Analysis
-
max time kernel
184s -
max time network
206s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
04/12/2022, 12:13
Static task
static1
Behavioral task
behavioral1
Sample
eeabaebc74cc6db99f09a70bc01aad474b53df339f2b22c7d5110d5560598cf9.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
eeabaebc74cc6db99f09a70bc01aad474b53df339f2b22c7d5110d5560598cf9.exe
Resource
win10v2004-20221111-en
General
-
Target
eeabaebc74cc6db99f09a70bc01aad474b53df339f2b22c7d5110d5560598cf9.exe
-
Size
1.0MB
-
MD5
9df4c15341df9c0ab5d20fafcb687077
-
SHA1
f4897f7a89db0b3f38b9c7931eafb99dcfe5f2d9
-
SHA256
eeabaebc74cc6db99f09a70bc01aad474b53df339f2b22c7d5110d5560598cf9
-
SHA512
74ac0d1007394ba9b5a491e60dc058ab0e7cd4b8b86ace7c23d0599092d71248fa1973849f07d9c317460c4d343ef34f822bf42c036e34a154a62b2037e7a6ec
-
SSDEEP
24576:Qk4slMippnVRuA+Rk3bwtXbyEnk02qFbHzQvo/:Q4MWnVRuA+Rsw9byEnr2qFbHUvm
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3192 Decrypted.exe -
resource yara_rule behavioral2/memory/2024-133-0x00000000001E0000-0x00000000001F1000-memory.dmp upx behavioral2/memory/2024-134-0x00000000024B0000-0x00000000024E8000-memory.dmp upx behavioral2/memory/2024-137-0x00000000001E0000-0x00000000001F1000-memory.dmp upx behavioral2/memory/2024-138-0x00000000024B0000-0x00000000024E8000-memory.dmp upx behavioral2/memory/2024-140-0x00000000001E0000-0x00000000001F1000-memory.dmp upx behavioral2/memory/2024-145-0x00000000001E0000-0x00000000001F1000-memory.dmp upx -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate eeabaebc74cc6db99f09a70bc01aad474b53df339f2b22c7d5110d5560598cf9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion eeabaebc74cc6db99f09a70bc01aad474b53df339f2b22c7d5110d5560598cf9.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation eeabaebc74cc6db99f09a70bc01aad474b53df339f2b22c7d5110d5560598cf9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 7 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 eeabaebc74cc6db99f09a70bc01aad474b53df339f2b22c7d5110d5560598cf9.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 eeabaebc74cc6db99f09a70bc01aad474b53df339f2b22c7d5110d5560598cf9.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 eeabaebc74cc6db99f09a70bc01aad474b53df339f2b22c7d5110d5560598cf9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier eeabaebc74cc6db99f09a70bc01aad474b53df339f2b22c7d5110d5560598cf9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString eeabaebc74cc6db99f09a70bc01aad474b53df339f2b22c7d5110d5560598cf9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier eeabaebc74cc6db99f09a70bc01aad474b53df339f2b22c7d5110d5560598cf9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet eeabaebc74cc6db99f09a70bc01aad474b53df339f2b22c7d5110d5560598cf9.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier eeabaebc74cc6db99f09a70bc01aad474b53df339f2b22c7d5110d5560598cf9.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3192 Decrypted.exe 3192 Decrypted.exe 3192 Decrypted.exe 3192 Decrypted.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2024 eeabaebc74cc6db99f09a70bc01aad474b53df339f2b22c7d5110d5560598cf9.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2024 wrote to memory of 3192 2024 eeabaebc74cc6db99f09a70bc01aad474b53df339f2b22c7d5110d5560598cf9.exe 86 PID 2024 wrote to memory of 3192 2024 eeabaebc74cc6db99f09a70bc01aad474b53df339f2b22c7d5110d5560598cf9.exe 86 PID 2024 wrote to memory of 3192 2024 eeabaebc74cc6db99f09a70bc01aad474b53df339f2b22c7d5110d5560598cf9.exe 86 PID 3192 wrote to memory of 764 3192 Decrypted.exe 44 PID 3192 wrote to memory of 764 3192 Decrypted.exe 44 PID 3192 wrote to memory of 764 3192 Decrypted.exe 44 PID 3192 wrote to memory of 764 3192 Decrypted.exe 44 PID 3192 wrote to memory of 764 3192 Decrypted.exe 44 PID 3192 wrote to memory of 764 3192 Decrypted.exe 44
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:764
-
C:\Users\Admin\AppData\Local\Temp\eeabaebc74cc6db99f09a70bc01aad474b53df339f2b22c7d5110d5560598cf9.exe"C:\Users\Admin\AppData\Local\Temp\eeabaebc74cc6db99f09a70bc01aad474b53df339f2b22c7d5110d5560598cf9.exe"2⤵
- Checks BIOS information in registry
- Checks computer location settings
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\Decrypted.exe"C:\Users\Admin\AppData\Local\Temp\Decrypted.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3192
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50KB
MD585d217a85fb6d1d6d03ef8fa76bad7cf
SHA1b77de1e8e3e22b0e989ea542de863b277834a92c
SHA2560ad533cb0a89239e9648e3ca680bf28c7f3ec9b20db6f69ae0b59a3328831d3e
SHA512602c8f57d75017dd481c6d22d56a96955a22d7a463f100bcc9f5687e514c54fbafd41997c89eec9f4f68fbd30df6e1521357f5a67202092fb4a1059e1b4bfbff
-
Filesize
50KB
MD585d217a85fb6d1d6d03ef8fa76bad7cf
SHA1b77de1e8e3e22b0e989ea542de863b277834a92c
SHA2560ad533cb0a89239e9648e3ca680bf28c7f3ec9b20db6f69ae0b59a3328831d3e
SHA512602c8f57d75017dd481c6d22d56a96955a22d7a463f100bcc9f5687e514c54fbafd41997c89eec9f4f68fbd30df6e1521357f5a67202092fb4a1059e1b4bfbff