Analysis
-
max time kernel
150s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02-12-2022 04:14
Static task
static1
Behavioral task
behavioral1
Sample
738814f87c44a9fe2963c3d8a4f335cf12e988a6a46f2437627cb468e3c193df.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
738814f87c44a9fe2963c3d8a4f335cf12e988a6a46f2437627cb468e3c193df.exe
Resource
win10v2004-20220812-en
General
-
Target
738814f87c44a9fe2963c3d8a4f335cf12e988a6a46f2437627cb468e3c193df.exe
-
Size
128KB
-
MD5
e0817495fcad5e019e645c222667d205
-
SHA1
09f723995470a58ba519efc4d6ebcfad466b7d57
-
SHA256
738814f87c44a9fe2963c3d8a4f335cf12e988a6a46f2437627cb468e3c193df
-
SHA512
d5cb26130c38d64e259f6e89590623e074b16f226bec49681e4afd10ed9e6477802953e3f330a3ee020afc8653bef226bb52f010b7ae56c6fc6d25832f52e593
-
SSDEEP
1536:iQvOWIoFEZDjD1ACzG9wWMoHylbbDhn5WLr2S4a3eJ/8Ikfy6A1dAxAWh:bOKWDjD+UyLaPa3eJ/hr6ArAxAw
Malware Config
Extracted
tofsee
103.9.150.14
188.190.120.99
119.1.109.61
188.165.132.183
rgtryhbgddtyh.biz
wertdghbyrukl.ch
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
erwjobuc.exeerwjobuc.exepid process 620 erwjobuc.exe 4036 erwjobuc.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
738814f87c44a9fe2963c3d8a4f335cf12e988a6a46f2437627cb468e3c193df.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 738814f87c44a9fe2963c3d8a4f335cf12e988a6a46f2437627cb468e3c193df.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
738814f87c44a9fe2963c3d8a4f335cf12e988a6a46f2437627cb468e3c193df.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSConfig = "\"C:\\Users\\Admin\\erwjobuc.exe\"" 738814f87c44a9fe2963c3d8a4f335cf12e988a6a46f2437627cb468e3c193df.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
738814f87c44a9fe2963c3d8a4f335cf12e988a6a46f2437627cb468e3c193df.exeerwjobuc.exeerwjobuc.exedescription pid process target process PID 3268 set thread context of 1456 3268 738814f87c44a9fe2963c3d8a4f335cf12e988a6a46f2437627cb468e3c193df.exe 738814f87c44a9fe2963c3d8a4f335cf12e988a6a46f2437627cb468e3c193df.exe PID 620 set thread context of 4036 620 erwjobuc.exe erwjobuc.exe PID 4036 set thread context of 5048 4036 erwjobuc.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5080 5048 WerFault.exe svchost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
738814f87c44a9fe2963c3d8a4f335cf12e988a6a46f2437627cb468e3c193df.exeerwjobuc.exepid process 3268 738814f87c44a9fe2963c3d8a4f335cf12e988a6a46f2437627cb468e3c193df.exe 620 erwjobuc.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
738814f87c44a9fe2963c3d8a4f335cf12e988a6a46f2437627cb468e3c193df.exe738814f87c44a9fe2963c3d8a4f335cf12e988a6a46f2437627cb468e3c193df.exeerwjobuc.exeerwjobuc.exedescription pid process target process PID 3268 wrote to memory of 1456 3268 738814f87c44a9fe2963c3d8a4f335cf12e988a6a46f2437627cb468e3c193df.exe 738814f87c44a9fe2963c3d8a4f335cf12e988a6a46f2437627cb468e3c193df.exe PID 3268 wrote to memory of 1456 3268 738814f87c44a9fe2963c3d8a4f335cf12e988a6a46f2437627cb468e3c193df.exe 738814f87c44a9fe2963c3d8a4f335cf12e988a6a46f2437627cb468e3c193df.exe PID 3268 wrote to memory of 1456 3268 738814f87c44a9fe2963c3d8a4f335cf12e988a6a46f2437627cb468e3c193df.exe 738814f87c44a9fe2963c3d8a4f335cf12e988a6a46f2437627cb468e3c193df.exe PID 3268 wrote to memory of 1456 3268 738814f87c44a9fe2963c3d8a4f335cf12e988a6a46f2437627cb468e3c193df.exe 738814f87c44a9fe2963c3d8a4f335cf12e988a6a46f2437627cb468e3c193df.exe PID 3268 wrote to memory of 1456 3268 738814f87c44a9fe2963c3d8a4f335cf12e988a6a46f2437627cb468e3c193df.exe 738814f87c44a9fe2963c3d8a4f335cf12e988a6a46f2437627cb468e3c193df.exe PID 3268 wrote to memory of 1456 3268 738814f87c44a9fe2963c3d8a4f335cf12e988a6a46f2437627cb468e3c193df.exe 738814f87c44a9fe2963c3d8a4f335cf12e988a6a46f2437627cb468e3c193df.exe PID 3268 wrote to memory of 1456 3268 738814f87c44a9fe2963c3d8a4f335cf12e988a6a46f2437627cb468e3c193df.exe 738814f87c44a9fe2963c3d8a4f335cf12e988a6a46f2437627cb468e3c193df.exe PID 3268 wrote to memory of 1456 3268 738814f87c44a9fe2963c3d8a4f335cf12e988a6a46f2437627cb468e3c193df.exe 738814f87c44a9fe2963c3d8a4f335cf12e988a6a46f2437627cb468e3c193df.exe PID 3268 wrote to memory of 1456 3268 738814f87c44a9fe2963c3d8a4f335cf12e988a6a46f2437627cb468e3c193df.exe 738814f87c44a9fe2963c3d8a4f335cf12e988a6a46f2437627cb468e3c193df.exe PID 1456 wrote to memory of 620 1456 738814f87c44a9fe2963c3d8a4f335cf12e988a6a46f2437627cb468e3c193df.exe erwjobuc.exe PID 1456 wrote to memory of 620 1456 738814f87c44a9fe2963c3d8a4f335cf12e988a6a46f2437627cb468e3c193df.exe erwjobuc.exe PID 1456 wrote to memory of 620 1456 738814f87c44a9fe2963c3d8a4f335cf12e988a6a46f2437627cb468e3c193df.exe erwjobuc.exe PID 620 wrote to memory of 4036 620 erwjobuc.exe erwjobuc.exe PID 620 wrote to memory of 4036 620 erwjobuc.exe erwjobuc.exe PID 620 wrote to memory of 4036 620 erwjobuc.exe erwjobuc.exe PID 620 wrote to memory of 4036 620 erwjobuc.exe erwjobuc.exe PID 620 wrote to memory of 4036 620 erwjobuc.exe erwjobuc.exe PID 620 wrote to memory of 4036 620 erwjobuc.exe erwjobuc.exe PID 620 wrote to memory of 4036 620 erwjobuc.exe erwjobuc.exe PID 620 wrote to memory of 4036 620 erwjobuc.exe erwjobuc.exe PID 620 wrote to memory of 4036 620 erwjobuc.exe erwjobuc.exe PID 4036 wrote to memory of 5048 4036 erwjobuc.exe svchost.exe PID 4036 wrote to memory of 5048 4036 erwjobuc.exe svchost.exe PID 4036 wrote to memory of 5048 4036 erwjobuc.exe svchost.exe PID 4036 wrote to memory of 5048 4036 erwjobuc.exe svchost.exe PID 4036 wrote to memory of 5048 4036 erwjobuc.exe svchost.exe PID 1456 wrote to memory of 3844 1456 738814f87c44a9fe2963c3d8a4f335cf12e988a6a46f2437627cb468e3c193df.exe cmd.exe PID 1456 wrote to memory of 3844 1456 738814f87c44a9fe2963c3d8a4f335cf12e988a6a46f2437627cb468e3c193df.exe cmd.exe PID 1456 wrote to memory of 3844 1456 738814f87c44a9fe2963c3d8a4f335cf12e988a6a46f2437627cb468e3c193df.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\738814f87c44a9fe2963c3d8a4f335cf12e988a6a46f2437627cb468e3c193df.exe"C:\Users\Admin\AppData\Local\Temp\738814f87c44a9fe2963c3d8a4f335cf12e988a6a46f2437627cb468e3c193df.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\738814f87c44a9fe2963c3d8a4f335cf12e988a6a46f2437627cb468e3c193df.exe"C:\Users\Admin\AppData\Local\Temp\738814f87c44a9fe2963c3d8a4f335cf12e988a6a46f2437627cb468e3c193df.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\erwjobuc.exe"C:\Users\Admin\erwjobuc.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\erwjobuc.exe"C:\Users\Admin\erwjobuc.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5048 -s 3566⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1051.bat" "3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 5048 -ip 50481⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\1051.batFilesize
302B
MD55c6b2e3ad14a0c68846b778a5914138f
SHA1dd7123d67d166a7d8b2af31400f4c4f3e3b4aa6e
SHA256fae9efe6991ff8fd9ac04dd9d711a46c8de80be2df7a26c835fad8b54fe6565e
SHA5128e3bbac7454a3166622521d84ea8ed2766e56f4f738f6d36cb0d9dd26198758a1fae3a3955c00b1519f5685c27a419cdfa296ae0bf786ec1111d81e7db31f08d
-
C:\Users\Admin\erwjobuc.exeFilesize
30.1MB
MD5143eb0c0b321848c748051a915a13257
SHA1c3c8abb5a87451854af06cb78b7f585482b9d1f0
SHA256a4725e496235e9282cd5fb6984b7365b51430e1dbd83cb24f2bebb70352dbc09
SHA512cdef5a29a576b37cfd4ea71a689a182fb2d30da82cc35255a9c21058060d2e59e363be28c3d39343d6142470fcf7ba200a34802a4e2ba8bb8c47c7bed557a092
-
C:\Users\Admin\erwjobuc.exeFilesize
30.1MB
MD5143eb0c0b321848c748051a915a13257
SHA1c3c8abb5a87451854af06cb78b7f585482b9d1f0
SHA256a4725e496235e9282cd5fb6984b7365b51430e1dbd83cb24f2bebb70352dbc09
SHA512cdef5a29a576b37cfd4ea71a689a182fb2d30da82cc35255a9c21058060d2e59e363be28c3d39343d6142470fcf7ba200a34802a4e2ba8bb8c47c7bed557a092
-
C:\Users\Admin\erwjobuc.exeFilesize
30.1MB
MD5143eb0c0b321848c748051a915a13257
SHA1c3c8abb5a87451854af06cb78b7f585482b9d1f0
SHA256a4725e496235e9282cd5fb6984b7365b51430e1dbd83cb24f2bebb70352dbc09
SHA512cdef5a29a576b37cfd4ea71a689a182fb2d30da82cc35255a9c21058060d2e59e363be28c3d39343d6142470fcf7ba200a34802a4e2ba8bb8c47c7bed557a092
-
memory/620-141-0x0000000000000000-mapping.dmp
-
memory/1456-140-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1456-145-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1456-137-0x0000000000000000-mapping.dmp
-
memory/1456-138-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/3844-159-0x0000000000000000-mapping.dmp
-
memory/4036-147-0x0000000000000000-mapping.dmp
-
memory/4036-152-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4036-155-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/5048-153-0x0000000000000000-mapping.dmp
-
memory/5048-158-0x0000000000E40000-0x0000000000E52000-memory.dmpFilesize
72KB
-
memory/5048-154-0x0000000000E40000-0x0000000000E52000-memory.dmpFilesize
72KB
-
memory/5048-161-0x0000000000E40000-0x0000000000E52000-memory.dmpFilesize
72KB