Analysis
-
max time kernel
91s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2022 17:31
Static task
static1
Behavioral task
behavioral1
Sample
4ba795a56c90d9473d7bae78be7f0ad274face2fcffec28e76200961c8c06f1f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4ba795a56c90d9473d7bae78be7f0ad274face2fcffec28e76200961c8c06f1f.exe
Resource
win10v2004-20220812-en
General
-
Target
4ba795a56c90d9473d7bae78be7f0ad274face2fcffec28e76200961c8c06f1f.exe
-
Size
140KB
-
MD5
a6fe1d2d5c4d42da096f889373839334
-
SHA1
0bbe49943f152b525156208cd0dad663efea46e9
-
SHA256
4ba795a56c90d9473d7bae78be7f0ad274face2fcffec28e76200961c8c06f1f
-
SHA512
c16509616b1efe1c5c88d212da9efa7fd68432025cf6a4ab23e94bf84b7dfc743123015577378635be3bb87c4eecfe0a885df76c35022fe2a7544a16521321cf
-
SSDEEP
3072:HBAp5XhKpN4eOyVTGfhEClj8jTk+0hYJVjvok:KbXE9OiTGfhEClq9bJVz
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 7 1376 WScript.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 4ba795a56c90d9473d7bae78be7f0ad274face2fcffec28e76200961c8c06f1f.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\dns2\dns\data.txt 4ba795a56c90d9473d7bae78be7f0ad274face2fcffec28e76200961c8c06f1f.exe File opened for modification C:\Program Files (x86)\dns2\dns\stidno.bat 4ba795a56c90d9473d7bae78be7f0ad274face2fcffec28e76200961c8c06f1f.exe File opened for modification C:\Program Files (x86)\dns2\dns\obidno.vbs 4ba795a56c90d9473d7bae78be7f0ad274face2fcffec28e76200961c8c06f1f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 4ba795a56c90d9473d7bae78be7f0ad274face2fcffec28e76200961c8c06f1f.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3168 wrote to memory of 2236 3168 4ba795a56c90d9473d7bae78be7f0ad274face2fcffec28e76200961c8c06f1f.exe 79 PID 3168 wrote to memory of 2236 3168 4ba795a56c90d9473d7bae78be7f0ad274face2fcffec28e76200961c8c06f1f.exe 79 PID 3168 wrote to memory of 2236 3168 4ba795a56c90d9473d7bae78be7f0ad274face2fcffec28e76200961c8c06f1f.exe 79 PID 3168 wrote to memory of 1376 3168 4ba795a56c90d9473d7bae78be7f0ad274face2fcffec28e76200961c8c06f1f.exe 81 PID 3168 wrote to memory of 1376 3168 4ba795a56c90d9473d7bae78be7f0ad274face2fcffec28e76200961c8c06f1f.exe 81 PID 3168 wrote to memory of 1376 3168 4ba795a56c90d9473d7bae78be7f0ad274face2fcffec28e76200961c8c06f1f.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ba795a56c90d9473d7bae78be7f0ad274face2fcffec28e76200961c8c06f1f.exe"C:\Users\Admin\AppData\Local\Temp\4ba795a56c90d9473d7bae78be7f0ad274face2fcffec28e76200961c8c06f1f.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\dns2\dns\stidno.bat" "2⤵
- Drops file in Drivers directory
PID:2236
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\dns2\dns\obidno.vbs"2⤵
- Blocklisted process makes network request
PID:1376
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3B
MD5069059b7ef840f0c74a814ec9237b6ec
SHA1114d4eefde1dae3983e7a79f04c72feb9a3a7efd
SHA25665a699905c02619370bcf9207f5a477c3d67130ca71ec6f750e07fe8d510b084
SHA5128f38ba1b52fdbe35907eeb02f4cdd923dc608cbb560f1415cbac5858345e8aeaa3f43756602e2ec5f5e7637d65a627ccffa8cd636237110a9e8e207ad70d6bb5
-
Filesize
965B
MD54aaa49a0d0f388ef9458d5647d93e5bc
SHA160d01fc724a749f11e9adbf8324215cb1b15976b
SHA25654b38f0740dc184d583161a98068d766b28356a551c3a9f8d9f8f5c9af03d7c3
SHA5128585ce097f0af2e5f52916a03aba7858300a7735bced2b8ef047d3351602218d2e97def3f56a78e9ec3221cdb4420a906026ddfed7c50982959b4c6c62a2fb66
-
Filesize
3KB
MD5f9a55197332f781ea279ad522617f921
SHA1c98e9cdad3e2baa7ae123e4d4493534a249bfc89
SHA256e3d875953cd028393e3a4f621c00dc81cb9c992f7ba3fb7ac411499d6d2e8e45
SHA512b36ae819e11070458095a78d8b8dbb9c47f8aa0a38b7d1781a03be39ba552ab8e3b7fa9bf632274020b51a3483e1ec0bf4be866b63e57d6e6a91d8e6bdfc1812