Analysis
-
max time kernel
91s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2022 18:41
Static task
static1
Behavioral task
behavioral1
Sample
3e9f2c1bd116ccfcd0dcb3051cb40e3912155b737e11c68cc3ceb28657f612cf.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3e9f2c1bd116ccfcd0dcb3051cb40e3912155b737e11c68cc3ceb28657f612cf.exe
Resource
win10v2004-20220901-en
General
-
Target
3e9f2c1bd116ccfcd0dcb3051cb40e3912155b737e11c68cc3ceb28657f612cf.exe
-
Size
180KB
-
MD5
36b042b638d078361033f9c7ddb086c2
-
SHA1
da39b60eea08bbb2444d1e43434269d561e7c743
-
SHA256
3e9f2c1bd116ccfcd0dcb3051cb40e3912155b737e11c68cc3ceb28657f612cf
-
SHA512
70251434d87f0228ade039ba6db54599b3a3ca126b708c0e8ec19accf8c6b34bfa3da2cb92569be6bb4f7ee73da8795e656efef6e138b5ffcc3696101491dece
-
SSDEEP
3072:6BAp5XhKpN4eOyVTGfhEClj8jTk+0hdm5Bar3j9:JbXE9OiTGfhEClq9v5Azj9
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 9 3068 WScript.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\System32\drivers\etc\hosts WScript.exe File opened for modification C:\Windows\System32\drivers\etc\hîsts WScript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3e9f2c1bd116ccfcd0dcb3051cb40e3912155b737e11c68cc3ceb28657f612cf.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\v storonu\E230\ultar\moskaraskakokokoko.hiq 3e9f2c1bd116ccfcd0dcb3051cb40e3912155b737e11c68cc3ceb28657f612cf.exe File opened for modification C:\Program Files (x86)\v storonu\E230\10\EcuadoryGalapagos.bat 3e9f2c1bd116ccfcd0dcb3051cb40e3912155b737e11c68cc3ceb28657f612cf.exe File opened for modification C:\Program Files (x86)\v storonu\E230\ultar\Latesttraveladvicefor.vbs 3e9f2c1bd116ccfcd0dcb3051cb40e3912155b737e11c68cc3ceb28657f612cf.exe File opened for modification C:\Program Files (x86)\v storonu\E230\ultar\Simplyenteryouremailaddress.vbs 3e9f2c1bd116ccfcd0dcb3051cb40e3912155b737e11c68cc3ceb28657f612cf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 3e9f2c1bd116ccfcd0dcb3051cb40e3912155b737e11c68cc3ceb28657f612cf.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 5000 wrote to memory of 2724 5000 3e9f2c1bd116ccfcd0dcb3051cb40e3912155b737e11c68cc3ceb28657f612cf.exe 81 PID 5000 wrote to memory of 2724 5000 3e9f2c1bd116ccfcd0dcb3051cb40e3912155b737e11c68cc3ceb28657f612cf.exe 81 PID 5000 wrote to memory of 2724 5000 3e9f2c1bd116ccfcd0dcb3051cb40e3912155b737e11c68cc3ceb28657f612cf.exe 81 PID 5000 wrote to memory of 364 5000 3e9f2c1bd116ccfcd0dcb3051cb40e3912155b737e11c68cc3ceb28657f612cf.exe 83 PID 5000 wrote to memory of 364 5000 3e9f2c1bd116ccfcd0dcb3051cb40e3912155b737e11c68cc3ceb28657f612cf.exe 83 PID 5000 wrote to memory of 364 5000 3e9f2c1bd116ccfcd0dcb3051cb40e3912155b737e11c68cc3ceb28657f612cf.exe 83 PID 5000 wrote to memory of 3068 5000 3e9f2c1bd116ccfcd0dcb3051cb40e3912155b737e11c68cc3ceb28657f612cf.exe 84 PID 5000 wrote to memory of 3068 5000 3e9f2c1bd116ccfcd0dcb3051cb40e3912155b737e11c68cc3ceb28657f612cf.exe 84 PID 5000 wrote to memory of 3068 5000 3e9f2c1bd116ccfcd0dcb3051cb40e3912155b737e11c68cc3ceb28657f612cf.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e9f2c1bd116ccfcd0dcb3051cb40e3912155b737e11c68cc3ceb28657f612cf.exe"C:\Users\Admin\AppData\Local\Temp\3e9f2c1bd116ccfcd0dcb3051cb40e3912155b737e11c68cc3ceb28657f612cf.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\v storonu\E230\10\EcuadoryGalapagos.bat" "2⤵
- Drops file in Drivers directory
PID:2724
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\v storonu\E230\ultar\Latesttraveladvicefor.vbs"2⤵
- Drops file in Drivers directory
PID:364
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\v storonu\E230\ultar\Simplyenteryouremailaddress.vbs"2⤵
- Blocklisted process makes network request
PID:3068
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5be2c5db88cafd114255d1202e8f92acb
SHA137680a2557e2e4df92d0539d7e3e6420033f48da
SHA256d0bf0ca23090522c7338996919b2dbb0100ff4307106983258a74e130670f862
SHA512d486596802a96166afa5b118691754df1c283181e641614cb1009669b5c7a695dc6126d93f953bd55f31e06ebf7c52d754b507866589198fb9b21a441750186d
-
Filesize
817B
MD5cf28d72828a5b4e188cf5f01f54d3bd9
SHA1665dc259c630c8b79cfd8df33347dbd098f38960
SHA2569953c2839fe0477ea8ea304ad71995adbed19d134ed1995d983edb90f71770f6
SHA5125cae08a0a6477cca605a30f2457cfa5a4644e8828c9dbad5217d36a490d2b6f7932eefe81c96ba927b84d56698efc54d3a038f93a969f8e9ec5f77e5ecca8f56
-
Filesize
557B
MD567de8f45a16cf65bf7a6ae3bd7d83603
SHA137a415c7e60cce666bb8c725837776483d08d249
SHA256717703d21f5e6c16bcb813cf55bf34dd107bc79099a26d2773d75e20c5f44960
SHA512c3d1182d92dccae25dfe53ba800083093fad98021007fd547ed5a039916440c4a3abd1397f1173ae07db6f1be4e7b67348c6fa25d4919dfa9ba073a362d7f255
-
Filesize
54B
MD505cb67a96ed0ec3cec454f4899051767
SHA14db7341b4992d0bf08a1c8df15dc2daf397c804b
SHA25634e21e97e937d5b29938cf3617041fbf3e0b291d51b9169a1eba10ffa1a4573f
SHA5126c93c4688c4b800d7b6fcbd8e15c15263c17f2464a85bf24bcf5d1a114d90aafecf3565eb88a474d998a050bbb931e66606cabe59dc333e168834d985357be76
-
Filesize
1KB
MD526ec35f056ef17773a030f112d4ec6b3
SHA14007b8712c4b9ae68c4158f3a46c3724e3e2a0fb
SHA2562188ee572781abbe0364ed50428f5d61983b6154c8294faf684a3b013f04dbb4
SHA51216c93bf965ebd995754bd8da4d206e78734d079beff568d3996d5c1d2f49d1be80e2f2fa23539f480da3602fb0c769ae5e5c158d3470a6edba18311766182bbd