Analysis
-
max time kernel
161s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 15:33
Behavioral task
behavioral1
Sample
2b09275e6df2b95a935645a4c42af221fa52ffeca71211ad39c0f289c2c2680e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2b09275e6df2b95a935645a4c42af221fa52ffeca71211ad39c0f289c2c2680e.exe
Resource
win10v2004-20220812-en
General
-
Target
2b09275e6df2b95a935645a4c42af221fa52ffeca71211ad39c0f289c2c2680e.exe
-
Size
291KB
-
MD5
2c1240302962bb791c350f4f4021da5f
-
SHA1
4efb6c0ff32e0ed9c78a45bd349966ed6ccab73f
-
SHA256
2b09275e6df2b95a935645a4c42af221fa52ffeca71211ad39c0f289c2c2680e
-
SHA512
0adeadb3ef693768630ccee44c6158b9a8a460414f6f3fce6d9c930907f74a4a02fa591cb80dd0d90c8c54d0bf63bd4f6cff41a4791f35136de79dad4daa55b8
-
SSDEEP
6144:zuIlWqB+ihabs7Ch9KwyF5LeLodp2D1Mmakda0qL/dsn:q6Wq4aaE6KwyF5L0Y2D1PqLV4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1632 svchost.exe -
resource yara_rule behavioral2/memory/1140-132-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral2/memory/1140-135-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral2/files/0x0009000000022f71-137.dat upx behavioral2/files/0x0009000000022f71-138.dat upx behavioral2/memory/1632-139-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral2/memory/1140-142-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral2/memory/1632-143-0x0000000000400000-0x00000000004B6000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 2b09275e6df2b95a935645a4c42af221fa52ffeca71211ad39c0f289c2c2680e.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\Windows\\System\\svchost.exe" svchost.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 2b09275e6df2b95a935645a4c42af221fa52ffeca71211ad39c0f289c2c2680e.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\Windows\\System\\svchost.exe" 2b09275e6df2b95a935645a4c42af221fa52ffeca71211ad39c0f289c2c2680e.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run svchost.exe -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/1140-135-0x0000000000400000-0x00000000004B6000-memory.dmp autoit_exe behavioral2/memory/1140-142-0x0000000000400000-0x00000000004B6000-memory.dmp autoit_exe behavioral2/memory/1632-143-0x0000000000400000-0x00000000004B6000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 2 IoCs
pid Process 5068 taskkill.exe 1492 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 1140 2b09275e6df2b95a935645a4c42af221fa52ffeca71211ad39c0f289c2c2680e.exe 1140 2b09275e6df2b95a935645a4c42af221fa52ffeca71211ad39c0f289c2c2680e.exe 1140 2b09275e6df2b95a935645a4c42af221fa52ffeca71211ad39c0f289c2c2680e.exe 1140 2b09275e6df2b95a935645a4c42af221fa52ffeca71211ad39c0f289c2c2680e.exe 1140 2b09275e6df2b95a935645a4c42af221fa52ffeca71211ad39c0f289c2c2680e.exe 1140 2b09275e6df2b95a935645a4c42af221fa52ffeca71211ad39c0f289c2c2680e.exe 1632 svchost.exe 1632 svchost.exe 1632 svchost.exe 1632 svchost.exe 1632 svchost.exe 1632 svchost.exe 1632 svchost.exe 1632 svchost.exe 1632 svchost.exe 1632 svchost.exe 1632 svchost.exe 1632 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5068 taskkill.exe Token: SeDebugPrivilege 1492 taskkill.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1140 wrote to memory of 1684 1140 2b09275e6df2b95a935645a4c42af221fa52ffeca71211ad39c0f289c2c2680e.exe 80 PID 1140 wrote to memory of 1684 1140 2b09275e6df2b95a935645a4c42af221fa52ffeca71211ad39c0f289c2c2680e.exe 80 PID 1140 wrote to memory of 1684 1140 2b09275e6df2b95a935645a4c42af221fa52ffeca71211ad39c0f289c2c2680e.exe 80 PID 1684 wrote to memory of 5068 1684 cmd.exe 82 PID 1684 wrote to memory of 5068 1684 cmd.exe 82 PID 1684 wrote to memory of 5068 1684 cmd.exe 82 PID 1140 wrote to memory of 1632 1140 2b09275e6df2b95a935645a4c42af221fa52ffeca71211ad39c0f289c2c2680e.exe 83 PID 1140 wrote to memory of 1632 1140 2b09275e6df2b95a935645a4c42af221fa52ffeca71211ad39c0f289c2c2680e.exe 83 PID 1140 wrote to memory of 1632 1140 2b09275e6df2b95a935645a4c42af221fa52ffeca71211ad39c0f289c2c2680e.exe 83 PID 1632 wrote to memory of 3540 1632 svchost.exe 85 PID 1632 wrote to memory of 3540 1632 svchost.exe 85 PID 1632 wrote to memory of 3540 1632 svchost.exe 85 PID 3540 wrote to memory of 1492 3540 cmd.exe 87 PID 3540 wrote to memory of 1492 3540 cmd.exe 87 PID 3540 wrote to memory of 1492 3540 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b09275e6df2b95a935645a4c42af221fa52ffeca71211ad39c0f289c2c2680e.exe"C:\Users\Admin\AppData\Local\Temp\2b09275e6df2b95a935645a4c42af221fa52ffeca71211ad39c0f289c2c2680e.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C taskkill /IM qubnfe.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\taskkill.exetaskkill /IM qubnfe.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5068
-
-
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\System\svchost.exe"C:\Users\Admin\AppData\Local\Microsoft\Windows\System\svchost.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C taskkill /IM qubnfe.exe3⤵
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Windows\SysWOW64\taskkill.exetaskkill /IM qubnfe.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1492
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
291KB
MD52c1240302962bb791c350f4f4021da5f
SHA14efb6c0ff32e0ed9c78a45bd349966ed6ccab73f
SHA2562b09275e6df2b95a935645a4c42af221fa52ffeca71211ad39c0f289c2c2680e
SHA5120adeadb3ef693768630ccee44c6158b9a8a460414f6f3fce6d9c930907f74a4a02fa591cb80dd0d90c8c54d0bf63bd4f6cff41a4791f35136de79dad4daa55b8
-
Filesize
291KB
MD52c1240302962bb791c350f4f4021da5f
SHA14efb6c0ff32e0ed9c78a45bd349966ed6ccab73f
SHA2562b09275e6df2b95a935645a4c42af221fa52ffeca71211ad39c0f289c2c2680e
SHA5120adeadb3ef693768630ccee44c6158b9a8a460414f6f3fce6d9c930907f74a4a02fa591cb80dd0d90c8c54d0bf63bd4f6cff41a4791f35136de79dad4daa55b8