Analysis
-
max time kernel
90s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
02-12-2022 17:27
Static task
static1
Behavioral task
behavioral1
Sample
bdd941aca82cb461cf9af2ffa1f836c43c60d4e0f0cbf63c552a8607bd6579dc.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bdd941aca82cb461cf9af2ffa1f836c43c60d4e0f0cbf63c552a8607bd6579dc.exe
Resource
win10v2004-20220901-en
General
-
Target
bdd941aca82cb461cf9af2ffa1f836c43c60d4e0f0cbf63c552a8607bd6579dc.exe
-
Size
927KB
-
MD5
74a2f1b40675804ba89fbb892410534d
-
SHA1
f6fd1cac2fcb8b5452c7350b916e4ebc80566dbf
-
SHA256
bdd941aca82cb461cf9af2ffa1f836c43c60d4e0f0cbf63c552a8607bd6579dc
-
SHA512
b18c073d2ccb026c301b417dcc58df3e6e4c5d55083cdc496862ce501c87f6faa3697fcd9f0d87d4d1cb7c266193bb3fc10024505a59cc62c606a074939b9648
-
SSDEEP
12288:SV+mz1OoDlM9KSxZXHrDlM9JWpu3v4rP4DShqw55h3CO4mDpHgSuYC5RxiX:S8irmtXH9mJ7+O+55hJ4ipHNuYC50
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1076 setup.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation bdd941aca82cb461cf9af2ffa1f836c43c60d4e0f0cbf63c552a8607bd6579dc.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{69C9BD13-7488-11ED-A0EE-EAB2B6EB986A} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1748 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1748 iexplore.exe 1748 iexplore.exe 1464 IEXPLORE.EXE 1464 IEXPLORE.EXE 1464 IEXPLORE.EXE 1464 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 5004 wrote to memory of 1076 5004 bdd941aca82cb461cf9af2ffa1f836c43c60d4e0f0cbf63c552a8607bd6579dc.exe 81 PID 5004 wrote to memory of 1076 5004 bdd941aca82cb461cf9af2ffa1f836c43c60d4e0f0cbf63c552a8607bd6579dc.exe 81 PID 5004 wrote to memory of 1076 5004 bdd941aca82cb461cf9af2ffa1f836c43c60d4e0f0cbf63c552a8607bd6579dc.exe 81 PID 1076 wrote to memory of 1748 1076 setup.exe 82 PID 1076 wrote to memory of 1748 1076 setup.exe 82 PID 1748 wrote to memory of 1464 1748 iexplore.exe 84 PID 1748 wrote to memory of 1464 1748 iexplore.exe 84 PID 1748 wrote to memory of 1464 1748 iexplore.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\bdd941aca82cb461cf9af2ffa1f836c43c60d4e0f0cbf63c552a8607bd6579dc.exe"C:\Users\Admin\AppData\Local\Temp\bdd941aca82cb461cf9af2ffa1f836c43c60d4e0f0cbf63c552a8607bd6579dc.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\setup.exe"C:\setup.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://keji7009.u19.delldns.com/clcount/count.asp?mac=EA-B2-B6-EB-98-6A&ver=2.033⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1748 CREDAT:17410 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1464
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD56ec2f4fa859c6da5e7589f1efb7fba16
SHA152abf6bc3f914d56f3b52eca93a17979e7d80993
SHA25648195c3953b944d2c27088cce3c7461d11eb4a6accca41a98db5f76e1b8bad46
SHA51272684c40e076465c238bfac7d31f597c413cdbe218e977d5a79f7f5a48303f6a12994becb585aaeeefe35946d1024fac1c273398441d5094e036f8dba8ae7a59
-
Filesize
4KB
MD56ec2f4fa859c6da5e7589f1efb7fba16
SHA152abf6bc3f914d56f3b52eca93a17979e7d80993
SHA25648195c3953b944d2c27088cce3c7461d11eb4a6accca41a98db5f76e1b8bad46
SHA51272684c40e076465c238bfac7d31f597c413cdbe218e977d5a79f7f5a48303f6a12994becb585aaeeefe35946d1024fac1c273398441d5094e036f8dba8ae7a59