Analysis
-
max time kernel
91s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
02/12/2022, 02:04
Static task
static1
Behavioral task
behavioral1
Sample
d3ce203195779bd413916f0e93ac0e44ba8b3822128dc2add9cf1427b5d6abb2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d3ce203195779bd413916f0e93ac0e44ba8b3822128dc2add9cf1427b5d6abb2.exe
Resource
win10v2004-20220901-en
General
-
Target
d3ce203195779bd413916f0e93ac0e44ba8b3822128dc2add9cf1427b5d6abb2.exe
-
Size
179KB
-
MD5
ca3ef69e153ad4502fb2a1afc1bb6e09
-
SHA1
3fcff210264e750b093df112d88c645fd8ec9c1c
-
SHA256
d3ce203195779bd413916f0e93ac0e44ba8b3822128dc2add9cf1427b5d6abb2
-
SHA512
1ed6a3e93d2844eea2274eccb701600360315c9833573fb2f48c5013344a0611ce81d1bf26f7e498f8d02a195e4c25db6fce9bc8a2bd53a408946f4f24030766
-
SSDEEP
3072:8BAp5XhKpN4eOyVTGfhEClj8jTk+0hxNWN6ovFhxRg:rbXE9OiTGfhEClq9CNWN6ovFhxRg
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 10 4864 WScript.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\System32\drivers\etc\hosts WScript.exe File opened for modification C:\Windows\System32\drivers\etc\hîsts WScript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation d3ce203195779bd413916f0e93ac0e44ba8b3822128dc2add9cf1427b5d6abb2.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\LUSK\PSja\_ska_dver.bat d3ce203195779bd413916f0e93ac0e44ba8b3822128dc2add9cf1427b5d6abb2.exe File opened for modification C:\Program Files (x86)\LUSK\PSja\nam_n13ada_krasit.vbs d3ce203195779bd413916f0e93ac0e44ba8b3822128dc2add9cf1427b5d6abb2.exe File opened for modification C:\Program Files (x86)\LUSK\PSja\i1_rihtovat1_bleat.vbs d3ce203195779bd413916f0e93ac0e44ba8b3822128dc2add9cf1427b5d6abb2.exe File opened for modification C:\Program Files (x86)\LUSK\PSja\sensemilia.txt d3ce203195779bd413916f0e93ac0e44ba8b3822128dc2add9cf1427b5d6abb2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings d3ce203195779bd413916f0e93ac0e44ba8b3822128dc2add9cf1427b5d6abb2.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4948 wrote to memory of 2820 4948 d3ce203195779bd413916f0e93ac0e44ba8b3822128dc2add9cf1427b5d6abb2.exe 81 PID 4948 wrote to memory of 2820 4948 d3ce203195779bd413916f0e93ac0e44ba8b3822128dc2add9cf1427b5d6abb2.exe 81 PID 4948 wrote to memory of 2820 4948 d3ce203195779bd413916f0e93ac0e44ba8b3822128dc2add9cf1427b5d6abb2.exe 81 PID 4948 wrote to memory of 4864 4948 d3ce203195779bd413916f0e93ac0e44ba8b3822128dc2add9cf1427b5d6abb2.exe 83 PID 4948 wrote to memory of 4864 4948 d3ce203195779bd413916f0e93ac0e44ba8b3822128dc2add9cf1427b5d6abb2.exe 83 PID 4948 wrote to memory of 4864 4948 d3ce203195779bd413916f0e93ac0e44ba8b3822128dc2add9cf1427b5d6abb2.exe 83 PID 4948 wrote to memory of 2292 4948 d3ce203195779bd413916f0e93ac0e44ba8b3822128dc2add9cf1427b5d6abb2.exe 84 PID 4948 wrote to memory of 2292 4948 d3ce203195779bd413916f0e93ac0e44ba8b3822128dc2add9cf1427b5d6abb2.exe 84 PID 4948 wrote to memory of 2292 4948 d3ce203195779bd413916f0e93ac0e44ba8b3822128dc2add9cf1427b5d6abb2.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3ce203195779bd413916f0e93ac0e44ba8b3822128dc2add9cf1427b5d6abb2.exe"C:\Users\Admin\AppData\Local\Temp\d3ce203195779bd413916f0e93ac0e44ba8b3822128dc2add9cf1427b5d6abb2.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\LUSK\PSja\_ska_dver.bat" "2⤵
- Drops file in Drivers directory
PID:2820
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\LUSK\PSja\nam_n13ada_krasit.vbs"2⤵
- Blocklisted process makes network request
PID:4864
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\LUSK\PSja\i1_rihtovat1_bleat.vbs"2⤵
- Drops file in Drivers directory
PID:2292
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5c1f6c44847edcd62a5190c6659b39ef7
SHA1dc7e957b72921851ca09fe144b4df34bc538e0a7
SHA256947ba2d1b5d055917bc91bcaf2fd1964379dbbeeea18143b1f531d862fc837d3
SHA51261f756b36e5cb434d5453416d98eeec3c13384e3955d3c0135a13a5b8eabf48dc69ebafa0a94a6ef333ef107b7bf74aa6f9f21148d99fa7f376ac155f74aa358
-
Filesize
568B
MD5f7a84054718f7ba4630c2fbd408bbc97
SHA12e4b68f91e43c3a72c78d053a51e54196be34964
SHA256c669f4a228b56e00a55a3d9abcf9651476bb9338174dd9a241fa0640a7ba96bc
SHA5121c752294f03ba57a9e748f7053ab59290c48289b067256944354eb9165a4366b4f2eefe5c4984d3a35f1fb615a8694162b843d24091fc5296bd3792f6c6f6ba1
-
Filesize
366B
MD5fcbe28bcd4521049b15afabc442975f3
SHA1749536bd45880b67eb73b550ba40f452758a8c46
SHA2566a922166c1044819f9611784470ef639ad115b5d600036f18cf1df06f6fc2716
SHA51285ad40d9a5af38f13248218aa3239f9cbaedd75045104a8418a34716878a91d1267db63f4ae4e2532ba5a94578f26549b68b7257a7102fd237c4178a65e9c0ea
-
Filesize
44B
MD5c6c69b6255f1e93532b6a50f0a83ce0a
SHA1508e1a7ce422ce5c3251ea5262ffbd8db050fbcd
SHA2569d9a25ab7f7a5210b53043ffc1ef083282c64f6276463988b4adfd076bb43af5
SHA512f810a9f7263c27146603abd8773462178a612f7af521bacddde7d6f735882c785de5de197bac2ee35139877e2a737324830f4d2b79b1377628707ef34aac2187
-
Filesize
995B
MD551139c8a7ce82026c7e3571dbfa32470
SHA18fa53a23c28652f4fa6f8dc9a22718795ae8db07
SHA25615f683c28cf7dddcf6b3fe80c7a896038d4fc52fb709781098b8c594de1d9905
SHA512c415397890acb02151ffd3e48648118bc7e80db775e4e857f7cf184ec8c7ae99266004d606fbc420208ec7b35531a5b34a080f01668e80315c5cf5887f24ba23