Analysis
-
max time kernel
187s -
max time network
215s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 11:16
Static task
static1
Behavioral task
behavioral1
Sample
eb2c258568c39bc27e324f829d928a9921f664ea750d2bc3a2f3a51e62d3ef34.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
eb2c258568c39bc27e324f829d928a9921f664ea750d2bc3a2f3a51e62d3ef34.exe
Resource
win10v2004-20221111-en
General
-
Target
eb2c258568c39bc27e324f829d928a9921f664ea750d2bc3a2f3a51e62d3ef34.exe
-
Size
209KB
-
MD5
092e0add784eeba4e827cf6ba4974697
-
SHA1
6a99174453742da9593e5f5aa2322004329c0667
-
SHA256
eb2c258568c39bc27e324f829d928a9921f664ea750d2bc3a2f3a51e62d3ef34
-
SHA512
e6b8a49823bfc325f0efc2ad735fe514fe8ae49b8d00d4b1e3011f9ca9493a23746daf7d26c3d8e76aed6136516a5c8aebe88d10aac77e1fd91430ee78f68862
-
SSDEEP
6144:6/RS6GzafQElV3mmqzMvS6GzafQElV3mmqzC:6/RN48V3mm/N48V3mmp
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run mbmexgp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe -
Executes dropped EXE 2 IoCs
pid Process 5100 mbmexgp.exe 4732 wcsydrv.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation eb2c258568c39bc27e324f829d928a9921f664ea750d2bc3a2f3a51e62d3ef34.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation mbmexgp.exe -
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce mbmexgp.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce mbmexgp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mbmexgp.exe" mbmexgp.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\CurrentVersion\Run wcsydrv.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce wcsydrv.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\CurrentVersion\Run mbmexgp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mbmexgp.exe" mbmexgp.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce wcsydrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" mbmexgp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings eb2c258568c39bc27e324f829d928a9921f664ea750d2bc3a2f3a51e62d3ef34.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 816 eb2c258568c39bc27e324f829d928a9921f664ea750d2bc3a2f3a51e62d3ef34.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 816 wrote to memory of 5100 816 eb2c258568c39bc27e324f829d928a9921f664ea750d2bc3a2f3a51e62d3ef34.exe 83 PID 816 wrote to memory of 5100 816 eb2c258568c39bc27e324f829d928a9921f664ea750d2bc3a2f3a51e62d3ef34.exe 83 PID 816 wrote to memory of 5100 816 eb2c258568c39bc27e324f829d928a9921f664ea750d2bc3a2f3a51e62d3ef34.exe 83 PID 5100 wrote to memory of 4732 5100 mbmexgp.exe 84 PID 5100 wrote to memory of 4732 5100 mbmexgp.exe 84 PID 5100 wrote to memory of 4732 5100 mbmexgp.exe 84 PID 816 wrote to memory of 3508 816 eb2c258568c39bc27e324f829d928a9921f664ea750d2bc3a2f3a51e62d3ef34.exe 85 PID 816 wrote to memory of 3508 816 eb2c258568c39bc27e324f829d928a9921f664ea750d2bc3a2f3a51e62d3ef34.exe 85 PID 816 wrote to memory of 3508 816 eb2c258568c39bc27e324f829d928a9921f664ea750d2bc3a2f3a51e62d3ef34.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb2c258568c39bc27e324f829d928a9921f664ea750d2bc3a2f3a51e62d3ef34.exe"C:\Users\Admin\AppData\Local\Temp\eb2c258568c39bc27e324f829d928a9921f664ea750d2bc3a2f3a51e62d3ef34.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Users\Admin\AppData\Local\Temp\mbmexgp.exe"C:\Users\Admin\AppData\Local\Temp\mbmexgp.exe"2⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Modifies WinLogon
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe"C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe" a3⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- Modifies WinLogon
PID:4732
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\hteo.vbs"2⤵PID:3508
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
243B
MD5b6160dedcf4889d526e3d85bcab88a38
SHA177c51dd9842f498e7127e30e0c28973be3002237
SHA256b7b50001b6c440cf3effb1ba837988eb9c69f24af1dd182f204c5e0ef23e7cf8
SHA5128f64b1b924358955b4b16584f9cca7aece0c2aba776c517f6889ff3238a5ac63b55144bfa4458d92dfc6583760bcd3721412996a15578ea7b10f960c97c7836c
-
Filesize
64KB
MD53f568b3289dbe148de0562c0c82b99d9
SHA137ace7dbadb88e9c881c7df1761b443d4837c1a6
SHA25600918eb2cd50827a542d5a34f54c4e373fb6e64f931368ed5ce1552aaa18fa5e
SHA5120d939177b53d52ce5612e28ca6a4b1402b39a7c192b092967d4ab842bc7b74716f2b2568a9af6fccc9279474b99ee959a1c4796eec78588a371e3e200a6dbe04
-
Filesize
64KB
MD53f568b3289dbe148de0562c0c82b99d9
SHA137ace7dbadb88e9c881c7df1761b443d4837c1a6
SHA25600918eb2cd50827a542d5a34f54c4e373fb6e64f931368ed5ce1552aaa18fa5e
SHA5120d939177b53d52ce5612e28ca6a4b1402b39a7c192b092967d4ab842bc7b74716f2b2568a9af6fccc9279474b99ee959a1c4796eec78588a371e3e200a6dbe04
-
Filesize
64KB
MD53f568b3289dbe148de0562c0c82b99d9
SHA137ace7dbadb88e9c881c7df1761b443d4837c1a6
SHA25600918eb2cd50827a542d5a34f54c4e373fb6e64f931368ed5ce1552aaa18fa5e
SHA5120d939177b53d52ce5612e28ca6a4b1402b39a7c192b092967d4ab842bc7b74716f2b2568a9af6fccc9279474b99ee959a1c4796eec78588a371e3e200a6dbe04
-
Filesize
64KB
MD53f568b3289dbe148de0562c0c82b99d9
SHA137ace7dbadb88e9c881c7df1761b443d4837c1a6
SHA25600918eb2cd50827a542d5a34f54c4e373fb6e64f931368ed5ce1552aaa18fa5e
SHA5120d939177b53d52ce5612e28ca6a4b1402b39a7c192b092967d4ab842bc7b74716f2b2568a9af6fccc9279474b99ee959a1c4796eec78588a371e3e200a6dbe04