Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04/12/2022, 14:16
Static task
static1
Behavioral task
behavioral1
Sample
ddb9fbe1466215b7fe544f6cdb700c36afbf8c79c76b9b0e27cf16efaa71c5ec.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ddb9fbe1466215b7fe544f6cdb700c36afbf8c79c76b9b0e27cf16efaa71c5ec.exe
Resource
win10v2004-20220812-en
General
-
Target
ddb9fbe1466215b7fe544f6cdb700c36afbf8c79c76b9b0e27cf16efaa71c5ec.exe
-
Size
33KB
-
MD5
72d83b61847efab6d09999506a4d7a18
-
SHA1
408dcace71fed3d6ec7c8f628ec84cbdebd7e108
-
SHA256
ddb9fbe1466215b7fe544f6cdb700c36afbf8c79c76b9b0e27cf16efaa71c5ec
-
SHA512
5d7b86aa56f2c1491bff40bb8e8c0180727f65ecf86785a25fc03cfd33cd655364743bc322357072eeca9e25ec8832466291172339dfd16376fcc92550044e33
-
SSDEEP
768:BDtodNkDnNQqajgp5yWmeF6qQ4wRbx6nV:BR9DnNQqacJmeF7gbx6nV
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4992 Win8.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 4964 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation ddb9fbe1466215b7fe544f6cdb700c36afbf8c79c76b9b0e27cf16efaa71c5ec.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\3406813a45cf8bdcd106619234d16e2b.exe Win8.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\3406813a45cf8bdcd106619234d16e2b.exe Win8.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\3406813a45cf8bdcd106619234d16e2b = "\"C:\\Users\\Admin\\AppData\\Roaming\\Win8.exe\" .." Win8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\3406813a45cf8bdcd106619234d16e2b = "\"C:\\Users\\Admin\\AppData\\Roaming\\Win8.exe\" .." Win8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 4992 Win8.exe 4992 Win8.exe 4992 Win8.exe 4992 Win8.exe 4992 Win8.exe 4992 Win8.exe 4992 Win8.exe 4992 Win8.exe 4992 Win8.exe 4992 Win8.exe 4992 Win8.exe 4992 Win8.exe 4992 Win8.exe 4992 Win8.exe 4992 Win8.exe 4992 Win8.exe 4992 Win8.exe 4992 Win8.exe 4992 Win8.exe 4992 Win8.exe 4992 Win8.exe 4992 Win8.exe 4992 Win8.exe 4992 Win8.exe 4992 Win8.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4992 Win8.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4728 wrote to memory of 4992 4728 ddb9fbe1466215b7fe544f6cdb700c36afbf8c79c76b9b0e27cf16efaa71c5ec.exe 81 PID 4728 wrote to memory of 4992 4728 ddb9fbe1466215b7fe544f6cdb700c36afbf8c79c76b9b0e27cf16efaa71c5ec.exe 81 PID 4728 wrote to memory of 4992 4728 ddb9fbe1466215b7fe544f6cdb700c36afbf8c79c76b9b0e27cf16efaa71c5ec.exe 81 PID 4992 wrote to memory of 4964 4992 Win8.exe 82 PID 4992 wrote to memory of 4964 4992 Win8.exe 82 PID 4992 wrote to memory of 4964 4992 Win8.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\ddb9fbe1466215b7fe544f6cdb700c36afbf8c79c76b9b0e27cf16efaa71c5ec.exe"C:\Users\Admin\AppData\Local\Temp\ddb9fbe1466215b7fe544f6cdb700c36afbf8c79c76b9b0e27cf16efaa71c5ec.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Users\Admin\AppData\Roaming\Win8.exe"C:\Users\Admin\AppData\Roaming\Win8.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\Win8.exe" "Win8.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:4964
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD572d83b61847efab6d09999506a4d7a18
SHA1408dcace71fed3d6ec7c8f628ec84cbdebd7e108
SHA256ddb9fbe1466215b7fe544f6cdb700c36afbf8c79c76b9b0e27cf16efaa71c5ec
SHA5125d7b86aa56f2c1491bff40bb8e8c0180727f65ecf86785a25fc03cfd33cd655364743bc322357072eeca9e25ec8832466291172339dfd16376fcc92550044e33
-
Filesize
33KB
MD572d83b61847efab6d09999506a4d7a18
SHA1408dcace71fed3d6ec7c8f628ec84cbdebd7e108
SHA256ddb9fbe1466215b7fe544f6cdb700c36afbf8c79c76b9b0e27cf16efaa71c5ec
SHA5125d7b86aa56f2c1491bff40bb8e8c0180727f65ecf86785a25fc03cfd33cd655364743bc322357072eeca9e25ec8832466291172339dfd16376fcc92550044e33