Analysis
-
max time kernel
217s -
max time network
233s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2022 12:24
Behavioral task
behavioral1
Sample
b91a9aff36f6e8d2c78d1fc2c3fa742d174d56f56e282f04468c90538f54b840.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b91a9aff36f6e8d2c78d1fc2c3fa742d174d56f56e282f04468c90538f54b840.exe
Resource
win10v2004-20221111-en
General
-
Target
b91a9aff36f6e8d2c78d1fc2c3fa742d174d56f56e282f04468c90538f54b840.exe
-
Size
880KB
-
MD5
558fb4e70e56f0b4508138c83193f3b1
-
SHA1
2a060a5bc069f368d25c4108bab51fa0041457f4
-
SHA256
b91a9aff36f6e8d2c78d1fc2c3fa742d174d56f56e282f04468c90538f54b840
-
SHA512
f2c614fe5c8de95a07ddf3e657565310dcc1411f08656739612e9a809bcb9ab7c039dc894c4d2b084defbfb7a49c4f7f2afb15ba08453c926b22a624d7e73b34
-
SSDEEP
12288:nsaY8rzBtQmJa6IurrRDbT3OqiXLQu7N55FoUgUo+GfYB2zsRVrXxHXhRhZvqpHt:B/rzDfjIurrROqiXtAUum2g3Ju78Okt6
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
ÅÜÅÜÐý·ç 6.8.exeľÂí.exeľÂí.exepid process 3084 ÅÜÅÜÐý·ç 6.8.exe 3896 ľÂí.exe 4308 ľÂí.exe -
Processes:
resource yara_rule behavioral2/memory/1436-132-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/1436-133-0x0000000000400000-0x000000000041C000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\Temp\ÅÜÅÜÐý·ç 6.8.exe upx C:\Users\Admin\AppData\Local\Temp\Temp\ÅÜÅÜÐý·ç 6.8.exe upx behavioral2/memory/3084-137-0x0000000000400000-0x000000000059C000-memory.dmp upx behavioral2/memory/1436-141-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/3084-149-0x0000000000400000-0x000000000059C000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
b91a9aff36f6e8d2c78d1fc2c3fa742d174d56f56e282f04468c90538f54b840.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation b91a9aff36f6e8d2c78d1fc2c3fa742d174d56f56e282f04468c90538f54b840.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
ľÂí.exedescription pid process target process PID 3896 set thread context of 4308 3896 ľÂí.exe ľÂí.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1108 4308 WerFault.exe ľÂí.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
Processes:
ÅÜÅÜÐý·ç 6.8.exedescription pid process Token: 1 3084 ÅÜÅÜÐý·ç 6.8.exe Token: SeCreateTokenPrivilege 3084 ÅÜÅÜÐý·ç 6.8.exe Token: SeAssignPrimaryTokenPrivilege 3084 ÅÜÅÜÐý·ç 6.8.exe Token: SeLockMemoryPrivilege 3084 ÅÜÅÜÐý·ç 6.8.exe Token: SeIncreaseQuotaPrivilege 3084 ÅÜÅÜÐý·ç 6.8.exe Token: SeMachineAccountPrivilege 3084 ÅÜÅÜÐý·ç 6.8.exe Token: SeTcbPrivilege 3084 ÅÜÅÜÐý·ç 6.8.exe Token: SeSecurityPrivilege 3084 ÅÜÅÜÐý·ç 6.8.exe Token: SeTakeOwnershipPrivilege 3084 ÅÜÅÜÐý·ç 6.8.exe Token: SeLoadDriverPrivilege 3084 ÅÜÅÜÐý·ç 6.8.exe Token: SeSystemProfilePrivilege 3084 ÅÜÅÜÐý·ç 6.8.exe Token: SeSystemtimePrivilege 3084 ÅÜÅÜÐý·ç 6.8.exe Token: SeProfSingleProcessPrivilege 3084 ÅÜÅÜÐý·ç 6.8.exe Token: SeIncBasePriorityPrivilege 3084 ÅÜÅÜÐý·ç 6.8.exe Token: SeCreatePagefilePrivilege 3084 ÅÜÅÜÐý·ç 6.8.exe Token: SeCreatePermanentPrivilege 3084 ÅÜÅÜÐý·ç 6.8.exe Token: SeBackupPrivilege 3084 ÅÜÅÜÐý·ç 6.8.exe Token: SeRestorePrivilege 3084 ÅÜÅÜÐý·ç 6.8.exe Token: SeShutdownPrivilege 3084 ÅÜÅÜÐý·ç 6.8.exe Token: SeDebugPrivilege 3084 ÅÜÅÜÐý·ç 6.8.exe Token: SeAuditPrivilege 3084 ÅÜÅÜÐý·ç 6.8.exe Token: SeSystemEnvironmentPrivilege 3084 ÅÜÅÜÐý·ç 6.8.exe Token: SeChangeNotifyPrivilege 3084 ÅÜÅÜÐý·ç 6.8.exe Token: SeRemoteShutdownPrivilege 3084 ÅÜÅÜÐý·ç 6.8.exe Token: SeUndockPrivilege 3084 ÅÜÅÜÐý·ç 6.8.exe Token: SeSyncAgentPrivilege 3084 ÅÜÅÜÐý·ç 6.8.exe Token: SeEnableDelegationPrivilege 3084 ÅÜÅÜÐý·ç 6.8.exe Token: SeManageVolumePrivilege 3084 ÅÜÅÜÐý·ç 6.8.exe Token: SeImpersonatePrivilege 3084 ÅÜÅÜÐý·ç 6.8.exe Token: SeCreateGlobalPrivilege 3084 ÅÜÅÜÐý·ç 6.8.exe Token: 31 3084 ÅÜÅÜÐý·ç 6.8.exe Token: 32 3084 ÅÜÅÜÐý·ç 6.8.exe Token: 33 3084 ÅÜÅÜÐý·ç 6.8.exe Token: 34 3084 ÅÜÅÜÐý·ç 6.8.exe Token: 35 3084 ÅÜÅÜÐý·ç 6.8.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
ÅÜÅÜÐý·ç 6.8.exepid process 3084 ÅÜÅÜÐý·ç 6.8.exe 3084 ÅÜÅÜÐý·ç 6.8.exe 3084 ÅÜÅÜÐý·ç 6.8.exe 3084 ÅÜÅÜÐý·ç 6.8.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
b91a9aff36f6e8d2c78d1fc2c3fa742d174d56f56e282f04468c90538f54b840.exeľÂí.exedescription pid process target process PID 1436 wrote to memory of 3084 1436 b91a9aff36f6e8d2c78d1fc2c3fa742d174d56f56e282f04468c90538f54b840.exe ÅÜÅÜÐý·ç 6.8.exe PID 1436 wrote to memory of 3084 1436 b91a9aff36f6e8d2c78d1fc2c3fa742d174d56f56e282f04468c90538f54b840.exe ÅÜÅÜÐý·ç 6.8.exe PID 1436 wrote to memory of 3084 1436 b91a9aff36f6e8d2c78d1fc2c3fa742d174d56f56e282f04468c90538f54b840.exe ÅÜÅÜÐý·ç 6.8.exe PID 1436 wrote to memory of 3896 1436 b91a9aff36f6e8d2c78d1fc2c3fa742d174d56f56e282f04468c90538f54b840.exe ľÂí.exe PID 1436 wrote to memory of 3896 1436 b91a9aff36f6e8d2c78d1fc2c3fa742d174d56f56e282f04468c90538f54b840.exe ľÂí.exe PID 1436 wrote to memory of 3896 1436 b91a9aff36f6e8d2c78d1fc2c3fa742d174d56f56e282f04468c90538f54b840.exe ľÂí.exe PID 3896 wrote to memory of 4308 3896 ľÂí.exe ľÂí.exe PID 3896 wrote to memory of 4308 3896 ľÂí.exe ľÂí.exe PID 3896 wrote to memory of 4308 3896 ľÂí.exe ľÂí.exe PID 3896 wrote to memory of 4308 3896 ľÂí.exe ľÂí.exe PID 3896 wrote to memory of 4308 3896 ľÂí.exe ľÂí.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b91a9aff36f6e8d2c78d1fc2c3fa742d174d56f56e282f04468c90538f54b840.exe"C:\Users\Admin\AppData\Local\Temp\b91a9aff36f6e8d2c78d1fc2c3fa742d174d56f56e282f04468c90538f54b840.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Temp\ÅÜÅÜÐý·ç 6.8.exe"C:\Users\Admin\AppData\Local\Temp\Temp\ÅÜÅÜÐý·ç 6.8.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\Temp\ľÂí.exe"C:\Users\Admin\AppData\Local\Temp\Temp\ľÂí.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Temp\ľÂí.exeC:\Users\Admin\AppData\Local\Temp\Temp\ľÂí.exe3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4308 -s 804⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4308 -ip 43081⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Temp\ľÂí.exeFilesize
5.8MB
MD5eaaa7d585fe518826886961768b03d25
SHA1ffbb1af5deab0b416d2d8db1f2f18ac0c1093b7a
SHA256e3f3c0bf1db79593daf1d579ba95fb2f655e59c889d233e742c2c23e7b7a71db
SHA5128e3c1bf285d98eb3718402df3467332055713e0d2de5c3748bcae78815e72657d2c143148a22ac722ee26831740981acc2515f6d2da2e0f4d982ff29fa1bcf2a
-
C:\Users\Admin\AppData\Local\Temp\Temp\ľÂí.exeFilesize
5.8MB
MD5eaaa7d585fe518826886961768b03d25
SHA1ffbb1af5deab0b416d2d8db1f2f18ac0c1093b7a
SHA256e3f3c0bf1db79593daf1d579ba95fb2f655e59c889d233e742c2c23e7b7a71db
SHA5128e3c1bf285d98eb3718402df3467332055713e0d2de5c3748bcae78815e72657d2c143148a22ac722ee26831740981acc2515f6d2da2e0f4d982ff29fa1bcf2a
-
C:\Users\Admin\AppData\Local\Temp\Temp\ľÂí.exeFilesize
5.8MB
MD5eaaa7d585fe518826886961768b03d25
SHA1ffbb1af5deab0b416d2d8db1f2f18ac0c1093b7a
SHA256e3f3c0bf1db79593daf1d579ba95fb2f655e59c889d233e742c2c23e7b7a71db
SHA5128e3c1bf285d98eb3718402df3467332055713e0d2de5c3748bcae78815e72657d2c143148a22ac722ee26831740981acc2515f6d2da2e0f4d982ff29fa1bcf2a
-
C:\Users\Admin\AppData\Local\Temp\Temp\ÅÜÅÜÐý·ç 6.8.exeFilesize
767KB
MD5c3c4d07e961e8c81049da6e8bd344f3c
SHA13dddadc9dfeaf977b1ca1d8f2756ad5873b80fd3
SHA2560abbad458fcc22f9c5c3e7a41c8fdc6680733b71bb898b9654f8a186acf96b45
SHA51290d0d31c13723b5819c38124dc1bce45bf719de38e0b19a59aff318072a956b5fd8ee8ed4494e7f20baee4b25ebe69d9cd75e134beb030de5c74face4947ad4e
-
C:\Users\Admin\AppData\Local\Temp\Temp\ÅÜÅÜÐý·ç 6.8.exeFilesize
767KB
MD5c3c4d07e961e8c81049da6e8bd344f3c
SHA13dddadc9dfeaf977b1ca1d8f2756ad5873b80fd3
SHA2560abbad458fcc22f9c5c3e7a41c8fdc6680733b71bb898b9654f8a186acf96b45
SHA51290d0d31c13723b5819c38124dc1bce45bf719de38e0b19a59aff318072a956b5fd8ee8ed4494e7f20baee4b25ebe69d9cd75e134beb030de5c74face4947ad4e
-
memory/1436-141-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/1436-132-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/1436-133-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/3084-137-0x0000000000400000-0x000000000059C000-memory.dmpFilesize
1.6MB
-
memory/3084-134-0x0000000000000000-mapping.dmp
-
memory/3084-149-0x0000000000400000-0x000000000059C000-memory.dmpFilesize
1.6MB
-
memory/3896-138-0x0000000000000000-mapping.dmp
-
memory/3896-142-0x0000000000EE0000-0x0000000000EF8000-memory.dmpFilesize
96KB
-
memory/3896-147-0x0000000000EE0000-0x0000000000EF8000-memory.dmpFilesize
96KB
-
memory/4308-143-0x0000000000000000-mapping.dmp
-
memory/4308-144-0x000000000001B000-0x000000000002A000-memory.dmpFilesize
60KB
-
memory/4308-145-0x000000000001B000-0x0000000000022382-memory.dmpFilesize
28KB
-
memory/4308-148-0x0000000000EE0000-0x0000000000EF8000-memory.dmpFilesize
96KB