Analysis
-
max time kernel
164s -
max time network
193s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2022 02:57
Static task
static1
Behavioral task
behavioral1
Sample
b18ccdfaa2cfed011dc356fe7d315f795fc2894d03c9092192d81dc8caf0b75c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b18ccdfaa2cfed011dc356fe7d315f795fc2894d03c9092192d81dc8caf0b75c.exe
Resource
win10v2004-20221111-en
General
-
Target
b18ccdfaa2cfed011dc356fe7d315f795fc2894d03c9092192d81dc8caf0b75c.exe
-
Size
333KB
-
MD5
b57d827eb7e524c3abb42a7941ec1c77
-
SHA1
b3d2a59e3649217fdad21b3d822a27eda1950fc1
-
SHA256
b18ccdfaa2cfed011dc356fe7d315f795fc2894d03c9092192d81dc8caf0b75c
-
SHA512
1fd8b10e8c3b7b7665a73e62590d1be49055d38a1c026b1967179822b5f8ab41d088094b8bfc2d2fb86ca294c9e86059a63ccd4a399aeb41e96ae49f9015230b
-
SSDEEP
6144:rjrlCHxyhK7JhqF6muLi8YV+oM/JHLdmQndK1d0Jyc6xBiW/0:HrlzK7vC6HLifEBQlKJMc
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts update3.exe -
Executes dropped EXE 2 IoCs
pid Process 900 update3.exe 3284 volmgr.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation b18ccdfaa2cfed011dc356fe7d315f795fc2894d03c9092192d81dc8caf0b75c.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation update3.exe -
Loads dropped DLL 2 IoCs
pid Process 2104 b18ccdfaa2cfed011dc356fe7d315f795fc2894d03c9092192d81dc8caf0b75c.exe 2104 b18ccdfaa2cfed011dc356fe7d315f795fc2894d03c9092192d81dc8caf0b75c.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ update3.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\volmgr = "C:\\Users\\Admin\\AppData\\Local\\volmgr.exe" update3.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ update3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\volmgr = "C:\\Users\\Admin\\AppData\\Local\\volmgr.exe" update3.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2104 set thread context of 4472 2104 b18ccdfaa2cfed011dc356fe7d315f795fc2894d03c9092192d81dc8caf0b75c.exe 83 PID 4472 set thread context of 1480 4472 b18ccdfaa2cfed011dc356fe7d315f795fc2894d03c9092192d81dc8caf0b75c.exe 87 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1192 3284 WerFault.exe 92 -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ update3.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2104 wrote to memory of 4472 2104 b18ccdfaa2cfed011dc356fe7d315f795fc2894d03c9092192d81dc8caf0b75c.exe 83 PID 2104 wrote to memory of 4472 2104 b18ccdfaa2cfed011dc356fe7d315f795fc2894d03c9092192d81dc8caf0b75c.exe 83 PID 2104 wrote to memory of 4472 2104 b18ccdfaa2cfed011dc356fe7d315f795fc2894d03c9092192d81dc8caf0b75c.exe 83 PID 2104 wrote to memory of 4472 2104 b18ccdfaa2cfed011dc356fe7d315f795fc2894d03c9092192d81dc8caf0b75c.exe 83 PID 2104 wrote to memory of 4472 2104 b18ccdfaa2cfed011dc356fe7d315f795fc2894d03c9092192d81dc8caf0b75c.exe 83 PID 2104 wrote to memory of 4472 2104 b18ccdfaa2cfed011dc356fe7d315f795fc2894d03c9092192d81dc8caf0b75c.exe 83 PID 2104 wrote to memory of 4472 2104 b18ccdfaa2cfed011dc356fe7d315f795fc2894d03c9092192d81dc8caf0b75c.exe 83 PID 2104 wrote to memory of 4472 2104 b18ccdfaa2cfed011dc356fe7d315f795fc2894d03c9092192d81dc8caf0b75c.exe 83 PID 2104 wrote to memory of 4472 2104 b18ccdfaa2cfed011dc356fe7d315f795fc2894d03c9092192d81dc8caf0b75c.exe 83 PID 4472 wrote to memory of 900 4472 b18ccdfaa2cfed011dc356fe7d315f795fc2894d03c9092192d81dc8caf0b75c.exe 86 PID 4472 wrote to memory of 900 4472 b18ccdfaa2cfed011dc356fe7d315f795fc2894d03c9092192d81dc8caf0b75c.exe 86 PID 4472 wrote to memory of 900 4472 b18ccdfaa2cfed011dc356fe7d315f795fc2894d03c9092192d81dc8caf0b75c.exe 86 PID 4472 wrote to memory of 1480 4472 b18ccdfaa2cfed011dc356fe7d315f795fc2894d03c9092192d81dc8caf0b75c.exe 87 PID 4472 wrote to memory of 1480 4472 b18ccdfaa2cfed011dc356fe7d315f795fc2894d03c9092192d81dc8caf0b75c.exe 87 PID 4472 wrote to memory of 1480 4472 b18ccdfaa2cfed011dc356fe7d315f795fc2894d03c9092192d81dc8caf0b75c.exe 87 PID 4472 wrote to memory of 1480 4472 b18ccdfaa2cfed011dc356fe7d315f795fc2894d03c9092192d81dc8caf0b75c.exe 87 PID 4472 wrote to memory of 1480 4472 b18ccdfaa2cfed011dc356fe7d315f795fc2894d03c9092192d81dc8caf0b75c.exe 87 PID 4472 wrote to memory of 1480 4472 b18ccdfaa2cfed011dc356fe7d315f795fc2894d03c9092192d81dc8caf0b75c.exe 87 PID 4472 wrote to memory of 1480 4472 b18ccdfaa2cfed011dc356fe7d315f795fc2894d03c9092192d81dc8caf0b75c.exe 87 PID 4472 wrote to memory of 1480 4472 b18ccdfaa2cfed011dc356fe7d315f795fc2894d03c9092192d81dc8caf0b75c.exe 87 PID 900 wrote to memory of 3284 900 update3.exe 92 PID 900 wrote to memory of 3284 900 update3.exe 92 PID 900 wrote to memory of 3284 900 update3.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\b18ccdfaa2cfed011dc356fe7d315f795fc2894d03c9092192d81dc8caf0b75c.exe"C:\Users\Admin\AppData\Local\Temp\b18ccdfaa2cfed011dc356fe7d315f795fc2894d03c9092192d81dc8caf0b75c.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\b18ccdfaa2cfed011dc356fe7d315f795fc2894d03c9092192d81dc8caf0b75c.exe"C:\Users\Admin\AppData\Local\Temp\b18ccdfaa2cfed011dc356fe7d315f795fc2894d03c9092192d81dc8caf0b75c.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Users\Admin\AppData\Local\Temp\update3.exe"C:\Users\Admin\AppData\Local\Temp\update3.exe"3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Users\Admin\AppData\Local\volmgr.exe"C:\Users\Admin\AppData\Local\volmgr.exe" C:\Users\Admin\AppData\Local\Temp\update3.exe4⤵
- Executes dropped EXE
PID:3284 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3284 -s 2605⤵
- Program crash
PID:1192
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b18ccdfaa2cfed011dc356fe7d315f795fc2894d03c9092192d81dc8caf0b75c.exe"C:\Users\Admin\AppData\Local\Temp\b18ccdfaa2cfed011dc356fe7d315f795fc2894d03c9092192d81dc8caf0b75c.exe"3⤵PID:1480
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}1⤵PID:3248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3284 -ip 32841⤵PID:3452
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
77KB
MD5b07f78bf03bcb08ff33e39ec5a9e93c3
SHA1acf93c06c080f059018202745cdc2f56ca31d4bb
SHA2565df9355e70388a875b52933ec92ad9048747f15640dc727389b1aa0071c2e483
SHA512e87a12b4a379e1959b38b546d4b37bfe425482e43bf07443bdf255cc20666b5992b85fbb629da30a82cec08626bf3aca43989b68c45e413f9f5511185aebf740
-
Filesize
40KB
MD5bc90c8280b1c0064271e4124d2eb9772
SHA1f6d353c8a92053fe2d433e661a6e10a96d5cf7a0
SHA25639b4bdafdd0873db36327a9c513597ca3350f734e02072bd38c2254aab789efb
SHA512b87dd6962a95390b58355ebf1bd076483de31ef073e879023ab5a7057bfc8d3b1d05fa123fa79368ef9f99f05363feedfbd35570d016b3fb8ad16848046ad110
-
Filesize
2KB
MD5d1f3c6b92c7235527535e35fdb593eea
SHA105d9223fdec4515e629ba7baff48343174352d68
SHA2565bdbe2de48c2e37cfde5a443439d254873157c66d1f205e609b999b6185bc266
SHA512ab0c2fb281a30d5ceaf38e300903936c0b12b2b27fcf6decc212e0cdbda4ff3a9423e6a1a263bb94c0e355ec8647af22003ae3303fe87f77a0c2c0eab9820a7e
-
Filesize
2KB
MD5d1f3c6b92c7235527535e35fdb593eea
SHA105d9223fdec4515e629ba7baff48343174352d68
SHA2565bdbe2de48c2e37cfde5a443439d254873157c66d1f205e609b999b6185bc266
SHA512ab0c2fb281a30d5ceaf38e300903936c0b12b2b27fcf6decc212e0cdbda4ff3a9423e6a1a263bb94c0e355ec8647af22003ae3303fe87f77a0c2c0eab9820a7e
-
Filesize
164KB
MD521af5595448d385d7525a285dec66186
SHA1464a7a95a183075e5819b4c1e960069577283348
SHA256b20f56b3d052deafe9ea3fc6a1e20377c33c4503bd6f543f0e42a52afe19feeb
SHA512f82e80da0293d0d81f73f06c2e718b749a803dcc4eda1111b9038c64fe156fa56693d71f79ef09a5c1a8c3699a61186de8d66c394c5e3ac0d61ed1e8ad705db7
-
Filesize
164KB
MD521af5595448d385d7525a285dec66186
SHA1464a7a95a183075e5819b4c1e960069577283348
SHA256b20f56b3d052deafe9ea3fc6a1e20377c33c4503bd6f543f0e42a52afe19feeb
SHA512f82e80da0293d0d81f73f06c2e718b749a803dcc4eda1111b9038c64fe156fa56693d71f79ef09a5c1a8c3699a61186de8d66c394c5e3ac0d61ed1e8ad705db7
-
Filesize
40KB
MD5bc90c8280b1c0064271e4124d2eb9772
SHA1f6d353c8a92053fe2d433e661a6e10a96d5cf7a0
SHA25639b4bdafdd0873db36327a9c513597ca3350f734e02072bd38c2254aab789efb
SHA512b87dd6962a95390b58355ebf1bd076483de31ef073e879023ab5a7057bfc8d3b1d05fa123fa79368ef9f99f05363feedfbd35570d016b3fb8ad16848046ad110
-
Filesize
77KB
MD5b07f78bf03bcb08ff33e39ec5a9e93c3
SHA1acf93c06c080f059018202745cdc2f56ca31d4bb
SHA2565df9355e70388a875b52933ec92ad9048747f15640dc727389b1aa0071c2e483
SHA512e87a12b4a379e1959b38b546d4b37bfe425482e43bf07443bdf255cc20666b5992b85fbb629da30a82cec08626bf3aca43989b68c45e413f9f5511185aebf740
-
Filesize
77KB
MD5b07f78bf03bcb08ff33e39ec5a9e93c3
SHA1acf93c06c080f059018202745cdc2f56ca31d4bb
SHA2565df9355e70388a875b52933ec92ad9048747f15640dc727389b1aa0071c2e483
SHA512e87a12b4a379e1959b38b546d4b37bfe425482e43bf07443bdf255cc20666b5992b85fbb629da30a82cec08626bf3aca43989b68c45e413f9f5511185aebf740