Analysis
-
max time kernel
159s -
max time network
178s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/12/2022, 23:13
Static task
static1
Behavioral task
behavioral1
Sample
20bbe829dc628e106797958b422d4ebacd29066b6fd5418930a7e42a57546338.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
20bbe829dc628e106797958b422d4ebacd29066b6fd5418930a7e42a57546338.dll
Resource
win10v2004-20220812-en
General
-
Target
20bbe829dc628e106797958b422d4ebacd29066b6fd5418930a7e42a57546338.dll
-
Size
96KB
-
MD5
fc7aa0c1358943f14607b788b2ea7540
-
SHA1
444ff4c70318d2ed8a5c6a83dd550cf13eac0653
-
SHA256
20bbe829dc628e106797958b422d4ebacd29066b6fd5418930a7e42a57546338
-
SHA512
caf5780636ea62fbbb76fa19429bab488b61590f130fe6607082bdf05a3c569819ccd2c05720208d54f4d5a974fe5b9d767a81a432f3f52ab52a1ac551969d9a
-
SSDEEP
768:EnKl2XOz3sCu+/h29vOYXOhYFtDJOgpg5Rd5WtXhG2yg0rvLp8N:EnKl2oOOYXTFtTCh5Yk2y3jp8N
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4328 instsp2.exe -
resource yara_rule behavioral2/files/0x0006000000022e20-134.dat upx behavioral2/files/0x0006000000022e20-135.dat upx behavioral2/memory/4328-136-0x00000000003E0000-0x000000000040C000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation instsp2.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\instsp2.exe rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4716 rundll32.exe 4716 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4328 instsp2.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2204 wrote to memory of 4716 2204 rundll32.exe 79 PID 2204 wrote to memory of 4716 2204 rundll32.exe 79 PID 2204 wrote to memory of 4716 2204 rundll32.exe 79 PID 4716 wrote to memory of 4328 4716 rundll32.exe 80 PID 4716 wrote to memory of 4328 4716 rundll32.exe 80 PID 4716 wrote to memory of 4328 4716 rundll32.exe 80 PID 4328 wrote to memory of 3704 4328 instsp2.exe 82 PID 4328 wrote to memory of 3704 4328 instsp2.exe 82 PID 4328 wrote to memory of 3704 4328 instsp2.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\20bbe829dc628e106797958b422d4ebacd29066b6fd5418930a7e42a57546338.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\20bbe829dc628e106797958b422d4ebacd29066b6fd5418930a7e42a57546338.dll,#12⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Windows\instsp2.exeC:\Windows\instsp2.exe3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\instsp2.exe > nul4⤵PID:3704
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD5c0a73a33bc9b336e8fa0ea0c9f501b38
SHA1d7dbcd51bd10039303bc993bd582a4bbd29f8904
SHA256fcea9a342f04acae421a4bc59037a8e73b19cc91614ebb08613dfac2f3bc7f14
SHA5126a313be1141f377f15d6765f88f4650fa721982c07f169124a0633fe1c94d4b72e5b66adc9b62d7037f13d8bb54801606f89ae052a6d1e7b6bd6b2674304e859
-
Filesize
9KB
MD5c0a73a33bc9b336e8fa0ea0c9f501b38
SHA1d7dbcd51bd10039303bc993bd582a4bbd29f8904
SHA256fcea9a342f04acae421a4bc59037a8e73b19cc91614ebb08613dfac2f3bc7f14
SHA5126a313be1141f377f15d6765f88f4650fa721982c07f169124a0633fe1c94d4b72e5b66adc9b62d7037f13d8bb54801606f89ae052a6d1e7b6bd6b2674304e859