Analysis
-
max time kernel
154s -
max time network
180s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 15:43
Static task
static1
Behavioral task
behavioral1
Sample
d1bb5a0dabb475618f6c060feac490656ab056a52a28743240e2eb89432fc913.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d1bb5a0dabb475618f6c060feac490656ab056a52a28743240e2eb89432fc913.exe
Resource
win10v2004-20221111-en
General
-
Target
d1bb5a0dabb475618f6c060feac490656ab056a52a28743240e2eb89432fc913.exe
-
Size
352KB
-
MD5
238c16289e1d962ab8882b017a408bba
-
SHA1
3995a6c5542b7cdd5a1374ce812cfd38dc84675f
-
SHA256
d1bb5a0dabb475618f6c060feac490656ab056a52a28743240e2eb89432fc913
-
SHA512
b9dcde1a0211c189449c27d3286e83fa17e14cc74060580e4fa394d945be37425e5ab1039d700846be45f151756e2d6729c85d06738c48733df6beca37a778d4
-
SSDEEP
6144:zYBloapRSC7JTLXibKb1+EhX2fLFObaHPLwm5KW0WyxQnC5p0GWr6:zSyAXXibK5+EYJX5B39nypo6
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3208 kmbadqcufl.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation d1bb5a0dabb475618f6c060feac490656ab056a52a28743240e2eb89432fc913.exe -
Loads dropped DLL 1 IoCs
pid Process 3208 kmbadqcufl.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce d1bb5a0dabb475618f6c060feac490656ab056a52a28743240e2eb89432fc913.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 204 2988 WerFault.exe 83 4436 3208 WerFault.exe 93 -
Kills process with taskkill 1 IoCs
pid Process 1748 taskkill.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1236 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1748 taskkill.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 3208 kmbadqcufl.exe 3208 kmbadqcufl.exe 3208 kmbadqcufl.exe 3208 kmbadqcufl.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 3208 kmbadqcufl.exe 3208 kmbadqcufl.exe 3208 kmbadqcufl.exe 3208 kmbadqcufl.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2988 wrote to memory of 4284 2988 d1bb5a0dabb475618f6c060feac490656ab056a52a28743240e2eb89432fc913.exe 89 PID 2988 wrote to memory of 4284 2988 d1bb5a0dabb475618f6c060feac490656ab056a52a28743240e2eb89432fc913.exe 89 PID 2988 wrote to memory of 4284 2988 d1bb5a0dabb475618f6c060feac490656ab056a52a28743240e2eb89432fc913.exe 89 PID 4284 wrote to memory of 1748 4284 cmd.exe 91 PID 4284 wrote to memory of 1748 4284 cmd.exe 91 PID 4284 wrote to memory of 1748 4284 cmd.exe 91 PID 4284 wrote to memory of 1236 4284 cmd.exe 92 PID 4284 wrote to memory of 1236 4284 cmd.exe 92 PID 4284 wrote to memory of 1236 4284 cmd.exe 92 PID 4284 wrote to memory of 3208 4284 cmd.exe 93 PID 4284 wrote to memory of 3208 4284 cmd.exe 93 PID 4284 wrote to memory of 3208 4284 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1bb5a0dabb475618f6c060feac490656ab056a52a28743240e2eb89432fc913.exe"C:\Users\Admin\AppData\Local\Temp\d1bb5a0dabb475618f6c060feac490656ab056a52a28743240e2eb89432fc913.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2988 -s 5042⤵
- Program crash
PID:204
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /pid 2988 & ping -n 3 127.1 & del /f /q "C:\Users\Admin\AppData\Local\Temp\d1bb5a0dabb475618f6c060feac490656ab056a52a28743240e2eb89432fc913.exe" & start C:\Users\Admin\AppData\Local\KMBADQ~1.EXE -f2⤵
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /pid 29883⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1748
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 127.13⤵
- Runs ping.exe
PID:1236
-
-
C:\Users\Admin\AppData\Local\kmbadqcufl.exeC:\Users\Admin\AppData\Local\KMBADQ~1.EXE -f3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3208 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3208 -s 5284⤵
- Program crash
PID:4436
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2988 -ip 29881⤵PID:1120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 3208 -ip 32081⤵PID:3504
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
352KB
MD5238c16289e1d962ab8882b017a408bba
SHA13995a6c5542b7cdd5a1374ce812cfd38dc84675f
SHA256d1bb5a0dabb475618f6c060feac490656ab056a52a28743240e2eb89432fc913
SHA512b9dcde1a0211c189449c27d3286e83fa17e14cc74060580e4fa394d945be37425e5ab1039d700846be45f151756e2d6729c85d06738c48733df6beca37a778d4
-
Filesize
352KB
MD5238c16289e1d962ab8882b017a408bba
SHA13995a6c5542b7cdd5a1374ce812cfd38dc84675f
SHA256d1bb5a0dabb475618f6c060feac490656ab056a52a28743240e2eb89432fc913
SHA512b9dcde1a0211c189449c27d3286e83fa17e14cc74060580e4fa394d945be37425e5ab1039d700846be45f151756e2d6729c85d06738c48733df6beca37a778d4
-
Filesize
352KB
MD5238c16289e1d962ab8882b017a408bba
SHA13995a6c5542b7cdd5a1374ce812cfd38dc84675f
SHA256d1bb5a0dabb475618f6c060feac490656ab056a52a28743240e2eb89432fc913
SHA512b9dcde1a0211c189449c27d3286e83fa17e14cc74060580e4fa394d945be37425e5ab1039d700846be45f151756e2d6729c85d06738c48733df6beca37a778d4