Analysis
-
max time kernel
152s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 04:51
Static task
static1
Behavioral task
behavioral1
Sample
cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6.exe
Resource
win10v2004-20220812-en
General
-
Target
cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6.exe
-
Size
118KB
-
MD5
9b9c8b0d1b9bbef53fb5475c613bb7b1
-
SHA1
626754baf14fdf30f8120e0ebf4016b2158d7db3
-
SHA256
cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6
-
SHA512
c3944e33c236537885e2efe8e4accd2d9ab49bc8fbaa8d31a9330dec3a6bd048135ce56c22bcd18e086919eea1faf27f88d36d23f59341c6911b24079131408f
-
SSDEEP
3072:onHWeIYYD6ZzTTJP9tXWXyV3ARxrCMMQXRZeI:62iYDSjJbX9ArCqh/
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1848 audiadg.exe 1748 bcdprov.exe 1568 bcdprov.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation audiadg.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\audiadg.exe" audiadg.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2448 set thread context of 4912 2448 cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6.exe 80 PID 1748 set thread context of 1568 1748 bcdprov.exe 83 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2448 cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6.exe 1848 audiadg.exe 2448 cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6.exe 2448 cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6.exe 2448 cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6.exe 2448 cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6.exe 2448 cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6.exe 2448 cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6.exe 2448 cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6.exe 2448 cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6.exe 2448 cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6.exe 2448 cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6.exe 2448 cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6.exe 2448 cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6.exe 1848 audiadg.exe 2448 cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6.exe 1848 audiadg.exe 1748 bcdprov.exe 2448 cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6.exe 1848 audiadg.exe 1748 bcdprov.exe 2448 cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6.exe 1848 audiadg.exe 1748 bcdprov.exe 2448 cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6.exe 1848 audiadg.exe 1748 bcdprov.exe 2448 cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6.exe 1848 audiadg.exe 1748 bcdprov.exe 2448 cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6.exe 1848 audiadg.exe 1748 bcdprov.exe 2448 cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6.exe 1848 audiadg.exe 1748 bcdprov.exe 2448 cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6.exe 1848 audiadg.exe 1748 bcdprov.exe 2448 cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6.exe 1848 audiadg.exe 1748 bcdprov.exe 2448 cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6.exe 1848 audiadg.exe 1748 bcdprov.exe 2448 cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6.exe 1848 audiadg.exe 1748 bcdprov.exe 2448 cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6.exe 1848 audiadg.exe 1748 bcdprov.exe 2448 cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6.exe 1848 audiadg.exe 1748 bcdprov.exe 2448 cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6.exe 1848 audiadg.exe 1748 bcdprov.exe 2448 cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6.exe 1848 audiadg.exe 1748 bcdprov.exe 2448 cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6.exe 1848 audiadg.exe 1748 bcdprov.exe 2448 cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2448 cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6.exe Token: SeDebugPrivilege 1848 audiadg.exe Token: SeDebugPrivilege 1748 bcdprov.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 2448 wrote to memory of 4912 2448 cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6.exe 80 PID 2448 wrote to memory of 4912 2448 cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6.exe 80 PID 2448 wrote to memory of 4912 2448 cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6.exe 80 PID 2448 wrote to memory of 4912 2448 cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6.exe 80 PID 2448 wrote to memory of 4912 2448 cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6.exe 80 PID 2448 wrote to memory of 4912 2448 cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6.exe 80 PID 2448 wrote to memory of 4912 2448 cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6.exe 80 PID 2448 wrote to memory of 4912 2448 cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6.exe 80 PID 2448 wrote to memory of 4912 2448 cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6.exe 80 PID 2448 wrote to memory of 4912 2448 cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6.exe 80 PID 2448 wrote to memory of 4912 2448 cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6.exe 80 PID 2448 wrote to memory of 4912 2448 cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6.exe 80 PID 2448 wrote to memory of 4912 2448 cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6.exe 80 PID 2448 wrote to memory of 4912 2448 cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6.exe 80 PID 2448 wrote to memory of 1848 2448 cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6.exe 81 PID 2448 wrote to memory of 1848 2448 cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6.exe 81 PID 2448 wrote to memory of 1848 2448 cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6.exe 81 PID 1848 wrote to memory of 1748 1848 audiadg.exe 82 PID 1848 wrote to memory of 1748 1848 audiadg.exe 82 PID 1848 wrote to memory of 1748 1848 audiadg.exe 82 PID 1748 wrote to memory of 1568 1748 bcdprov.exe 83 PID 1748 wrote to memory of 1568 1748 bcdprov.exe 83 PID 1748 wrote to memory of 1568 1748 bcdprov.exe 83 PID 1748 wrote to memory of 1568 1748 bcdprov.exe 83 PID 1748 wrote to memory of 1568 1748 bcdprov.exe 83 PID 1748 wrote to memory of 1568 1748 bcdprov.exe 83 PID 1748 wrote to memory of 1568 1748 bcdprov.exe 83 PID 1748 wrote to memory of 1568 1748 bcdprov.exe 83 PID 1748 wrote to memory of 1568 1748 bcdprov.exe 83 PID 1748 wrote to memory of 1568 1748 bcdprov.exe 83 PID 1748 wrote to memory of 1568 1748 bcdprov.exe 83 PID 1748 wrote to memory of 1568 1748 bcdprov.exe 83 PID 1748 wrote to memory of 1568 1748 bcdprov.exe 83 PID 1748 wrote to memory of 1568 1748 bcdprov.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6.exe"C:\Users\Admin\AppData\Local\Temp\cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6.exeC:\Users\Admin\AppData\Local\Temp\cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6.exe2⤵PID:4912
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\audiadg.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\audiadg.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\bcdprov.exe"C:\Users\Admin\AppData\Local\Temp\bcdprov.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\bcdprov.exeC:\Users\Admin\AppData\Local\Temp\bcdprov.exe4⤵
- Executes dropped EXE
PID:1568
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
118KB
MD59b9c8b0d1b9bbef53fb5475c613bb7b1
SHA1626754baf14fdf30f8120e0ebf4016b2158d7db3
SHA256cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6
SHA512c3944e33c236537885e2efe8e4accd2d9ab49bc8fbaa8d31a9330dec3a6bd048135ce56c22bcd18e086919eea1faf27f88d36d23f59341c6911b24079131408f
-
Filesize
118KB
MD59b9c8b0d1b9bbef53fb5475c613bb7b1
SHA1626754baf14fdf30f8120e0ebf4016b2158d7db3
SHA256cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6
SHA512c3944e33c236537885e2efe8e4accd2d9ab49bc8fbaa8d31a9330dec3a6bd048135ce56c22bcd18e086919eea1faf27f88d36d23f59341c6911b24079131408f
-
Filesize
118KB
MD59b9c8b0d1b9bbef53fb5475c613bb7b1
SHA1626754baf14fdf30f8120e0ebf4016b2158d7db3
SHA256cb811dc0d9b410895dcb4e9a522d3f0b143946111b606581f027426cc86bf0c6
SHA512c3944e33c236537885e2efe8e4accd2d9ab49bc8fbaa8d31a9330dec3a6bd048135ce56c22bcd18e086919eea1faf27f88d36d23f59341c6911b24079131408f
-
Filesize
10KB
MD57102425f9bbdb8243ec761ba7d74df60
SHA123515f564d8a86abb17375b1e354071d88b952a5
SHA256e701435d4adb4b5929c1f6d06a390cfc9d2199e657f9b5cfbc2517fc257e85d3
SHA5129f0176b4713ed6d4934dbf1e52ce6e151357c3962f2c960a17e6c6a856a12672a731d108bfaa0301d3c5b62f7e92d3909bc301b99b9b8f9cb5457e53e7851b0b
-
Filesize
10KB
MD57102425f9bbdb8243ec761ba7d74df60
SHA123515f564d8a86abb17375b1e354071d88b952a5
SHA256e701435d4adb4b5929c1f6d06a390cfc9d2199e657f9b5cfbc2517fc257e85d3
SHA5129f0176b4713ed6d4934dbf1e52ce6e151357c3962f2c960a17e6c6a856a12672a731d108bfaa0301d3c5b62f7e92d3909bc301b99b9b8f9cb5457e53e7851b0b