Analysis

  • max time kernel
    152s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-12-2022 22:25

General

  • Target

    bee6cd2ae7802f88b3681ca54e888a2f242bfa44cb85848473eb31beabe051d7.exe

  • Size

    129KB

  • MD5

    58e764f7fa9066c9eec521fa7db92f57

  • SHA1

    13578991b07b0e53de52431fb75eb99350e67f66

  • SHA256

    bee6cd2ae7802f88b3681ca54e888a2f242bfa44cb85848473eb31beabe051d7

  • SHA512

    63d4b1ecac68603602ffd9d8126b721bf5defb6177abaa828a54d99ec585e3a827652293f160a1127e1b18c5d91c6808f4e584bc02e050fb5e36049e1e95faab

  • SSDEEP

    3072:jy4BK0IpOCTmMaenUY6N2VDGqoih77y7egP:e4DIpOCTmMaenG2VyqZh72B

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 46 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bee6cd2ae7802f88b3681ca54e888a2f242bfa44cb85848473eb31beabe051d7.exe
    "C:\Users\Admin\AppData\Local\Temp\bee6cd2ae7802f88b3681ca54e888a2f242bfa44cb85848473eb31beabe051d7.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1676
    • C:\Program Files (x86)\snss.exe
      "C:\Program Files (x86)\snss.exe"
      2⤵
      • Executes dropped EXE
      • Drops startup file
      • Drops file in System32 directory
      • Suspicious use of SetWindowsHookEx
      PID:4928
    • C:\Windows\SysWOW64\Regsvr32.exe
      Regsvr32.exe /s "C:\Windows\system32\Thunder.dll"
      2⤵
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      PID:4560
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\123.bat" "
      2⤵
        PID:5000

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\snss.exe

      Filesize

      41KB

      MD5

      4adf885cadefc467ae0a80d22ac39dde

      SHA1

      db68bda85b74c4481a0b2a8ca3caec537113b592

      SHA256

      357584d6d05f000bfc50842ebe43c73ad01c8e0d3089276157f284d2b6ed7b7f

      SHA512

      c69845030c8a74766ed29feadd849ea3bbdadf02c11b8e8304f751c01caf793ebbbf941dde155f38656c9c0c68d5209e1a88a6ea64855bf54e98d103b5eadf31

    • C:\Program Files (x86)\snss.exe

      Filesize

      41KB

      MD5

      4adf885cadefc467ae0a80d22ac39dde

      SHA1

      db68bda85b74c4481a0b2a8ca3caec537113b592

      SHA256

      357584d6d05f000bfc50842ebe43c73ad01c8e0d3089276157f284d2b6ed7b7f

      SHA512

      c69845030c8a74766ed29feadd849ea3bbdadf02c11b8e8304f751c01caf793ebbbf941dde155f38656c9c0c68d5209e1a88a6ea64855bf54e98d103b5eadf31

    • C:\Users\Admin\AppData\Local\Temp\123.bat

      Filesize

      318B

      MD5

      9099f156b19fd71eb3a6bea77c6713a8

      SHA1

      76b92f334b8f705bba2fc1114af4fbbf482c6799

      SHA256

      36868901aa90602f8517b10fc5f97b625b06c11226ebe62e4464d7cb81f09808

      SHA512

      8156fecb7ab380dcc3fb087ee9222df532020e9e824fa2dfd937098bae1b337dc60da5dba7c3330918c1efa2c8af66e73be6e46a32452bbf4c903ffbdcccc5d2

    • C:\Windows\SysWOW64\Thunder.dll

      Filesize

      32KB

      MD5

      a7caa79b09af67825cb17c5fb55d928e

      SHA1

      21ca5640c0c655f67839a7e78c2475fabd5f5ac4

      SHA256

      4edfb01c890866133f6f8f21d5a0eee4a290f9853e83b719bc8b506fcc7b5c07

      SHA512

      08aabcc3571ae8eaaede340e857f5597026c93e381abeb85d59835359876af88a9490d8e337e4243ea24a58bc4940797c0fec35c974fda9dbc40ce549e02884c

    • C:\Windows\SysWOW64\Thunder.dll

      Filesize

      32KB

      MD5

      a7caa79b09af67825cb17c5fb55d928e

      SHA1

      21ca5640c0c655f67839a7e78c2475fabd5f5ac4

      SHA256

      4edfb01c890866133f6f8f21d5a0eee4a290f9853e83b719bc8b506fcc7b5c07

      SHA512

      08aabcc3571ae8eaaede340e857f5597026c93e381abeb85d59835359876af88a9490d8e337e4243ea24a58bc4940797c0fec35c974fda9dbc40ce549e02884c

    • C:\Windows\SysWOW64\sysini.ini

      Filesize

      1KB

      MD5

      f29f9b2e040a39c3898c6f834ff38ccc

      SHA1

      2b188cd05813587d53fab5db47ae4d2e1a126008

      SHA256

      333582423f8f0c2bc8a22116e6805b3ab667c0ba3055138edc359408a097b012

      SHA512

      ef45f4c1a00598f30ad233a25dbbf478430ee70ca1a9d6e2f35435bc5c006fa70855ef68ec0f06dd0791f8987a7af157d759bc4d2a2705d5b4aed3958c02d9c7

    • memory/4560-140-0x0000000000000000-mapping.dmp

    • memory/4928-134-0x0000000000000000-mapping.dmp

    • memory/5000-143-0x0000000000000000-mapping.dmp