Analysis
-
max time kernel
183s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 00:06
Static task
static1
Behavioral task
behavioral1
Sample
a2f4b5f28281faa670f23f3e873ba5faaf9ed311046b1a309955af0a6133de48.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a2f4b5f28281faa670f23f3e873ba5faaf9ed311046b1a309955af0a6133de48.exe
Resource
win10v2004-20220812-en
General
-
Target
a2f4b5f28281faa670f23f3e873ba5faaf9ed311046b1a309955af0a6133de48.exe
-
Size
376KB
-
MD5
5b3899eaf351a5ba749e00c1dc66c94a
-
SHA1
7f366c7dd094916d2676ca9b67c0f2368bc4b146
-
SHA256
a2f4b5f28281faa670f23f3e873ba5faaf9ed311046b1a309955af0a6133de48
-
SHA512
49650f124959b0191e639901dd765ae754615471d151c175ae0372a620319ba5cffc0ac012e0f3132c54fb00597077dd9e20bb538b3f95f80c5e48137334fd8a
-
SSDEEP
6144:EbXE9OiTGfhEClq95YtwRuqkbQlLgzCmFJQyJvrrqrVcdBm3bGUHuBBc:QU9XiuiGvkbwLguYYh0ibBL
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1392 ya_hoshu_4tobi_ti_lomal_menya.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2f4b5f28281faa670f23f3e873ba5faaf9ed311046b1a309955af0a6133de48.exe -
Drops file in System32 directory 11 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.dat svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.jcp svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.jtx svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSStmp.log svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.chk svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.dat svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.chk svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.log svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSSres00001.jrs svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSSres00002.jrs svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.jfm svchost.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\j1\j1\ko.txt a2f4b5f28281faa670f23f3e873ba5faaf9ed311046b1a309955af0a6133de48.exe File opened for modification C:\Program Files (x86)\j1\j1\lomai_manya.bat a2f4b5f28281faa670f23f3e873ba5faaf9ed311046b1a309955af0a6133de48.exe File opened for modification C:\Program Files (x86)\j1\j1\polnostiu.jpg a2f4b5f28281faa670f23f3e873ba5faaf9ed311046b1a309955af0a6133de48.exe File opened for modification C:\Program Files (x86)\j1\j1\ya_hoshu_4tobi_ti_lomal_menya.exe a2f4b5f28281faa670f23f3e873ba5faaf9ed311046b1a309955af0a6133de48.exe File opened for modification C:\Program Files (x86)\j1\j1\polnostiu.jpg svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2664 1392 WerFault.exe 85 -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings a2f4b5f28281faa670f23f3e873ba5faaf9ed311046b1a309955af0a6133de48.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings mspaint.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3412 mspaint.exe 3412 mspaint.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3412 mspaint.exe 1220 OpenWith.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 448 wrote to memory of 3272 448 a2f4b5f28281faa670f23f3e873ba5faaf9ed311046b1a309955af0a6133de48.exe 82 PID 448 wrote to memory of 3272 448 a2f4b5f28281faa670f23f3e873ba5faaf9ed311046b1a309955af0a6133de48.exe 82 PID 448 wrote to memory of 3272 448 a2f4b5f28281faa670f23f3e873ba5faaf9ed311046b1a309955af0a6133de48.exe 82 PID 448 wrote to memory of 3412 448 a2f4b5f28281faa670f23f3e873ba5faaf9ed311046b1a309955af0a6133de48.exe 84 PID 448 wrote to memory of 3412 448 a2f4b5f28281faa670f23f3e873ba5faaf9ed311046b1a309955af0a6133de48.exe 84 PID 448 wrote to memory of 3412 448 a2f4b5f28281faa670f23f3e873ba5faaf9ed311046b1a309955af0a6133de48.exe 84 PID 448 wrote to memory of 1392 448 a2f4b5f28281faa670f23f3e873ba5faaf9ed311046b1a309955af0a6133de48.exe 85 PID 448 wrote to memory of 1392 448 a2f4b5f28281faa670f23f3e873ba5faaf9ed311046b1a309955af0a6133de48.exe 85 PID 448 wrote to memory of 1392 448 a2f4b5f28281faa670f23f3e873ba5faaf9ed311046b1a309955af0a6133de48.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2f4b5f28281faa670f23f3e873ba5faaf9ed311046b1a309955af0a6133de48.exe"C:\Users\Admin\AppData\Local\Temp\a2f4b5f28281faa670f23f3e873ba5faaf9ed311046b1a309955af0a6133de48.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\j1\j1\lomai_manya.bat" "2⤵
- Drops file in Drivers directory
PID:3272
-
-
C:\Windows\SysWOW64\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Program Files (x86)\j1\j1\polnostiu.jpg" /ForceBootstrapPaint3D2⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3412
-
-
C:\Program Files (x86)\j1\j1\ya_hoshu_4tobi_ti_lomal_menya.exe"C:\Program Files (x86)\j1\j1\ya_hoshu_4tobi_ti_lomal_menya.exe"2⤵
- Executes dropped EXE
PID:1392 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1392 -s 5043⤵
- Program crash
PID:2664
-
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s DsSvc1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
PID:3716
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:1220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1392 -ip 13921⤵PID:4160
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d645920e395fedad7bbbed0eca3fe2e0
SHA1af3e133428b9e25c55bc59fe534248e6a0c0f17b
SHA256d59eced1ded07f84c145592f65bdf854358e009c5cd705f5215bf18697fed103
SHA5125e108bc2842d7716815913af0b3d5cb59563fa9116f71b9a17b37d6d445fe778a071b6abcf9b1c5bac2be00800c74e29d69774a66570908d5ea848dcc0abfa76
-
Filesize
3KB
MD5687975280cca99d52fb24d6aedbcd633
SHA1ed694dced2ec31002ff6512a8996dd81e34abf33
SHA256af04058b4819c4c38901a68d09666a702e920ba27718c4720eadc361d83f68b9
SHA5128c13721ca06d1c1db6e9fbae58a87970f0f9b0d7216c5c1254650fccad7c6444377193a53178d2f92ade382869997fff68c120becb188fed04c550666f3cb535
-
Filesize
31KB
MD58f579226e8fd4af43a9111505db29474
SHA1bca4bcd599a5a9446be20cfec3392c60ef15a954
SHA256515454f4e2622c157efaa9e831e4585936056bf5d3095d8c56965caa75f7cca3
SHA512e24616cd8e7b88fb7566a47289e064cd0cccc2fe492c41f93049e6134820ed20e85731d8d13112d401f851f8286e569aea4e2501c975a4e0d06128bc76b79ecf
-
Filesize
508KB
MD5f19af4108a2a4cf73873faf210eaa03c
SHA1d16372de685c00d83e934cff8030536e654b2bf2
SHA25663be2598b4d4c062aa7d0d76196490b1beb65aa7f61bb46939b4cb247330a63a
SHA5122606a2ac1ebd91290a7939f4bc7890486c56fd5afba5dcd2a8cb5e42f06ba6529e01bace75ce0c34756a094d4f4517cb3528b4cff7c49035764e5468bb2a9535
-
Filesize
508KB
MD5f19af4108a2a4cf73873faf210eaa03c
SHA1d16372de685c00d83e934cff8030536e654b2bf2
SHA25663be2598b4d4c062aa7d0d76196490b1beb65aa7f61bb46939b4cb247330a63a
SHA5122606a2ac1ebd91290a7939f4bc7890486c56fd5afba5dcd2a8cb5e42f06ba6529e01bace75ce0c34756a094d4f4517cb3528b4cff7c49035764e5468bb2a9535