQ}œ¼:¿™±€àl„0Ìàÿ 91efea42fecceb536239ffd59dc9c0ab873ee744ce2b64ee0e7ea31bc9564cc0.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1136 server.exe 1136 server.exe 1136 server.exe 1136 server.exe 376 server.exe 376 server.exe 376 server.exe 376 server.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 5076 wrote to memory of 3848 5076 91efea42fecceb536239ffd59dc9c0ab873ee744ce2b64ee0e7ea31bc9564cc0.exe 82 PID 5076 wrote to memory of 3848 5076 91efea42fecceb536239ffd59dc9c0ab873ee744ce2b64ee0e7ea31bc9564cc0.exe 82 PID 5076 wrote to memory of 3848 5076 91efea42fecceb536239ffd59dc9c0ab873ee744ce2b64ee0e7ea31bc9564cc0.exe 82 PID 3848 wrote to memory of 1136 3848 144.exe 83 PID 3848 wrote to memory of 1136 3848 144.exe 83 PID 3848 wrote to memory of 1136 3848 144.exe 83 PID 1136 wrote to memory of 784 1136 server.exe 35 PID 1136 wrote to memory of 784 1136 server.exe 35 PID 1136 wrote to memory of 784 1136 server.exe 35 PID 1136 wrote to memory of 784 1136 server.exe 35 PID 3848 wrote to memory of 376 3848 144.exe 85 PID 3848 wrote to memory of 376 3848 144.exe 85 PID 3848 wrote to memory of 376 3848 144.exe 85 PID 376 wrote to memory of 784 376 server.exe 35 PID 376 wrote to memory of 784 376 server.exe 35 PID 376 wrote to memory of 784 376 server.exe 35 PID 376 wrote to memory of 784 376 server.exe 35
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:784
-
C:\Users\Admin\AppData\Local\Temp\91efea42fecceb536239ffd59dc9c0ab873ee744ce2b64ee0e7ea31bc9564cc0.exe"C:\Users\Admin\AppData\Local\Temp\91efea42fecceb536239ffd59dc9c0ab873ee744ce2b64ee0e7ea31bc9564cc0.exe"2⤵
- Checks computer location settings
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Extracted\144.exe"C:\Extracted\144.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3848 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1136
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:376
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
260KB
MD54e584da0797d689f6c4a6c6d683618ae
SHA1371e4cb7065883d5a3d52fbc97bdb38639207177
SHA256ac2e48d514efc085960a28422fcfb17599b8d4cb9c5f6b15a90ca3faf6fd1da3
SHA5129b393d1579736c4bcb1673affae86d5cd526ac9c972d13d102cd9fe859f23d23e8a9835201e7a7f4d4b70826db1d33e1c746fb71c36bd5e286cd385cbc39c816
-
Filesize
260KB
MD54e584da0797d689f6c4a6c6d683618ae
SHA1371e4cb7065883d5a3d52fbc97bdb38639207177
SHA256ac2e48d514efc085960a28422fcfb17599b8d4cb9c5f6b15a90ca3faf6fd1da3
SHA5129b393d1579736c4bcb1673affae86d5cd526ac9c972d13d102cd9fe859f23d23e8a9835201e7a7f4d4b70826db1d33e1c746fb71c36bd5e286cd385cbc39c816
-
Filesize
54KB
MD55f940a94edf0727a59f16cc502b9d06b
SHA1120446a9aa80d6603ed1ced908b81b7669ad8256
SHA25659cdbdba69bb680b54156f35d26514305fe75886a03054a25bca3af138f12ef6
SHA512f048cfb986723a354cf2715c5f201e47519bcf36fe96616ace56745b6957067c2aeba3fbc2c6a0f98d951072e9b88b16e73d665c4f63ae4cdd8fbaedf8a03271
-
Filesize
54KB
MD55f940a94edf0727a59f16cc502b9d06b
SHA1120446a9aa80d6603ed1ced908b81b7669ad8256
SHA25659cdbdba69bb680b54156f35d26514305fe75886a03054a25bca3af138f12ef6
SHA512f048cfb986723a354cf2715c5f201e47519bcf36fe96616ace56745b6957067c2aeba3fbc2c6a0f98d951072e9b88b16e73d665c4f63ae4cdd8fbaedf8a03271
-
Filesize
54KB
MD55f940a94edf0727a59f16cc502b9d06b
SHA1120446a9aa80d6603ed1ced908b81b7669ad8256
SHA25659cdbdba69bb680b54156f35d26514305fe75886a03054a25bca3af138f12ef6
SHA512f048cfb986723a354cf2715c5f201e47519bcf36fe96616ace56745b6957067c2aeba3fbc2c6a0f98d951072e9b88b16e73d665c4f63ae4cdd8fbaedf8a03271