Analysis
-
max time kernel
184s -
max time network
229s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2022 06:27
Static task
static1
Behavioral task
behavioral1
Sample
91b6e416c42ba1cddb2c40d0672f6a0c86abdbcd13decbe38458e70bdee326c4.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
91b6e416c42ba1cddb2c40d0672f6a0c86abdbcd13decbe38458e70bdee326c4.exe
Resource
win10v2004-20221111-en
General
-
Target
91b6e416c42ba1cddb2c40d0672f6a0c86abdbcd13decbe38458e70bdee326c4.exe
-
Size
189KB
-
MD5
712dda139c579465b25649e1f8e4f320
-
SHA1
f29886d6c6923ee8d35c5b98befcb373e1904c08
-
SHA256
91b6e416c42ba1cddb2c40d0672f6a0c86abdbcd13decbe38458e70bdee326c4
-
SHA512
cc2c58cd18a574a2a73c08aeadf0d6517017ce5d33f812e3ef7394fd885ad8b5e1be8e80cf7c3063cf669f5400bf0bef69fd5e13d6327f1963bfbeb84272f67c
-
SSDEEP
3072:JY9RxpZAD8xMLyen2RhuRtzd67Ur5XZFgrL1p2KXaCBuObo0z6hXu1EQE:ijpK8WLHnmunIIWL1Ee4OHdI
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\{28ADEDE1-A4D5-42D8-9B05-BF7C283C4059} = "v2.0|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Private|Profile=Public|App=C:\\Windows\\system32\\svchost.exe|Name=svchost.exe|Edge=FALSE|" 91b6e416c42ba1cddb2c40d0672f6a0c86abdbcd13decbe38458e70bdee326c4.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\{28ADEDE1-A4D5-42D8-9B05-BF7C283C4060} = "v2.0|Action=Allow|Active=TRUE|Dir=Out|Protocol=6|Profile=Private|Profile=Public|App=C:\\Windows\\system32\\svchost.exe|Name=svchost.exe|Edge=FALSE|" 91b6e416c42ba1cddb2c40d0672f6a0c86abdbcd13decbe38458e70bdee326c4.exe -
Creates new service(s) 1 TTPs
-
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SPService\Parameters\ServiceDll = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\sp.DLL" 91b6e416c42ba1cddb2c40d0672f6a0c86abdbcd13decbe38458e70bdee326c4.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SPService\ImagePath = "C:\\Windows\\sysWOW64\\svchost.exe -k netsvc" 91b6e416c42ba1cddb2c40d0672f6a0c86abdbcd13decbe38458e70bdee326c4.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 91b6e416c42ba1cddb2c40d0672f6a0c86abdbcd13decbe38458e70bdee326c4.exe -
Loads dropped DLL 3 IoCs
pid Process 5044 91b6e416c42ba1cddb2c40d0672f6a0c86abdbcd13decbe38458e70bdee326c4.exe 5044 91b6e416c42ba1cddb2c40d0672f6a0c86abdbcd13decbe38458e70bdee326c4.exe 5088 svchost.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4768 sc.exe 2912 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{96AFBE69-C3B0-4b00-8578-D933D2896EE2}\InProcServer32 91b6e416c42ba1cddb2c40d0672f6a0c86abdbcd13decbe38458e70bdee326c4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{96AFBE69-C3B0-4b00-8578-D933D2896EE2} 91b6e416c42ba1cddb2c40d0672f6a0c86abdbcd13decbe38458e70bdee326c4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{96AFBE69-C3B0-4b00-8578-D933D2896EE2}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\sp.DLL" 91b6e416c42ba1cddb2c40d0672f6a0c86abdbcd13decbe38458e70bdee326c4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\sp\CLSID\ = "{96AFBE69-C3B0-4b00-8578-D933D2896EE2}" 91b6e416c42ba1cddb2c40d0672f6a0c86abdbcd13decbe38458e70bdee326c4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 91b6e416c42ba1cddb2c40d0672f6a0c86abdbcd13decbe38458e70bdee326c4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 91b6e416c42ba1cddb2c40d0672f6a0c86abdbcd13decbe38458e70bdee326c4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{96AFBE69-C3B0-4b00-8578-D933D2896EE2}\InProcServer32\ThreadingModel = "Apartment" 91b6e416c42ba1cddb2c40d0672f6a0c86abdbcd13decbe38458e70bdee326c4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sp\CLSID 91b6e416c42ba1cddb2c40d0672f6a0c86abdbcd13decbe38458e70bdee326c4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sp 91b6e416c42ba1cddb2c40d0672f6a0c86abdbcd13decbe38458e70bdee326c4.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 5044 wrote to memory of 4768 5044 91b6e416c42ba1cddb2c40d0672f6a0c86abdbcd13decbe38458e70bdee326c4.exe 81 PID 5044 wrote to memory of 4768 5044 91b6e416c42ba1cddb2c40d0672f6a0c86abdbcd13decbe38458e70bdee326c4.exe 81 PID 5044 wrote to memory of 4768 5044 91b6e416c42ba1cddb2c40d0672f6a0c86abdbcd13decbe38458e70bdee326c4.exe 81 PID 5044 wrote to memory of 2912 5044 91b6e416c42ba1cddb2c40d0672f6a0c86abdbcd13decbe38458e70bdee326c4.exe 83 PID 5044 wrote to memory of 2912 5044 91b6e416c42ba1cddb2c40d0672f6a0c86abdbcd13decbe38458e70bdee326c4.exe 83 PID 5044 wrote to memory of 2912 5044 91b6e416c42ba1cddb2c40d0672f6a0c86abdbcd13decbe38458e70bdee326c4.exe 83 PID 5044 wrote to memory of 2636 5044 91b6e416c42ba1cddb2c40d0672f6a0c86abdbcd13decbe38458e70bdee326c4.exe 86 PID 5044 wrote to memory of 2636 5044 91b6e416c42ba1cddb2c40d0672f6a0c86abdbcd13decbe38458e70bdee326c4.exe 86 PID 5044 wrote to memory of 2636 5044 91b6e416c42ba1cddb2c40d0672f6a0c86abdbcd13decbe38458e70bdee326c4.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\91b6e416c42ba1cddb2c40d0672f6a0c86abdbcd13decbe38458e70bdee326c4.exe"C:\Users\Admin\AppData\Local\Temp\91b6e416c42ba1cddb2c40d0672f6a0c86abdbcd13decbe38458e70bdee326c4.exe"1⤵
- Modifies firewall policy service
- Sets DLL path for service in the registry
- Sets service image path in registry
- Checks computer location settings
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create SPService binPath= "C:\Windows\sysWOW64\svchost.exe"2⤵
- Launches sc.exe
PID:4768
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start SPService2⤵
- Launches sc.exe
PID:2912
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\a.cmd" "2⤵PID:2636
-
-
C:\Windows\sysWOW64\svchost.exeC:\Windows\sysWOW64\svchost.exe -k netsvc1⤵
- Loads dropped DLL
PID:5088
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
360B
MD5692b6a12c38ea437f9b411d60118eb6a
SHA11ef7c006e5623fb64960ca07b4516169969fae41
SHA2567b415d31effe25947a4d3c4a3dd7aeaefa7bf775856407e5dfdfdfc045a78f65
SHA512521e2a2fc8cef318d4045359ba42063d7f12a31da9cd0bf07973346354216f61464e24210c6a542e340f3cbd29507cf7404bb2ca86f8ddb04977b6ae289aa877
-
Filesize
146KB
MD573d9002e188f52de7c167c90f319f2ad
SHA12c7e9124d31d5ae95c9e1fb58952f9e1550c95f6
SHA2562d590302b37330b2a6e6f7b9030f4d5ea29388dfe2ac95903ad6aa7bba8341c2
SHA51261300758fd76b35b10b4739af02b7c65adb1080b9c3a40aaa929d4a84520881967f81d75650f1392d14e40ca28a63aec82e964174fdae2db3885ac4fa1a0a568
-
Filesize
146KB
MD573d9002e188f52de7c167c90f319f2ad
SHA12c7e9124d31d5ae95c9e1fb58952f9e1550c95f6
SHA2562d590302b37330b2a6e6f7b9030f4d5ea29388dfe2ac95903ad6aa7bba8341c2
SHA51261300758fd76b35b10b4739af02b7c65adb1080b9c3a40aaa929d4a84520881967f81d75650f1392d14e40ca28a63aec82e964174fdae2db3885ac4fa1a0a568
-
Filesize
146KB
MD573d9002e188f52de7c167c90f319f2ad
SHA12c7e9124d31d5ae95c9e1fb58952f9e1550c95f6
SHA2562d590302b37330b2a6e6f7b9030f4d5ea29388dfe2ac95903ad6aa7bba8341c2
SHA51261300758fd76b35b10b4739af02b7c65adb1080b9c3a40aaa929d4a84520881967f81d75650f1392d14e40ca28a63aec82e964174fdae2db3885ac4fa1a0a568
-
Filesize
146KB
MD573d9002e188f52de7c167c90f319f2ad
SHA12c7e9124d31d5ae95c9e1fb58952f9e1550c95f6
SHA2562d590302b37330b2a6e6f7b9030f4d5ea29388dfe2ac95903ad6aa7bba8341c2
SHA51261300758fd76b35b10b4739af02b7c65adb1080b9c3a40aaa929d4a84520881967f81d75650f1392d14e40ca28a63aec82e964174fdae2db3885ac4fa1a0a568
-
Filesize
146KB
MD573d9002e188f52de7c167c90f319f2ad
SHA12c7e9124d31d5ae95c9e1fb58952f9e1550c95f6
SHA2562d590302b37330b2a6e6f7b9030f4d5ea29388dfe2ac95903ad6aa7bba8341c2
SHA51261300758fd76b35b10b4739af02b7c65adb1080b9c3a40aaa929d4a84520881967f81d75650f1392d14e40ca28a63aec82e964174fdae2db3885ac4fa1a0a568