Analysis
-
max time kernel
201s -
max time network
229s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 00:09
Static task
static1
Behavioral task
behavioral1
Sample
156f5bd5da56c6104fdb0d273662d5017803be1569dffac2e9407deedb788dec.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
156f5bd5da56c6104fdb0d273662d5017803be1569dffac2e9407deedb788dec.exe
Resource
win10v2004-20221111-en
General
-
Target
156f5bd5da56c6104fdb0d273662d5017803be1569dffac2e9407deedb788dec.exe
-
Size
557KB
-
MD5
bc6379ae1e56146f22c88bf4914a353e
-
SHA1
afadc381db622b58a86b70a6b80f78ef51fa4259
-
SHA256
156f5bd5da56c6104fdb0d273662d5017803be1569dffac2e9407deedb788dec
-
SHA512
2b035caf435aff5f7f55168c6f9e0309f3efb0f67eb9cf2781cbdb9e685fbb09fe52bf2ed41bb8404412c52352bd43c1a1f03f5c3646017e2d8f8960f1b898da
-
SSDEEP
12288:gr9kbp0xjqQOlh54sfwnzb+CchI8qrWuygQDhXCX:ghkbqxjD2AdzbwIZr0ZDg
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe = "C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\vbc.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\plugin.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\plugin.exe:*:Enabled:Windows Messanger" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe -
Executes dropped EXE 1 IoCs
pid Process 4488 Noose.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 156f5bd5da56c6104fdb0d273662d5017803be1569dffac2e9407deedb788dec.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Name.exe" 156f5bd5da56c6104fdb0d273662d5017803be1569dffac2e9407deedb788dec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3480 set thread context of 5024 3480 156f5bd5da56c6104fdb0d273662d5017803be1569dffac2e9407deedb788dec.exe 84 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 4 IoCs
pid Process 1748 reg.exe 1632 reg.exe 3060 reg.exe 540 reg.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: 1 5024 vbc.exe Token: SeCreateTokenPrivilege 5024 vbc.exe Token: SeAssignPrimaryTokenPrivilege 5024 vbc.exe Token: SeLockMemoryPrivilege 5024 vbc.exe Token: SeIncreaseQuotaPrivilege 5024 vbc.exe Token: SeMachineAccountPrivilege 5024 vbc.exe Token: SeTcbPrivilege 5024 vbc.exe Token: SeSecurityPrivilege 5024 vbc.exe Token: SeTakeOwnershipPrivilege 5024 vbc.exe Token: SeLoadDriverPrivilege 5024 vbc.exe Token: SeSystemProfilePrivilege 5024 vbc.exe Token: SeSystemtimePrivilege 5024 vbc.exe Token: SeProfSingleProcessPrivilege 5024 vbc.exe Token: SeIncBasePriorityPrivilege 5024 vbc.exe Token: SeCreatePagefilePrivilege 5024 vbc.exe Token: SeCreatePermanentPrivilege 5024 vbc.exe Token: SeBackupPrivilege 5024 vbc.exe Token: SeRestorePrivilege 5024 vbc.exe Token: SeShutdownPrivilege 5024 vbc.exe Token: SeDebugPrivilege 5024 vbc.exe Token: SeAuditPrivilege 5024 vbc.exe Token: SeSystemEnvironmentPrivilege 5024 vbc.exe Token: SeChangeNotifyPrivilege 5024 vbc.exe Token: SeRemoteShutdownPrivilege 5024 vbc.exe Token: SeUndockPrivilege 5024 vbc.exe Token: SeSyncAgentPrivilege 5024 vbc.exe Token: SeEnableDelegationPrivilege 5024 vbc.exe Token: SeManageVolumePrivilege 5024 vbc.exe Token: SeImpersonatePrivilege 5024 vbc.exe Token: SeCreateGlobalPrivilege 5024 vbc.exe Token: 31 5024 vbc.exe Token: 32 5024 vbc.exe Token: 33 5024 vbc.exe Token: 34 5024 vbc.exe Token: 35 5024 vbc.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 5024 vbc.exe 5024 vbc.exe 5024 vbc.exe 5024 vbc.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 3480 wrote to memory of 5024 3480 156f5bd5da56c6104fdb0d273662d5017803be1569dffac2e9407deedb788dec.exe 84 PID 3480 wrote to memory of 5024 3480 156f5bd5da56c6104fdb0d273662d5017803be1569dffac2e9407deedb788dec.exe 84 PID 3480 wrote to memory of 5024 3480 156f5bd5da56c6104fdb0d273662d5017803be1569dffac2e9407deedb788dec.exe 84 PID 3480 wrote to memory of 5024 3480 156f5bd5da56c6104fdb0d273662d5017803be1569dffac2e9407deedb788dec.exe 84 PID 3480 wrote to memory of 5024 3480 156f5bd5da56c6104fdb0d273662d5017803be1569dffac2e9407deedb788dec.exe 84 PID 3480 wrote to memory of 5024 3480 156f5bd5da56c6104fdb0d273662d5017803be1569dffac2e9407deedb788dec.exe 84 PID 3480 wrote to memory of 5024 3480 156f5bd5da56c6104fdb0d273662d5017803be1569dffac2e9407deedb788dec.exe 84 PID 3480 wrote to memory of 5024 3480 156f5bd5da56c6104fdb0d273662d5017803be1569dffac2e9407deedb788dec.exe 84 PID 5024 wrote to memory of 2680 5024 vbc.exe 85 PID 5024 wrote to memory of 2680 5024 vbc.exe 85 PID 5024 wrote to memory of 2680 5024 vbc.exe 85 PID 5024 wrote to memory of 4480 5024 vbc.exe 86 PID 5024 wrote to memory of 4480 5024 vbc.exe 86 PID 5024 wrote to memory of 4480 5024 vbc.exe 86 PID 5024 wrote to memory of 4812 5024 vbc.exe 88 PID 5024 wrote to memory of 4812 5024 vbc.exe 88 PID 5024 wrote to memory of 4812 5024 vbc.exe 88 PID 5024 wrote to memory of 3432 5024 vbc.exe 92 PID 5024 wrote to memory of 3432 5024 vbc.exe 92 PID 5024 wrote to memory of 3432 5024 vbc.exe 92 PID 3480 wrote to memory of 4488 3480 156f5bd5da56c6104fdb0d273662d5017803be1569dffac2e9407deedb788dec.exe 94 PID 3480 wrote to memory of 4488 3480 156f5bd5da56c6104fdb0d273662d5017803be1569dffac2e9407deedb788dec.exe 94 PID 2680 wrote to memory of 1748 2680 cmd.exe 93 PID 2680 wrote to memory of 1748 2680 cmd.exe 93 PID 2680 wrote to memory of 1748 2680 cmd.exe 93 PID 4480 wrote to memory of 1632 4480 cmd.exe 95 PID 4480 wrote to memory of 1632 4480 cmd.exe 95 PID 4480 wrote to memory of 1632 4480 cmd.exe 95 PID 4812 wrote to memory of 3060 4812 cmd.exe 96 PID 4812 wrote to memory of 3060 4812 cmd.exe 96 PID 4812 wrote to memory of 3060 4812 cmd.exe 96 PID 3432 wrote to memory of 540 3432 cmd.exe 97 PID 3432 wrote to memory of 540 3432 cmd.exe 97 PID 3432 wrote to memory of 540 3432 cmd.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\156f5bd5da56c6104fdb0d273662d5017803be1569dffac2e9407deedb788dec.exe"C:\Users\Admin\AppData\Local\Temp\156f5bd5da56c6104fdb0d273662d5017803be1569dffac2e9407deedb788dec.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- Modifies registry key
PID:1748
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /t REG_SZ /d "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe:*:Enabled:Windows Messanger" /f3⤵
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /t REG_SZ /d "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- Modifies registry key
PID:1632
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- Modifies registry key
PID:3060
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\plugin.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\plugin.exe:*:Enabled:Windows Messanger" /f3⤵
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\plugin.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\plugin.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- Modifies registry key
PID:540
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Noose.exe"C:\Users\Admin\AppData\Local\Temp\Noose.exe"2⤵
- Executes dropped EXE
PID:4488
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30KB
MD5eac6003f2f78d74d8f1a5e36d43d8a67
SHA1f5b9785a9024a1459fe044c3a4962e755945edfd
SHA25675bd6f6bc5b52b2c495e72d0cdf3119cb5e9270482c54d8305c7b364d77d407a
SHA512126eb4c2607e162d9e32bf119b177707ae09ebcd18f4cb8288b6b17959ca929087ca38b0a68a4f590e0ebac76b19bc550b2c6d1edca54503c457a309f76d8bb3
-
Filesize
30KB
MD5eac6003f2f78d74d8f1a5e36d43d8a67
SHA1f5b9785a9024a1459fe044c3a4962e755945edfd
SHA25675bd6f6bc5b52b2c495e72d0cdf3119cb5e9270482c54d8305c7b364d77d407a
SHA512126eb4c2607e162d9e32bf119b177707ae09ebcd18f4cb8288b6b17959ca929087ca38b0a68a4f590e0ebac76b19bc550b2c6d1edca54503c457a309f76d8bb3