Analysis
-
max time kernel
91s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 06:20
Behavioral task
behavioral1
Sample
d041b285dedc222dce5607c877081f8163d264c68a1d436c4c163dc002aa1757.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d041b285dedc222dce5607c877081f8163d264c68a1d436c4c163dc002aa1757.exe
Resource
win10v2004-20220812-en
General
-
Target
d041b285dedc222dce5607c877081f8163d264c68a1d436c4c163dc002aa1757.exe
-
Size
56KB
-
MD5
169c85a44976f7feff6402ffcd0ce209
-
SHA1
f8b39e73117d494d511d9cb3e694c07ba109a97b
-
SHA256
d041b285dedc222dce5607c877081f8163d264c68a1d436c4c163dc002aa1757
-
SHA512
ab8ac39f34af5980f2cf0fe23130b380a247592c558adca178082fc4398ce99a2c4cecb00285ae8c5fca2d08081096aff5cc4c4eb8db67dfb18c435eaba003f8
-
SSDEEP
768:hFYThrPE0fq2Gh/HBz5AOqVAMwgcVyx9GPxBWrlaOV4eLTOndPeN4OKtHIjVqOmr:cThc1h7qVAMwJyxM3WaPeLqdPeNstAXs
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1796 System64.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7890g421-b1gf-14d0-89bb-0090ce808e85} d041b285dedc222dce5607c877081f8163d264c68a1d436c4c163dc002aa1757.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7890g421-b1gf-14d0-89bb-0090ce808e85}\StubPath = "C:\\Windows\\system32\\System64.exe" d041b285dedc222dce5607c877081f8163d264c68a1d436c4c163dc002aa1757.exe -
resource yara_rule behavioral2/memory/1684-132-0x0000000000400000-0x000000000042A200-memory.dmp upx behavioral2/memory/1684-133-0x0000000000400000-0x000000000042A200-memory.dmp upx behavioral2/files/0x000c000000022f59-135.dat upx behavioral2/files/0x000c000000022f59-136.dat upx behavioral2/files/0x000c000000022f59-137.dat upx behavioral2/files/0x000c000000022f59-138.dat upx behavioral2/memory/1684-139-0x0000000000400000-0x000000000042A200-memory.dmp upx behavioral2/memory/4944-141-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/4944-144-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/4944-143-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/4944-142-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/1796-146-0x0000000000400000-0x000000000042A200-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation d041b285dedc222dce5607c877081f8163d264c68a1d436c4c163dc002aa1757.exe -
Loads dropped DLL 2 IoCs
pid Process 1796 System64.exe 1796 System64.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\System64.exe d041b285dedc222dce5607c877081f8163d264c68a1d436c4c163dc002aa1757.exe File opened for modification C:\Windows\SysWOW64\System64.exe d041b285dedc222dce5607c877081f8163d264c68a1d436c4c163dc002aa1757.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1796 set thread context of 4944 1796 System64.exe 79 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1012 4944 WerFault.exe 79 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1796 System64.exe 1796 System64.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1684 wrote to memory of 1796 1684 d041b285dedc222dce5607c877081f8163d264c68a1d436c4c163dc002aa1757.exe 78 PID 1684 wrote to memory of 1796 1684 d041b285dedc222dce5607c877081f8163d264c68a1d436c4c163dc002aa1757.exe 78 PID 1684 wrote to memory of 1796 1684 d041b285dedc222dce5607c877081f8163d264c68a1d436c4c163dc002aa1757.exe 78 PID 1796 wrote to memory of 4944 1796 System64.exe 79 PID 1796 wrote to memory of 4944 1796 System64.exe 79 PID 1796 wrote to memory of 4944 1796 System64.exe 79 PID 1796 wrote to memory of 4944 1796 System64.exe 79 PID 1796 wrote to memory of 4944 1796 System64.exe 79 PID 1796 wrote to memory of 4944 1796 System64.exe 79 PID 1796 wrote to memory of 4944 1796 System64.exe 79 PID 1796 wrote to memory of 4944 1796 System64.exe 79 PID 1796 wrote to memory of 4944 1796 System64.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\d041b285dedc222dce5607c877081f8163d264c68a1d436c4c163dc002aa1757.exe"C:\Users\Admin\AppData\Local\Temp\d041b285dedc222dce5607c877081f8163d264c68a1d436c4c163dc002aa1757.exe"1⤵
- Modifies Installed Components in the registry
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\System64.exe"C:\Windows\system32\System64.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\SysWOW64\userinit.exe"C:\Windows\system32\userinit.exe"3⤵PID:4944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4944 -s 124⤵
- Program crash
PID:1012
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4944 -ip 49441⤵PID:4892
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD5169c85a44976f7feff6402ffcd0ce209
SHA1f8b39e73117d494d511d9cb3e694c07ba109a97b
SHA256d041b285dedc222dce5607c877081f8163d264c68a1d436c4c163dc002aa1757
SHA512ab8ac39f34af5980f2cf0fe23130b380a247592c558adca178082fc4398ce99a2c4cecb00285ae8c5fca2d08081096aff5cc4c4eb8db67dfb18c435eaba003f8
-
Filesize
56KB
MD5169c85a44976f7feff6402ffcd0ce209
SHA1f8b39e73117d494d511d9cb3e694c07ba109a97b
SHA256d041b285dedc222dce5607c877081f8163d264c68a1d436c4c163dc002aa1757
SHA512ab8ac39f34af5980f2cf0fe23130b380a247592c558adca178082fc4398ce99a2c4cecb00285ae8c5fca2d08081096aff5cc4c4eb8db67dfb18c435eaba003f8
-
Filesize
56KB
MD5169c85a44976f7feff6402ffcd0ce209
SHA1f8b39e73117d494d511d9cb3e694c07ba109a97b
SHA256d041b285dedc222dce5607c877081f8163d264c68a1d436c4c163dc002aa1757
SHA512ab8ac39f34af5980f2cf0fe23130b380a247592c558adca178082fc4398ce99a2c4cecb00285ae8c5fca2d08081096aff5cc4c4eb8db67dfb18c435eaba003f8
-
Filesize
56KB
MD5169c85a44976f7feff6402ffcd0ce209
SHA1f8b39e73117d494d511d9cb3e694c07ba109a97b
SHA256d041b285dedc222dce5607c877081f8163d264c68a1d436c4c163dc002aa1757
SHA512ab8ac39f34af5980f2cf0fe23130b380a247592c558adca178082fc4398ce99a2c4cecb00285ae8c5fca2d08081096aff5cc4c4eb8db67dfb18c435eaba003f8