Analysis
-
max time kernel
189s -
max time network
212s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 12:46
Static task
static1
Behavioral task
behavioral1
Sample
8f2b449f573a92140a2c47097b7a3d74b75f7101daf36c538ed2ae2e766451ca.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8f2b449f573a92140a2c47097b7a3d74b75f7101daf36c538ed2ae2e766451ca.exe
Resource
win10v2004-20221111-en
General
-
Target
8f2b449f573a92140a2c47097b7a3d74b75f7101daf36c538ed2ae2e766451ca.exe
-
Size
133KB
-
MD5
fbf5cb4b73ce813eb85a6ab501a84f6c
-
SHA1
1a9983754716d96e827377ccac96f5ec7e16f42f
-
SHA256
8f2b449f573a92140a2c47097b7a3d74b75f7101daf36c538ed2ae2e766451ca
-
SHA512
ed825c4ddf0509a1fdaed7c2a2a23878ac95f26c3cf1a1295e782b51812bffcc054ceef084b0637bb090737e50e359c42ebd9c60cfc9958d13fc59232052eb9f
-
SSDEEP
1536:609kselPdFsYl5GDe3GeuKEZzwd1joWRv02rd9cqCmh6DY5atOXPQ6DYu8O/7f:60L65GaSu5oWRv0SJVPDkO/D
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1584 xhwtqgaa.exe -
Stops running service(s) 3 TTPs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation Rundll32.exe -
Loads dropped DLL 2 IoCs
pid Process 1888 Rundll32.exe 1584 xhwtqgaa.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\system = "C:\\Windows\\system32\\system.exe" xhwtqgaa.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\tlbongaa.dll 8f2b449f573a92140a2c47097b7a3d74b75f7101daf36c538ed2ae2e766451ca.exe File created C:\Windows\SysWOW64\xhwtqgaa.exe 8f2b449f573a92140a2c47097b7a3d74b75f7101daf36c538ed2ae2e766451ca.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files\AAV\CDriver.sys Rundll32.exe -
Launches sc.exe 7 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2184 sc.exe 3728 sc.exe 532 sc.exe 2920 sc.exe 4144 sc.exe 3128 sc.exe 4652 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1888 Rundll32.exe 1888 Rundll32.exe 1888 Rundll32.exe 1888 Rundll32.exe 1888 Rundll32.exe 1888 Rundll32.exe 1888 Rundll32.exe 1888 Rundll32.exe 1888 Rundll32.exe 1888 Rundll32.exe 1888 Rundll32.exe 1888 Rundll32.exe 1888 Rundll32.exe 1888 Rundll32.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 648 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4536 8f2b449f573a92140a2c47097b7a3d74b75f7101daf36c538ed2ae2e766451ca.exe -
Suspicious use of WriteProcessMemory 57 IoCs
description pid Process procid_target PID 4536 wrote to memory of 1888 4536 8f2b449f573a92140a2c47097b7a3d74b75f7101daf36c538ed2ae2e766451ca.exe 84 PID 4536 wrote to memory of 1888 4536 8f2b449f573a92140a2c47097b7a3d74b75f7101daf36c538ed2ae2e766451ca.exe 84 PID 4536 wrote to memory of 1888 4536 8f2b449f573a92140a2c47097b7a3d74b75f7101daf36c538ed2ae2e766451ca.exe 84 PID 1888 wrote to memory of 4432 1888 Rundll32.exe 85 PID 1888 wrote to memory of 4432 1888 Rundll32.exe 85 PID 1888 wrote to memory of 4432 1888 Rundll32.exe 85 PID 1888 wrote to memory of 2884 1888 Rundll32.exe 86 PID 1888 wrote to memory of 2884 1888 Rundll32.exe 86 PID 1888 wrote to memory of 2884 1888 Rundll32.exe 86 PID 1888 wrote to memory of 3728 1888 Rundll32.exe 90 PID 1888 wrote to memory of 3728 1888 Rundll32.exe 90 PID 1888 wrote to memory of 3728 1888 Rundll32.exe 90 PID 1888 wrote to memory of 2184 1888 Rundll32.exe 89 PID 1888 wrote to memory of 2184 1888 Rundll32.exe 89 PID 1888 wrote to memory of 2184 1888 Rundll32.exe 89 PID 1888 wrote to memory of 2920 1888 Rundll32.exe 94 PID 1888 wrote to memory of 2920 1888 Rundll32.exe 94 PID 1888 wrote to memory of 2920 1888 Rundll32.exe 94 PID 1888 wrote to memory of 532 1888 Rundll32.exe 93 PID 1888 wrote to memory of 532 1888 Rundll32.exe 93 PID 1888 wrote to memory of 532 1888 Rundll32.exe 93 PID 1888 wrote to memory of 4144 1888 Rundll32.exe 95 PID 1888 wrote to memory of 4144 1888 Rundll32.exe 95 PID 1888 wrote to memory of 4144 1888 Rundll32.exe 95 PID 1888 wrote to memory of 3128 1888 Rundll32.exe 98 PID 1888 wrote to memory of 3128 1888 Rundll32.exe 98 PID 1888 wrote to memory of 3128 1888 Rundll32.exe 98 PID 1888 wrote to memory of 4536 1888 Rundll32.exe 81 PID 1888 wrote to memory of 4536 1888 Rundll32.exe 81 PID 1888 wrote to memory of 4432 1888 Rundll32.exe 85 PID 1888 wrote to memory of 4432 1888 Rundll32.exe 85 PID 1888 wrote to memory of 2884 1888 Rundll32.exe 86 PID 1888 wrote to memory of 2884 1888 Rundll32.exe 86 PID 1888 wrote to memory of 3728 1888 Rundll32.exe 90 PID 1888 wrote to memory of 3728 1888 Rundll32.exe 90 PID 1888 wrote to memory of 2184 1888 Rundll32.exe 89 PID 1888 wrote to memory of 2184 1888 Rundll32.exe 89 PID 1888 wrote to memory of 2920 1888 Rundll32.exe 94 PID 1888 wrote to memory of 2920 1888 Rundll32.exe 94 PID 1888 wrote to memory of 532 1888 Rundll32.exe 93 PID 1888 wrote to memory of 532 1888 Rundll32.exe 93 PID 1888 wrote to memory of 4144 1888 Rundll32.exe 95 PID 1888 wrote to memory of 4144 1888 Rundll32.exe 95 PID 1888 wrote to memory of 3128 1888 Rundll32.exe 98 PID 1888 wrote to memory of 3128 1888 Rundll32.exe 98 PID 4432 wrote to memory of 4068 4432 net.exe 101 PID 4432 wrote to memory of 4068 4432 net.exe 101 PID 4432 wrote to memory of 4068 4432 net.exe 101 PID 2884 wrote to memory of 4088 2884 net.exe 102 PID 2884 wrote to memory of 4088 2884 net.exe 102 PID 2884 wrote to memory of 4088 2884 net.exe 102 PID 1888 wrote to memory of 4652 1888 Rundll32.exe 103 PID 1888 wrote to memory of 4652 1888 Rundll32.exe 103 PID 1888 wrote to memory of 4652 1888 Rundll32.exe 103 PID 4536 wrote to memory of 1584 4536 8f2b449f573a92140a2c47097b7a3d74b75f7101daf36c538ed2ae2e766451ca.exe 105 PID 4536 wrote to memory of 1584 4536 8f2b449f573a92140a2c47097b7a3d74b75f7101daf36c538ed2ae2e766451ca.exe 105 PID 4536 wrote to memory of 1584 4536 8f2b449f573a92140a2c47097b7a3d74b75f7101daf36c538ed2ae2e766451ca.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f2b449f573a92140a2c47097b7a3d74b75f7101daf36c538ed2ae2e766451ca.exe"C:\Users\Admin\AppData\Local\Temp\8f2b449f573a92140a2c47097b7a3d74b75f7101daf36c538ed2ae2e766451ca.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Windows\SysWOW64\Rundll32.exeRundll32 C:\Windows\system32\tlbongaa.dll Exbcute2⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵PID:4068
-
-
-
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵PID:4088
-
-
-
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
PID:2184
-
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
PID:3728
-
-
C:\Windows\SysWOW64\sc.exesc delete ZhuDongFangYu3⤵
- Launches sc.exe
PID:532
-
-
C:\Windows\SysWOW64\sc.exesc stop ZhuDongFangYu3⤵
- Launches sc.exe
PID:2920
-
-
C:\Windows\SysWOW64\sc.exesc stop 360rp3⤵
- Launches sc.exe
PID:4144
-
-
C:\Windows\SysWOW64\sc.exesc delete 360rp3⤵
- Launches sc.exe
PID:3128
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" stop PolicyAgent3⤵
- Launches sc.exe
PID:4652
-
-
-
C:\Windows\SysWOW64\xhwtqgaa.exeC:\Windows\system32\xhwtqgaa.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:1584
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD56c7cdd25c2cb0073306eb22aebfc663f
SHA1a1eba8ab49272b9852fe6a543677e8af36271248
SHA25658280e3572333f97a7cf9f33e8d31dc26a98b6535965ebd0bde82249fc9bf705
SHA51217344e07b9e9b2cd6ae4237d7f310732462f9cbb8656883607d7a1a4090e869265f92a6da1718dee50b1375b91583de60c6bd9e7e8db6b6e45e33f4b894365d6
-
Filesize
75KB
MD5880f130092d44064030eda33bf693a1b
SHA1f5a1db60845502afb099721236d4f34f323472d8
SHA2569f088fef88a8b49d5f8d264b05c9440536fbcfdbd0f9cdaf29137f226bb2e9c6
SHA512d35d510d2e99602e23a0f6e7246dfd578a3b01773499fd8c4386c1d23e7d7fbf0fb4e2494d67ba5ef31950c90227b06b953d09e3ad5f5c9f50ce6042f24b2c74
-
Filesize
75KB
MD5880f130092d44064030eda33bf693a1b
SHA1f5a1db60845502afb099721236d4f34f323472d8
SHA2569f088fef88a8b49d5f8d264b05c9440536fbcfdbd0f9cdaf29137f226bb2e9c6
SHA512d35d510d2e99602e23a0f6e7246dfd578a3b01773499fd8c4386c1d23e7d7fbf0fb4e2494d67ba5ef31950c90227b06b953d09e3ad5f5c9f50ce6042f24b2c74
-
Filesize
15KB
MD5ecaa6afefb9034c3184397845755c620
SHA18e9e502ad06ac13f25f0370fecb591bcdb88dd5d
SHA25612908176561536320ce309870bc15206dbadd84c602164e6b76bb75f4748f1c3
SHA5120d16413c2db64678453f0b83ce7e8ada58f4b629575afc19c820b8e237fbe2b35abea852c3f56b1158f30fa718b92c12b9078f9e43abba3bb673b8b013a117ed
-
Filesize
15KB
MD5ecaa6afefb9034c3184397845755c620
SHA18e9e502ad06ac13f25f0370fecb591bcdb88dd5d
SHA25612908176561536320ce309870bc15206dbadd84c602164e6b76bb75f4748f1c3
SHA5120d16413c2db64678453f0b83ce7e8ada58f4b629575afc19c820b8e237fbe2b35abea852c3f56b1158f30fa718b92c12b9078f9e43abba3bb673b8b013a117ed