Analysis
-
max time kernel
141s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 16:38
Static task
static1
Behavioral task
behavioral1
Sample
6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe
Resource
win10v2004-20220812-en
General
-
Target
6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe
-
Size
152KB
-
MD5
ec66689ac5a42348c179ff024d12fbbd
-
SHA1
629e0634cad31a76ecb926020a16e5b870410243
-
SHA256
6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6
-
SHA512
2586868b90eb7082e0813c6f04853e2e833d7bcaa0f4e2a82294f287d3d484b5a95a77de328b4bb30868254a8c3129259be31e9452daf1ae22d33392ceee3b25
-
SSDEEP
3072:QTqbAhrG9obJ6MEaviHQDIR+QsKvi5gndT5ql:iRGIvcZ+QsK65gnd
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe -
Loads dropped DLL 5 IoCs
pid Process 364 6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe 3048 WerFault.exe 848 WerFault.exe 3392 WerFault.exe 2176 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 848 364 WerFault.exe 79 2176 364 WerFault.exe 79 -
Runs .reg file with regedit 1 IoCs
pid Process 3636 regedit.exe -
Suspicious behavior: EnumeratesProcesses 54 IoCs
pid Process 364 6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe 364 6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe 364 6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe 364 6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe 364 6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe 364 6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe 364 6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe 364 6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe 364 6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe 364 6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe 364 6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe 364 6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe 364 6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe 364 6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe 364 6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe 364 6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe 364 6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe 364 6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe 364 6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe 364 6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe 364 6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe 364 6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe 364 6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe 364 6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe 364 6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe 364 6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe 364 6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe 364 6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe 364 6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe 364 6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe 364 6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe 364 6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe 364 6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe 364 6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe 364 6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe 364 6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe 364 6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe 364 6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe 364 6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe 364 6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe 364 6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe 364 6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe 364 6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe 364 6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe 364 6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe 364 6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe 364 6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe 364 6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe 364 6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe 364 6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe 364 6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe 364 6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe 364 6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe 364 6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 364 wrote to memory of 220 364 6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe 80 PID 364 wrote to memory of 220 364 6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe 80 PID 364 wrote to memory of 220 364 6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe 80 PID 220 wrote to memory of 3636 220 regedt32.exe 81 PID 220 wrote to memory of 3636 220 regedt32.exe 81 PID 220 wrote to memory of 3636 220 regedt32.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe"C:\Users\Admin\AppData\Local\Temp\6b2123edf515bacf86af54f2a8c4fe502225c5de5c7999019509766c76a3b1a6.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Windows\SysWOW64\regedt32.exe"C:\Windows\System32\regedt32.exe" /s "C:\Users\Admin\Documents\Iterra\T03emp03.reg"2⤵
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\SysWOW64\regedit.exe"C:\Windows\regedit.exe" /s "C:\Users\Admin\Documents\Iterra\T03emp03.reg"3⤵
- Runs .reg file with regedit
PID:3636
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 364 -s 12522⤵
- Loads dropped DLL
- Program crash
PID:848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 364 -s 10122⤵
- Loads dropped DLL
- Program crash
PID:2176
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 364 -ip 3641⤵
- Loads dropped DLL
PID:3048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 364 -ip 3641⤵
- Loads dropped DLL
PID:3392
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
217B
MD5990914e119c0ccec13f271fc94b9b010
SHA15cb582600610865d569d77ed67f3ca02b5bac736
SHA2562cb5b11afb2451eaf91ff4575e8c0bff4fbf881fbe0ae0eb6f6752ccb0b5a250
SHA51242a0edfcb77802a864cf9c49992d7b54b6ccf05a86310a7c473c6b95b39d00871f9f62f49e754d4bb3d5959a173a0929bfea25fea726fae8d041bcdb3c2d0d79
-
Filesize
42KB
MD539c4f5c81741cde4bb2ec25f10c59519
SHA143342091753a2f7ad3b3c733faba2c692197989d
SHA2567c1eafe2a561d1db817bc43aaaa53c1164f4ac88e5b542e8d44f606ac2ea3115
SHA51227bb09103df3ca29844de1bc981d901f49a26532e4a6b5e3e267fdaf4e00a56a152175370f2f69b4d7eba7ecf441dffe06eedcf572f23ad27852583636c72f45
-
Filesize
42KB
MD539c4f5c81741cde4bb2ec25f10c59519
SHA143342091753a2f7ad3b3c733faba2c692197989d
SHA2567c1eafe2a561d1db817bc43aaaa53c1164f4ac88e5b542e8d44f606ac2ea3115
SHA51227bb09103df3ca29844de1bc981d901f49a26532e4a6b5e3e267fdaf4e00a56a152175370f2f69b4d7eba7ecf441dffe06eedcf572f23ad27852583636c72f45
-
Filesize
42KB
MD539c4f5c81741cde4bb2ec25f10c59519
SHA143342091753a2f7ad3b3c733faba2c692197989d
SHA2567c1eafe2a561d1db817bc43aaaa53c1164f4ac88e5b542e8d44f606ac2ea3115
SHA51227bb09103df3ca29844de1bc981d901f49a26532e4a6b5e3e267fdaf4e00a56a152175370f2f69b4d7eba7ecf441dffe06eedcf572f23ad27852583636c72f45
-
Filesize
42KB
MD539c4f5c81741cde4bb2ec25f10c59519
SHA143342091753a2f7ad3b3c733faba2c692197989d
SHA2567c1eafe2a561d1db817bc43aaaa53c1164f4ac88e5b542e8d44f606ac2ea3115
SHA51227bb09103df3ca29844de1bc981d901f49a26532e4a6b5e3e267fdaf4e00a56a152175370f2f69b4d7eba7ecf441dffe06eedcf572f23ad27852583636c72f45
-
Filesize
42KB
MD539c4f5c81741cde4bb2ec25f10c59519
SHA143342091753a2f7ad3b3c733faba2c692197989d
SHA2567c1eafe2a561d1db817bc43aaaa53c1164f4ac88e5b542e8d44f606ac2ea3115
SHA51227bb09103df3ca29844de1bc981d901f49a26532e4a6b5e3e267fdaf4e00a56a152175370f2f69b4d7eba7ecf441dffe06eedcf572f23ad27852583636c72f45