Analysis
-
max time kernel
208s -
max time network
232s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
30/11/2022, 23:10
Static task
static1
Behavioral task
behavioral1
Sample
b18c25df69fe115ec9d182d859ad35b33a6c80b4700abbf59f12c4d851471481.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b18c25df69fe115ec9d182d859ad35b33a6c80b4700abbf59f12c4d851471481.exe
Resource
win10v2004-20221111-en
General
-
Target
b18c25df69fe115ec9d182d859ad35b33a6c80b4700abbf59f12c4d851471481.exe
-
Size
335KB
-
MD5
3123850b28df13cc3563713cb64caef5
-
SHA1
d44eab7bf6067f3618c5aa9ac9e7a83a7127143f
-
SHA256
b18c25df69fe115ec9d182d859ad35b33a6c80b4700abbf59f12c4d851471481
-
SHA512
2dad171e4e6c909080d299be105d39fc126840509908a7be981db5a6721c62f01bedccb2bcd73f3e9445bc5a1b1b72211221634c77906f712d7d0b3ecdde2f69
-
SSDEEP
6144:ZbXE9OiTGfhEClq9Zd6cdURGBFphMn3k/NEXWGHAcRUoCR:hU9XiuiywGFpqn3k/NuVnk
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2388 i12.exe -
resource yara_rule behavioral2/files/0x0007000000022e45-135.dat upx behavioral2/files/0x0007000000022e45-136.dat upx behavioral2/memory/2388-139-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral2/memory/2388-140-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral2/memory/2388-143-0x0000000000400000-0x0000000000444000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation b18c25df69fe115ec9d182d859ad35b33a6c80b4700abbf59f12c4d851471481.exe -
Drops file in System32 directory 11 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.chk svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSStmp.log svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSSres00001.jrs svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.jfm svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.dat svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.jcp svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.log svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.jtx svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSSres00002.jrs svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.chk svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.dat svchost.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\ololo\p.txt b18c25df69fe115ec9d182d859ad35b33a6c80b4700abbf59f12c4d851471481.exe File opened for modification C:\Program Files (x86)\ololo\ku4uqt1.jpg svchost.exe File opened for modification C:\Program Files (x86)\ololo\ku4uqt1.jpg b18c25df69fe115ec9d182d859ad35b33a6c80b4700abbf59f12c4d851471481.exe File opened for modification C:\Program Files (x86)\ololo\i12.exe b18c25df69fe115ec9d182d859ad35b33a6c80b4700abbf59f12c4d851471481.exe File opened for modification C:\Program Files (x86)\ololo\test3.bat b18c25df69fe115ec9d182d859ad35b33a6c80b4700abbf59f12c4d851471481.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3836 2388 WerFault.exe 87 -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings b18c25df69fe115ec9d182d859ad35b33a6c80b4700abbf59f12c4d851471481.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings mspaint.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5084 mspaint.exe 5084 mspaint.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5084 mspaint.exe 4800 OpenWith.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1540 wrote to memory of 5084 1540 b18c25df69fe115ec9d182d859ad35b33a6c80b4700abbf59f12c4d851471481.exe 84 PID 1540 wrote to memory of 5084 1540 b18c25df69fe115ec9d182d859ad35b33a6c80b4700abbf59f12c4d851471481.exe 84 PID 1540 wrote to memory of 5084 1540 b18c25df69fe115ec9d182d859ad35b33a6c80b4700abbf59f12c4d851471481.exe 84 PID 1540 wrote to memory of 1000 1540 b18c25df69fe115ec9d182d859ad35b33a6c80b4700abbf59f12c4d851471481.exe 85 PID 1540 wrote to memory of 1000 1540 b18c25df69fe115ec9d182d859ad35b33a6c80b4700abbf59f12c4d851471481.exe 85 PID 1540 wrote to memory of 1000 1540 b18c25df69fe115ec9d182d859ad35b33a6c80b4700abbf59f12c4d851471481.exe 85 PID 1540 wrote to memory of 2388 1540 b18c25df69fe115ec9d182d859ad35b33a6c80b4700abbf59f12c4d851471481.exe 87 PID 1540 wrote to memory of 2388 1540 b18c25df69fe115ec9d182d859ad35b33a6c80b4700abbf59f12c4d851471481.exe 87 PID 1540 wrote to memory of 2388 1540 b18c25df69fe115ec9d182d859ad35b33a6c80b4700abbf59f12c4d851471481.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\b18c25df69fe115ec9d182d859ad35b33a6c80b4700abbf59f12c4d851471481.exe"C:\Users\Admin\AppData\Local\Temp\b18c25df69fe115ec9d182d859ad35b33a6c80b4700abbf59f12c4d851471481.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\SysWOW64\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Program Files (x86)\ololo\ku4uqt1.jpg" /ForceBootstrapPaint3D2⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5084
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\ololo\test3.bat" "2⤵
- Drops file in Drivers directory
PID:1000
-
-
C:\Program Files (x86)\ololo\i12.exe"C:\Program Files (x86)\ololo\i12.exe"2⤵
- Executes dropped EXE
PID:2388 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2388 -s 6643⤵
- Program crash
PID:3836
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2388 -ip 23881⤵PID:932
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s DsSvc1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
PID:2116
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:4800
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
103KB
MD5a37e8b3ae5d350aa0932b10ed8d4ef2e
SHA182dc374225ab3c69d57fddf7c205bf4f3646ee1f
SHA2564fd25da42614925487deaeab955da28a791c9e5bf00fb39fe64c038db69448b7
SHA5124cbac7bcd50db894c4ed8ead75a365d7d3855f0ead9190146de871c2b154ecf82676b55d53d2ca7079d6becbaac74e523082df5c8392863d4e946bff9db37d68
-
Filesize
103KB
MD5a37e8b3ae5d350aa0932b10ed8d4ef2e
SHA182dc374225ab3c69d57fddf7c205bf4f3646ee1f
SHA2564fd25da42614925487deaeab955da28a791c9e5bf00fb39fe64c038db69448b7
SHA5124cbac7bcd50db894c4ed8ead75a365d7d3855f0ead9190146de871c2b154ecf82676b55d53d2ca7079d6becbaac74e523082df5c8392863d4e946bff9db37d68
-
Filesize
51KB
MD5b0f288f8053aa9f457c1dc867f2e3a26
SHA140103a7b0390bfe773414b37a8a0481f1d334ea9
SHA256bda6429b629f34f3549518b0a5c2262eb3aa1eb74a1e5c472f97effd32c032f6
SHA512bad571efb5b4fa3eac1f47308760199b68b042e06d5a69963366c5fa2250b1b3cff69bd659e11b5cfc976fef4def282aa386f3b8a32ff9e2a4f8ced616b1b569
-
Filesize
2B
MD53416a75f4cea9109507cacd8e2f2aefc
SHA1761f22b2c1593d0bb87e0b606f990ba4974706de
SHA2563d914f9348c9cc0ff8a79716700b9fcd4d2f3e711608004eb8f138bcba7f14d9
SHA512e145ddd4c63521bd646145211682ea52dff04e67e79889fab04613dc7b6693368af53eb483dd22d278f6aa21bf180b1c83a1e3130e612f5722e50f11af694842
-
Filesize
13KB
MD557b0c7259deb7b8baab290749af0c0f3
SHA1612a22058e1c24f767e2fa5e6bc3d43d7f5b0f6d
SHA256e13382cda584a4d2a38e7659e13d1343097c2a17d72d9b2489fa6d29f08f690f
SHA51293c41867574b4b28150d3897ab153df3913c08aa713b519b25c6ba819dc3a65183da643cda3d48c14aace7dabcb09d297ccc5e1c814ba9249d873f7a29992b60