Analysis
-
max time kernel
112s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2022 05:29
Static task
static1
Behavioral task
behavioral1
Sample
bb19f53b753eff2296d33a36eb4f78c68db58a16e8ba705314bab9323d53f59e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bb19f53b753eff2296d33a36eb4f78c68db58a16e8ba705314bab9323d53f59e.exe
Resource
win10v2004-20220812-en
General
-
Target
bb19f53b753eff2296d33a36eb4f78c68db58a16e8ba705314bab9323d53f59e.exe
-
Size
3.1MB
-
MD5
ad796cddffda8d111ba71bafc09473e6
-
SHA1
48069f57d229ede3d4999591bfa0204a56815a74
-
SHA256
bb19f53b753eff2296d33a36eb4f78c68db58a16e8ba705314bab9323d53f59e
-
SHA512
b27831fee3250a92aa4be4b7c65aae91cb239803e3045e8027fd9e0c5b1e6813e9e71dc92013f98bf8dfd8ba74c929af4586fad8c0a628ce5e89b0efa25e2134
-
SSDEEP
49152:3LBT/nj3GHEvytnxr+QFpf2w8btDJtZ/1yYorfS6AT9yLEBCxGPJ2Tpohpu:3FjWQQFp3EJJtZ/cr1BATcGy
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x0006000000022f70-134.dat acprotect behavioral2/files/0x0006000000022f70-135.dat acprotect -
Executes dropped EXE 2 IoCs
pid Process 4852 hh123.exe 2720 svchosb.exe -
resource yara_rule behavioral2/files/0x0006000000022f70-134.dat upx behavioral2/files/0x0006000000022f70-135.dat upx behavioral2/memory/4584-136-0x00000000025C0000-0x000000000262A000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation bb19f53b753eff2296d33a36eb4f78c68db58a16e8ba705314bab9323d53f59e.exe -
Loads dropped DLL 2 IoCs
pid Process 4584 bb19f53b753eff2296d33a36eb4f78c68db58a16e8ba705314bab9323d53f59e.exe 4584 bb19f53b753eff2296d33a36eb4f78c68db58a16e8ba705314bab9323d53f59e.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\svchosb.exe" svchosb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run svchosb.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: bb19f53b753eff2296d33a36eb4f78c68db58a16e8ba705314bab9323d53f59e.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 27 cmyip.com -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\svchosb.exe bb19f53b753eff2296d33a36eb4f78c68db58a16e8ba705314bab9323d53f59e.exe File opened for modification C:\Windows\SysWOW64\svchosb.exe bb19f53b753eff2296d33a36eb4f78c68db58a16e8ba705314bab9323d53f59e.exe File created C:\Windows\SysWOW64\svchosb.exe svchosb.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\server.txt svchosb.exe File created C:\Windows\ip.txt svchosb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4584 bb19f53b753eff2296d33a36eb4f78c68db58a16e8ba705314bab9323d53f59e.exe 4584 bb19f53b753eff2296d33a36eb4f78c68db58a16e8ba705314bab9323d53f59e.exe 4852 hh123.exe 4852 hh123.exe 4584 bb19f53b753eff2296d33a36eb4f78c68db58a16e8ba705314bab9323d53f59e.exe 4584 bb19f53b753eff2296d33a36eb4f78c68db58a16e8ba705314bab9323d53f59e.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4708 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4708 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4584 bb19f53b753eff2296d33a36eb4f78c68db58a16e8ba705314bab9323d53f59e.exe 4584 bb19f53b753eff2296d33a36eb4f78c68db58a16e8ba705314bab9323d53f59e.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4584 wrote to memory of 4852 4584 bb19f53b753eff2296d33a36eb4f78c68db58a16e8ba705314bab9323d53f59e.exe 80 PID 4584 wrote to memory of 4852 4584 bb19f53b753eff2296d33a36eb4f78c68db58a16e8ba705314bab9323d53f59e.exe 80 PID 4584 wrote to memory of 4852 4584 bb19f53b753eff2296d33a36eb4f78c68db58a16e8ba705314bab9323d53f59e.exe 80 PID 4584 wrote to memory of 2720 4584 bb19f53b753eff2296d33a36eb4f78c68db58a16e8ba705314bab9323d53f59e.exe 82 PID 4584 wrote to memory of 2720 4584 bb19f53b753eff2296d33a36eb4f78c68db58a16e8ba705314bab9323d53f59e.exe 82 PID 4584 wrote to memory of 2720 4584 bb19f53b753eff2296d33a36eb4f78c68db58a16e8ba705314bab9323d53f59e.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb19f53b753eff2296d33a36eb4f78c68db58a16e8ba705314bab9323d53f59e.exe"C:\Users\Admin\AppData\Local\Temp\bb19f53b753eff2296d33a36eb4f78c68db58a16e8ba705314bab9323d53f59e.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Users\Admin\AppData\Local\Temp\MMBPlayer\hh123.exe"C:\Users\Admin\AppData\Local\Temp\MMBPlayer\hh123.exe" killprocess svchosb.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4852
-
-
C:\Windows\SysWOW64\svchosb.exe"C:\Windows\system32\svchosb.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
PID:2720
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x41c 0x2401⤵
- Suspicious use of AdjustPrivilegeToken
PID:4708
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160KB
MD5aac005d1197cba6c0f9a725c889d489d
SHA1b31f7126dd1aea03d58cd33a6b9a49685471a5e2
SHA256a584007ac2173048bb8f6e94022b661dc955105d39fcb206d7df339abfee661d
SHA512b88331674f869221724361afcb687d4104ce9381f074b67816af13110365e2ff055d5e31638e868c1d5ca0c871d87da69fb6eba3daca097b104ed9ccf0a89e8f
-
Filesize
160KB
MD5aac005d1197cba6c0f9a725c889d489d
SHA1b31f7126dd1aea03d58cd33a6b9a49685471a5e2
SHA256a584007ac2173048bb8f6e94022b661dc955105d39fcb206d7df339abfee661d
SHA512b88331674f869221724361afcb687d4104ce9381f074b67816af13110365e2ff055d5e31638e868c1d5ca0c871d87da69fb6eba3daca097b104ed9ccf0a89e8f
-
Filesize
32KB
MD5bb6c6f99dfa35d705592909772f1e261
SHA12ed55e5210b4e662c8bddc0dfdce06ab781f58b3
SHA25666f63fabc82ffa2d4a3821cb21243dce42e279bb5d795b45ff50ddec700826e1
SHA51296244d07c4788f7b743e682073de3840fbec39d54f3996157aba405bab2deac2625af1962dc86e6c968c064c3698b45adfa47e9b4e6074bf2014b4f79ff1004c
-
Filesize
32KB
MD5bb6c6f99dfa35d705592909772f1e261
SHA12ed55e5210b4e662c8bddc0dfdce06ab781f58b3
SHA25666f63fabc82ffa2d4a3821cb21243dce42e279bb5d795b45ff50ddec700826e1
SHA51296244d07c4788f7b743e682073de3840fbec39d54f3996157aba405bab2deac2625af1962dc86e6c968c064c3698b45adfa47e9b4e6074bf2014b4f79ff1004c
-
Filesize
187KB
MD529fd6bf2fc8522976b419cc535bd6414
SHA170e73681cd6e1e654211990fec65839a7bfa6931
SHA25685002cb7166742c73ca55d93d2c0b1542b82f00968e3e22decff6acb7bd66841
SHA512ed546285c40c804248b9735cad1903cc494d62f32bed51b0ace2c2c4956620fce0c32e322db87ee246ba2a6e3b7cffb748cd8d2dd06bd84da37dfa6aef5f200a
-
Filesize
187KB
MD529fd6bf2fc8522976b419cc535bd6414
SHA170e73681cd6e1e654211990fec65839a7bfa6931
SHA25685002cb7166742c73ca55d93d2c0b1542b82f00968e3e22decff6acb7bd66841
SHA512ed546285c40c804248b9735cad1903cc494d62f32bed51b0ace2c2c4956620fce0c32e322db87ee246ba2a6e3b7cffb748cd8d2dd06bd84da37dfa6aef5f200a