Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 10:24
Behavioral task
behavioral1
Sample
b88a8426264cc88a6e19f31a2a8a15c58e9004e1f8e157e8ad87f471e1bcecef.exe
Resource
win7-20220812-en
General
-
Target
b88a8426264cc88a6e19f31a2a8a15c58e9004e1f8e157e8ad87f471e1bcecef.exe
-
Size
752KB
-
MD5
d38b262cf9b321b990f19a4791170422
-
SHA1
6b5b195570825dbe82da855661df468595b5cc32
-
SHA256
b88a8426264cc88a6e19f31a2a8a15c58e9004e1f8e157e8ad87f471e1bcecef
-
SHA512
02ba352b14f4045ac08804397c03ff37f0aee908d8cb7990fa8e8980ddf42d01987bfaf068f5e0c9d06d93985b603eb11bc816ca0e9e871a5e0420ac3d8ca548
-
SSDEEP
12288:f2Pn6uN/0s4ZO5XqwTLxY/q6r1LtZYsHGllHx4wgK/225+Mctm8sC3rSd/AE1Qbm:ePPNssdVlO1LtGl1GZt3GdIEWUEi
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 3256 sup.exe 4152 instsrv.exe 1900 svchost.exe 2012 csrss.exe -
resource yara_rule behavioral2/memory/3212-132-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/3212-136-0x0000000000400000-0x0000000000423000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation b88a8426264cc88a6e19f31a2a8a15c58e9004e1f8e157e8ad87f471e1bcecef.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\RECYCLER\S-1-5-21-606747145-1085031214-725345543-500\Desktop.ini b88a8426264cc88a6e19f31a2a8a15c58e9004e1f8e157e8ad87f471e1bcecef.exe File opened for modification C:\RECYCLER\S-1-5-21-606747145-1085031214-725345543-500\Desktop.ini b88a8426264cc88a6e19f31a2a8a15c58e9004e1f8e157e8ad87f471e1bcecef.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\mIRC\DateUsed csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\mIRC\DateUsed\ = "1670084708" csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\mIRC csrss.exe -
Modifies registry class 40 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open\ddeexec csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\irc\ = "URL:IRC Protocol" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\irc\Shell csrss.exe Key created \REGISTRY\MACHINE\Software\Classes\irc\Shell\open\ddeexec csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.chat csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\DefaultIcon csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\DefaultIcon\ = "\"C:\\RECYCLER\\S-1-5-21-606747145-1085031214-725345543-500\\csrss.exe\"" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.chat\ = "ChatFile" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open\ddeexec\ = "%1" csrss.exe Key created \REGISTRY\MACHINE\Software\Classes\irc csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\irc\Shell\open\command csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\irc\Shell\open\ddeexec\Topic\ = "Connect" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open\ddeexec\Topic csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open\ddeexec\Topic\ = "Connect" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\irc\URL Protocol csrss.exe Key created \REGISTRY\MACHINE\Software\Classes\irc\Shell\open\ddeexec\Application csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cha csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cha\ = "ChatFile" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open\ddeexec\Application csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\irc\DefaultIcon\ = "\"C:\\RECYCLER\\S-1-5-21-606747145-1085031214-725345543-500\\csrss.exe\"" csrss.exe Key created \REGISTRY\MACHINE\Software\Classes\irc\Shell\open\ddeexec\ifexec csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\irc\Shell\open\ddeexec\ifexec\ = "%1" csrss.exe Key created \REGISTRY\MACHINE\Software\Classes\irc\Shell\open\ddeexec\Topic csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open\ddeexec\ifexec\ = "%1" csrss.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\irc\EditFlags = 02000000 csrss.exe Key created \REGISTRY\MACHINE\Software\Classes\irc\Shell\open\command csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\irc csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\irc\Shell\open csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\irc\Shell\open\command\ = "\"C:\\RECYCLER\\S-1-5-21-606747145-1085031214-725345543-500\\csrss.exe\" -noconnect" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\ = "Chat File" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open\command csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open\command\ = "\"C:\\RECYCLER\\S-1-5-21-606747145-1085031214-725345543-500\\csrss.exe\" -noconnect" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open\ddeexec\Application\ = "svchost" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open\ddeexec\ifexec csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open csrss.exe Key created \REGISTRY\MACHINE\Software\Classes\irc\DefaultIcon csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\irc\Shell\open\ddeexec\ = "%1" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\irc\Shell\open\ddeexec\Application\ = "svchost" csrss.exe -
Runs .reg file with regedit 1 IoCs
pid Process 3760 regedit.exe -
Runs net.exe
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2012 csrss.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2012 csrss.exe 2012 csrss.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 3212 wrote to memory of 3256 3212 b88a8426264cc88a6e19f31a2a8a15c58e9004e1f8e157e8ad87f471e1bcecef.exe 81 PID 3212 wrote to memory of 3256 3212 b88a8426264cc88a6e19f31a2a8a15c58e9004e1f8e157e8ad87f471e1bcecef.exe 81 PID 3212 wrote to memory of 3256 3212 b88a8426264cc88a6e19f31a2a8a15c58e9004e1f8e157e8ad87f471e1bcecef.exe 81 PID 3256 wrote to memory of 1840 3256 sup.exe 82 PID 3256 wrote to memory of 1840 3256 sup.exe 82 PID 3256 wrote to memory of 1840 3256 sup.exe 82 PID 1840 wrote to memory of 4260 1840 cmd.exe 84 PID 1840 wrote to memory of 4260 1840 cmd.exe 84 PID 1840 wrote to memory of 4260 1840 cmd.exe 84 PID 4260 wrote to memory of 540 4260 net.exe 85 PID 4260 wrote to memory of 540 4260 net.exe 85 PID 4260 wrote to memory of 540 4260 net.exe 85 PID 1840 wrote to memory of 4152 1840 cmd.exe 86 PID 1840 wrote to memory of 4152 1840 cmd.exe 86 PID 1840 wrote to memory of 4152 1840 cmd.exe 86 PID 1840 wrote to memory of 3760 1840 cmd.exe 87 PID 1840 wrote to memory of 3760 1840 cmd.exe 87 PID 1840 wrote to memory of 3760 1840 cmd.exe 87 PID 1840 wrote to memory of 4332 1840 cmd.exe 88 PID 1840 wrote to memory of 4332 1840 cmd.exe 88 PID 1840 wrote to memory of 4332 1840 cmd.exe 88 PID 4332 wrote to memory of 4188 4332 net.exe 89 PID 4332 wrote to memory of 4188 4332 net.exe 89 PID 4332 wrote to memory of 4188 4332 net.exe 89 PID 1900 wrote to memory of 2012 1900 svchost.exe 91 PID 1900 wrote to memory of 2012 1900 svchost.exe 91 PID 1900 wrote to memory of 2012 1900 svchost.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\b88a8426264cc88a6e19f31a2a8a15c58e9004e1f8e157e8ad87f471e1bcecef.exe"C:\Users\Admin\AppData\Local\Temp\b88a8426264cc88a6e19f31a2a8a15c58e9004e1f8e157e8ad87f471e1bcecef.exe"1⤵
- Checks computer location settings
- Drops desktop.ini file(s)
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\RECYCLER\S-1-5-21-606747145-1085031214-725345543-500\sup.exe"C:\RECYCLER\S-1-5-21-606747145-1085031214-725345543-500\sup.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\bt2755.bat3⤵
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\SysWOW64\net.exenet stop "Windows Firewall/Internet Connection Sharing (ICS)"4⤵
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Windows Firewall/Internet Connection Sharing (ICS)"5⤵PID:540
-
-
-
C:\RECYCLER\S-1-5-21-606747145-1085031214-725345543-500\instsrv.exeinstsrv.exe svchost C:\RECYCLER\S-1-5-21-606747145-1085031214-725345543-500\svchost.exe4⤵
- Executes dropped EXE
PID:4152
-
-
C:\Windows\SysWOW64\regedit.exeregedit -s a.reg4⤵
- Runs .reg file with regedit
PID:3760
-
-
C:\Windows\SysWOW64\net.exenet start svchost4⤵
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start svchost5⤵PID:4188
-
-
-
-
-
C:\RECYCLER\S-1-5-21-606747145-1085031214-725345543-500\svchost.exeC:\RECYCLER\S-1-5-21-606747145-1085031214-725345543-500\svchost.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\RECYCLER\S-1-5-21-606747145-1085031214-725345543-500\csrss.exeC:\RECYCLER\S-1-5-21-606747145-1085031214-725345543-500\csrss.exe2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2012
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
556B
MD55ee7fe7e4463ecabdb6236033d2c3a05
SHA1ea831d9104dae3eaf30ab8f90dbd34eedc9145a3
SHA256236da3230ac60deed70eeb38f92a9d60a0eca2f9ee960f0127802ba768ee8fde
SHA512e15a864ee16c243460516b16e26ad791f202f66f949a8ea824709d70846f78061d603fdc1c77835d8f772edf3459e01bb4ea2f593e16c07ec4fe891eb133b87b
-
Filesize
11B
MD52218df9cdffc814a3dc25c81dd8619dd
SHA10290f796218937f61331adc8803788e7cd4c2299
SHA256455831b583cfa9549746bcd296a60f5191d2eff7829d469e029b68768c5e56d1
SHA5127aa4c745dfce7b2c38c4930e8275885727a19480597f685f89ab0e536175c31a2d5ee61cfd84b483f73eb211970a1a4fefcc59d8ef97b9af7bf09b7dcf932efa
-
Filesize
61B
MD5f5d1a3af67f05f5af2b0fca009887a97
SHA1bddaa45a9849524c4648fb778b7e0601d35ecbed
SHA256d846844887cfecb6cfbf1fa51dd2380cd203b21d154e1938df15567c256f97a5
SHA51221d84f8fb1cc2c3abda0452704f45e3c79092b33e7bb3a5fdc3973cacc53014681ba7977df60818f0375353fdac4e58977048c4db275c1c689f6ed4aef2a3496
-
Filesize
579KB
MD5def8c81af6b9eca2309b735bff710aaf
SHA17b1e9bda9d2cf0f6e626f5d8eb186280edbaf20c
SHA256babda4e7c14e753ce01212ad1efa9d2718d1edaaec3d11e6d2676689645a3171
SHA51264bb4ae41507a5d0a6657caec00ead3ad964e5ae969b04eda5ea933a4215621f6c2e5af9f21df2ddd33636b1af1116b00634e5831723430cf80bab2aa9d9b01c
-
Filesize
579KB
MD5def8c81af6b9eca2309b735bff710aaf
SHA17b1e9bda9d2cf0f6e626f5d8eb186280edbaf20c
SHA256babda4e7c14e753ce01212ad1efa9d2718d1edaaec3d11e6d2676689645a3171
SHA51264bb4ae41507a5d0a6657caec00ead3ad964e5ae969b04eda5ea933a4215621f6c2e5af9f21df2ddd33636b1af1116b00634e5831723430cf80bab2aa9d9b01c
-
Filesize
96KB
MD5c0fcd3962beeda650319f1e24ead7708
SHA15cfd0ad4007a5b844ea7ff24da2ae0c6361d0d77
SHA2567b55a4755bbf2d6d2b09f16781e7639a879d6cd81c4269f62c3201581f592c54
SHA512fd3ca25b6376f80d4edae158a4eccaa99ad92194756f78c84f1b9a28183d64996a607474ee3c0f902f3e5e1016bf81cd7192703070074e7d76f34fb8e8ada1c6
-
Filesize
54KB
MD581e6744d784e944665869cb2e6bb2b2e
SHA1b2c80810dcfcd32a80a7575238882a5bf084657d
SHA25623bbfe315125a2b4b89219e851d8e9513788c2700a1a3b574abc79fc81c0ac57
SHA51205d4bff56cdb118c080632f01e0c00c8930148be39021c011738d9e1d1a602b87965070c56ade94d3bb94958bbff1fa678ff6c4c31f7745e3194a96a7f0753b5
-
Filesize
31KB
MD59f7acaad365af0d1a3cd9261e3208b9b
SHA1b4c7049562e770093e707ac1329cb37ad6313a37
SHA256f7b0a444b590eb8a6b46cedf544bcb3117c85cab02b599b45d61b8a590095c9c
SHA5126847bb10cf08f7e594907b5d160768e60468b14a62cdd87ad33dcc0bc2b523549c1c91e9854069ca11ee074e43a6f41f11351201626922c02aaea41fd32c2a54
-
Filesize
31KB
MD59f7acaad365af0d1a3cd9261e3208b9b
SHA1b4c7049562e770093e707ac1329cb37ad6313a37
SHA256f7b0a444b590eb8a6b46cedf544bcb3117c85cab02b599b45d61b8a590095c9c
SHA5126847bb10cf08f7e594907b5d160768e60468b14a62cdd87ad33dcc0bc2b523549c1c91e9854069ca11ee074e43a6f41f11351201626922c02aaea41fd32c2a54
-
Filesize
5KB
MD5e09aa9787af5cc53fd7525dd6693cf10
SHA157445d0779a66c61741822c0a7988573efee13d7
SHA256c7f023fc4c85680f5c334fef09155e81861634108140a5716a1395dd7cd62266
SHA512b71a8c0939d545afa173f107f99314848c6104928b77d6f39d6e4486ca2b65797cecff0f877160edf6ca1d21dca95b7f1be53221811c945f7c4be6e77a4d1f8c
-
Filesize
2KB
MD5c1448370682f97b6759fd67f440f8a06
SHA1d27b17e9cc27ae2b8067ef56cfdc4292ab766be4
SHA256ebf1649eadda1f0da52426bbb25259cbc89000d88e32edc695675cd74f29d994
SHA512110bf82f63e3e0d98d2bbb560528bd66228a326fb17acdcacfed8d6475ba744982c96b607b24a324a0ea49c5d2f4357b39e2a70e62d27a5df06e638c4c79c402
-
Filesize
54KB
MD581e6744d784e944665869cb2e6bb2b2e
SHA1b2c80810dcfcd32a80a7575238882a5bf084657d
SHA25623bbfe315125a2b4b89219e851d8e9513788c2700a1a3b574abc79fc81c0ac57
SHA51205d4bff56cdb118c080632f01e0c00c8930148be39021c011738d9e1d1a602b87965070c56ade94d3bb94958bbff1fa678ff6c4c31f7745e3194a96a7f0753b5
-
Filesize
80B
MD53d3a70af91132f9ff90a2061287ba6b9
SHA143976df5f88967e193751b27d569c113cbf9ffce
SHA2565509c55903dc9cf88faa4a1fa5996f7c5855de0b48c22dc6e9a09ef647f034c2
SHA512987c558f3b18793ddc9695307f1fb693624b1ffd8598d3b6c932d6b3c155da5d76ba1c4b52c3544cf6330ea1a32fdd4185dd484c7f84f43bbe618abdfec31ce4
-
Filesize
9KB
MD50c1bd1b89a838df7c53c8b1308e004a3
SHA14c1d5729d75066b788ee99d0a28bf8385a349099
SHA256209929060f32ed229bb30897ebced22f8ef615fc603caf57086b4a93b7ce2f35
SHA512a1681297ee92c4d9445b910fd117d02cfafd6f7a8f1ef3cecb8030ba9babcb143acda01c45b35c4641242633daf232c52a18f5ebec592f387ea6b5a2b2165f0b
-
Filesize
1KB
MD5af1a64313634b37ff3b1ed370ce26e24
SHA11476aa12e363070a6278226ac46b3d94b5522848
SHA256c053af0fe69090a7e25a8172f6af80fd7a0ee4e826073c8749f0ce8e820d9ad7
SHA5121bff18ba6c529af4ad3c71c7f8d5c4f3513c89c061ba64abbc17d7ff9ee330774fc0e953c18998fff93bd865cbbbf7e4a569ac3d5f0c2c732c7a03c849a7b22e
-
Filesize
146KB
MD58ecf1b30f5fbb12a2fe138364d351a26
SHA1ff0b828a9df228cf05898d6db9982a1fedbc0584
SHA25622a51f140a738f69da01c21ab6fcf9a5ec653da1e4a73ad107e1a0faffba16fb
SHA5121971ea29934fb3c09c53d41db23616f2d3b89bba81db51ce7f09840489f0d471dd8bfe5b09d335020f11047af744c4c4c5ab3d896f9b8d222b6b93c419201560
-
Filesize
146KB
MD58ecf1b30f5fbb12a2fe138364d351a26
SHA1ff0b828a9df228cf05898d6db9982a1fedbc0584
SHA25622a51f140a738f69da01c21ab6fcf9a5ec653da1e4a73ad107e1a0faffba16fb
SHA5121971ea29934fb3c09c53d41db23616f2d3b89bba81db51ce7f09840489f0d471dd8bfe5b09d335020f11047af744c4c4c5ab3d896f9b8d222b6b93c419201560
-
Filesize
8KB
MD54635935fc972c582632bf45c26bfcb0e
SHA17c5329229042535fe56e74f1f246c6da8cea3be8
SHA256abd4afd71b3c2bd3f741bbe3cec52c4fa63ac78d353101d2e7dc4de2725d1ca1
SHA512167503133b5a0ebd9f8b2971bca120e902497eb21542d6a1f94e52ae8e5b6bde1e4cae1a2c905870a00d772e0df35f808701e2cfbd26dcbb130a5573fa590060
-
Filesize
8KB
MD54635935fc972c582632bf45c26bfcb0e
SHA17c5329229042535fe56e74f1f246c6da8cea3be8
SHA256abd4afd71b3c2bd3f741bbe3cec52c4fa63ac78d353101d2e7dc4de2725d1ca1
SHA512167503133b5a0ebd9f8b2971bca120e902497eb21542d6a1f94e52ae8e5b6bde1e4cae1a2c905870a00d772e0df35f808701e2cfbd26dcbb130a5573fa590060
-
Filesize
283B
MD5e7d7a4d5ddbb0502973e9e72bdea0d0c
SHA1a1a134b74d786e54faacd899d6ee34446b5662ff
SHA2566ef8d737e8dc6f761b10d5ae2120c5dcf6774ad4ffb2b11c33e27125aa915d6e
SHA5128e1bd2f0970e551fb55ff69765feaae05585b5456ab3e2c19ca984b54f927976c163b41cc5878e1997a67e15800460d595a5a01b46270fa61673370f422c02b1
-
Filesize
220B
MD5df6887d17e2c9912e637347ec7ca20b5
SHA1dfcd2ad7429ac5ad537e6b7d10004cd7c9168066
SHA256f331858ea0c53b1a2b1fa301f5e74dddc7888dd874bd3968007dae4e4808d39c
SHA512b79559945d4ca0d78fb12ff15d397e4bbd4e0bae6eba96721bffc246b3c423e5cd2bd1aacaeed12f5740e111cd8dafcef9c97a497022da0deff44770464e885f