Analysis
-
max time kernel
157s -
max time network
197s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 06:57
Static task
static1
Behavioral task
behavioral1
Sample
8dbef2147bd4a0b6725f2e8eb1ae6e18a411fcda13f69dbfdf6c547e1527437a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8dbef2147bd4a0b6725f2e8eb1ae6e18a411fcda13f69dbfdf6c547e1527437a.exe
Resource
win10v2004-20221111-en
General
-
Target
8dbef2147bd4a0b6725f2e8eb1ae6e18a411fcda13f69dbfdf6c547e1527437a.exe
-
Size
37KB
-
MD5
6b1a9eae04c6c02c7fff562c78ae6c5b
-
SHA1
b011396c18a10af503b3ed32d55bde56f6b22d48
-
SHA256
8dbef2147bd4a0b6725f2e8eb1ae6e18a411fcda13f69dbfdf6c547e1527437a
-
SHA512
dacf726f1df2ad4cabe1e2c4e4e367c95958720f44221e91f7c95d52980166f7906fa206d1800eb3d49969e92579f0e15f577d029c4a1b2ff5d205793db52f63
-
SSDEEP
768:Lwbeq7oIASBVNL26y/07hC8kF/R0Be7UiU6DFnEXGnygJxrVAdbCCl3E:IeUrA2Vw6z7hpXBcTUWnAdbCCl
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 240589046.exe -
Executes dropped EXE 3 IoCs
pid Process 4552 svhostn.exe 3096 240589046.exe 4588 mpcsvc.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 240589046.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 8dbef2147bd4a0b6725f2e8eb1ae6e18a411fcda13f69dbfdf6c547e1527437a.exe -
Loads dropped DLL 1 IoCs
pid Process 4376 Regsvr32.exe -
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run svhostn.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Manager e01 = "C:\\Windows\\svhostn.exe" svhostn.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run svhostn.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce svhostn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Manager e01 = "C:\\Windows\\svhostn.exe" svhostn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Manager e01 sp = "C:\\Windows\\system32\\mpcsvc.exe" 240589046.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce svhostn.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Manager e01 = "C:\\Windows\\svhostn.exe" svhostn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Manager e01 = "C:\\Windows\\svhostn.exe" svhostn.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Manager e01 sp = "C:\\Windows\\system32\\mpcsvc.exe" 240589046.exe -
Installs/modifies Browser Helper Object 2 TTPs 3 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{455875B5-93F3-429D-FF34-660B206D897C} Regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA} Regsvr32.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\mpcsvc.exe 240589046.exe File created C:\Windows\SysWOW64\mpcsvc.exe 240589046.exe File created C:\Windows\SysWOW64\bensorty03.dll 8dbef2147bd4a0b6725f2e8eb1ae6e18a411fcda13f69dbfdf6c547e1527437a.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\svhostn.exe 8dbef2147bd4a0b6725f2e8eb1ae6e18a411fcda13f69dbfdf6c547e1527437a.exe File created C:\Windows\svhostn.exe svhostn.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Desktop\id = "572778446406" mpcsvc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Desktop\host = "85.249.138.154" 240589046.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Security\host = "85.249.139.66" 240589046.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Desktop mpcsvc.exe -
Modifies registry class 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{455875B5-93F3-429D-FF34-660B206D897C}\InProcServer32\ThreadingModel = "Apartment" Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{455875B5-93F3-429D-FF34-660B206D897C} Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{455875B5-93F3-429D-FF34-660B206D897C}\ = "C:\\Windows\\SysWow64\\bensorty03.dll" Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{455875B5-93F3-429D-FF34-660B206D897C}\ThreadingModel = "Apartment" Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{455875B5-93F3-429D-FF34-660B206D897C}\InProcServer32 Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{455875B5-93F3-429D-FF34-660B206D897C}\InProcServer32\ = "C:\\Windows\\SysWow64\\bensorty03.dll" Regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3096 240589046.exe 3096 240589046.exe 4588 mpcsvc.exe 4588 mpcsvc.exe 4588 mpcsvc.exe 4588 mpcsvc.exe 4588 mpcsvc.exe 4588 mpcsvc.exe 4588 mpcsvc.exe 4588 mpcsvc.exe 4588 mpcsvc.exe 4588 mpcsvc.exe 4588 mpcsvc.exe 4588 mpcsvc.exe 4588 mpcsvc.exe 4588 mpcsvc.exe 4588 mpcsvc.exe 4588 mpcsvc.exe 4588 mpcsvc.exe 4588 mpcsvc.exe 4588 mpcsvc.exe 4588 mpcsvc.exe 4588 mpcsvc.exe 4588 mpcsvc.exe 4588 mpcsvc.exe 4588 mpcsvc.exe 4588 mpcsvc.exe 4588 mpcsvc.exe 4588 mpcsvc.exe 4588 mpcsvc.exe 4588 mpcsvc.exe 4588 mpcsvc.exe 4588 mpcsvc.exe 4588 mpcsvc.exe 4588 mpcsvc.exe 4588 mpcsvc.exe 4588 mpcsvc.exe 4588 mpcsvc.exe 4588 mpcsvc.exe 4588 mpcsvc.exe 4588 mpcsvc.exe 4588 mpcsvc.exe 4588 mpcsvc.exe 4588 mpcsvc.exe 4588 mpcsvc.exe 4588 mpcsvc.exe 4588 mpcsvc.exe 4588 mpcsvc.exe 4588 mpcsvc.exe 4588 mpcsvc.exe 4588 mpcsvc.exe 4588 mpcsvc.exe 4588 mpcsvc.exe 4588 mpcsvc.exe 4588 mpcsvc.exe 4588 mpcsvc.exe 4588 mpcsvc.exe 4588 mpcsvc.exe 4588 mpcsvc.exe 4588 mpcsvc.exe 4588 mpcsvc.exe 4588 mpcsvc.exe 4588 mpcsvc.exe 4588 mpcsvc.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1060 wrote to memory of 4552 1060 8dbef2147bd4a0b6725f2e8eb1ae6e18a411fcda13f69dbfdf6c547e1527437a.exe 81 PID 1060 wrote to memory of 4552 1060 8dbef2147bd4a0b6725f2e8eb1ae6e18a411fcda13f69dbfdf6c547e1527437a.exe 81 PID 1060 wrote to memory of 4552 1060 8dbef2147bd4a0b6725f2e8eb1ae6e18a411fcda13f69dbfdf6c547e1527437a.exe 81 PID 1060 wrote to memory of 3096 1060 8dbef2147bd4a0b6725f2e8eb1ae6e18a411fcda13f69dbfdf6c547e1527437a.exe 82 PID 1060 wrote to memory of 3096 1060 8dbef2147bd4a0b6725f2e8eb1ae6e18a411fcda13f69dbfdf6c547e1527437a.exe 82 PID 1060 wrote to memory of 3096 1060 8dbef2147bd4a0b6725f2e8eb1ae6e18a411fcda13f69dbfdf6c547e1527437a.exe 82 PID 3096 wrote to memory of 4588 3096 240589046.exe 83 PID 3096 wrote to memory of 4588 3096 240589046.exe 83 PID 3096 wrote to memory of 4588 3096 240589046.exe 83 PID 1060 wrote to memory of 4376 1060 8dbef2147bd4a0b6725f2e8eb1ae6e18a411fcda13f69dbfdf6c547e1527437a.exe 84 PID 1060 wrote to memory of 4376 1060 8dbef2147bd4a0b6725f2e8eb1ae6e18a411fcda13f69dbfdf6c547e1527437a.exe 84 PID 1060 wrote to memory of 4376 1060 8dbef2147bd4a0b6725f2e8eb1ae6e18a411fcda13f69dbfdf6c547e1527437a.exe 84 PID 3096 wrote to memory of 3180 3096 240589046.exe 85 PID 3096 wrote to memory of 3180 3096 240589046.exe 85 PID 3096 wrote to memory of 3180 3096 240589046.exe 85 PID 1060 wrote to memory of 2760 1060 8dbef2147bd4a0b6725f2e8eb1ae6e18a411fcda13f69dbfdf6c547e1527437a.exe 87 PID 1060 wrote to memory of 2760 1060 8dbef2147bd4a0b6725f2e8eb1ae6e18a411fcda13f69dbfdf6c547e1527437a.exe 87 PID 1060 wrote to memory of 2760 1060 8dbef2147bd4a0b6725f2e8eb1ae6e18a411fcda13f69dbfdf6c547e1527437a.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\8dbef2147bd4a0b6725f2e8eb1ae6e18a411fcda13f69dbfdf6c547e1527437a.exe"C:\Users\Admin\AppData\Local\Temp\8dbef2147bd4a0b6725f2e8eb1ae6e18a411fcda13f69dbfdf6c547e1527437a.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\svhostn.exeC:\Windows\svhostn.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
PID:4552
-
-
C:\Users\Admin\AppData\Local\Temp\240589046.exeC:\Users\Admin\AppData\Local\Temp\240589046.exe2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Windows\SysWOW64\mpcsvc.exeC:\Windows\system32\mpcsvc.exe3⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:4588
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\p6hhr.bat" "C:\Users\Admin\AppData\Local\Temp\240589046.exe""3⤵PID:3180
-
-
-
C:\Windows\SysWOW64\Regsvr32.exeRegsvr32.exe /s bensorty03.dll2⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:4376
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\p2hhr.bat" "C:\Users\Admin\AppData\Local\Temp\8dbef2147bd4a0b6725f2e8eb1ae6e18a411fcda13f69dbfdf6c547e1527437a.exe""2⤵PID:2760
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD5a1f1494ecb2e9c66c408f9b34b4c90a0
SHA1b2ec1e22421552ee8f6593f6400000a9e7162565
SHA25693c392451641d4f5437ca86f8990fe5844f1da2e45eb9bb137d4a3e46e4ba972
SHA512943038e259554c6b9f90647a5f9a2148cf929fae56982bef81181cf9ae1df3e894e1693ff8d093e70cee22e5f07e85f062d631c83860efb982efb7da5448dd3b
-
Filesize
19KB
MD5a1f1494ecb2e9c66c408f9b34b4c90a0
SHA1b2ec1e22421552ee8f6593f6400000a9e7162565
SHA25693c392451641d4f5437ca86f8990fe5844f1da2e45eb9bb137d4a3e46e4ba972
SHA512943038e259554c6b9f90647a5f9a2148cf929fae56982bef81181cf9ae1df3e894e1693ff8d093e70cee22e5f07e85f062d631c83860efb982efb7da5448dd3b
-
Filesize
44B
MD576d2c58bc389bc1cc18aed4ff486a1a2
SHA1421c4d20655a1270415e550fa9cc8831576abbf6
SHA256e8efa9da7c7006640c2f883bec45cc3013dda102fb4ae74dbd45b676c77820bf
SHA512241642d717fbf37c3f0970921f37246c5484a3763cde23dfe0e830ed26bb9347253b68e659a70e7e6017c883024c0ef678023f0b927438d1bda16f89f40d412e
-
Filesize
44B
MD5400fba0cf5e5d608058f93959929b6d3
SHA1162a0d2af9d2d836bba00e9015a29dd2914cd269
SHA256be4a38adde88d522653b423794809d54e9af0abe7decafa0501cd4cc3a073925
SHA512350658631444b12db85ed4687f92eb2cc388257dcc731f84fad1077769adc493f2450075f669ed2c066778a1c1ed459de74db204b903702eceb3e1baa0e816c2
-
Filesize
9KB
MD52ed02f2051738b56c2cb04025d3db308
SHA1b5b9f45427396628703bc5133e2eeb4eb7294701
SHA256fc163de9bcc68c140789c3365e34550186c5c65181194a8bf0d5b7179f867836
SHA512b0605ad756d7dc651155e7d857f05aa43b4e26ea4b4ffb6eaeac90eaf3eefa03e90df9cfa06c824e74a0cf469e92291da72b714448dca7a376f2f856f2d0fbe9
-
Filesize
9KB
MD52ed02f2051738b56c2cb04025d3db308
SHA1b5b9f45427396628703bc5133e2eeb4eb7294701
SHA256fc163de9bcc68c140789c3365e34550186c5c65181194a8bf0d5b7179f867836
SHA512b0605ad756d7dc651155e7d857f05aa43b4e26ea4b4ffb6eaeac90eaf3eefa03e90df9cfa06c824e74a0cf469e92291da72b714448dca7a376f2f856f2d0fbe9
-
Filesize
19KB
MD54678168e062bf2f83895f43e827bed89
SHA1e06581512a56eaedc21fc9b39c16238aea9ac1f2
SHA256e0e04a27732edb582154508526f3c0f53890c36f73d66b4dc6643d7ea894d40f
SHA512f89e5b0170bb2d41f0391c6ea2b0290b2f1129e98a81fc72140c77130b74269990bc04c21c52727aa78cc1c81cea64ec8989a66a2cc0ce0ef7285636f8188c05
-
Filesize
19KB
MD54678168e062bf2f83895f43e827bed89
SHA1e06581512a56eaedc21fc9b39c16238aea9ac1f2
SHA256e0e04a27732edb582154508526f3c0f53890c36f73d66b4dc6643d7ea894d40f
SHA512f89e5b0170bb2d41f0391c6ea2b0290b2f1129e98a81fc72140c77130b74269990bc04c21c52727aa78cc1c81cea64ec8989a66a2cc0ce0ef7285636f8188c05
-
Filesize
14KB
MD51a6fe2645568d72a1c499633bea81853
SHA1112788c22d1492de79edbeca2401cbbef97f9a29
SHA2569dd2fcc8b6fdac753f8926e3ca4f3a234be730d2d791c80e99e590cc3f79bdd1
SHA512d66bb0b2d80d05984aeeec367b7dd7f605df3e2d64c8da542df3087e98b05a08e9b27114ace793ae3a34c6d4cb00e3482c4678db0f84e79ead0af0193dc723b8
-
Filesize
14KB
MD51a6fe2645568d72a1c499633bea81853
SHA1112788c22d1492de79edbeca2401cbbef97f9a29
SHA2569dd2fcc8b6fdac753f8926e3ca4f3a234be730d2d791c80e99e590cc3f79bdd1
SHA512d66bb0b2d80d05984aeeec367b7dd7f605df3e2d64c8da542df3087e98b05a08e9b27114ace793ae3a34c6d4cb00e3482c4678db0f84e79ead0af0193dc723b8