Analysis

  • max time kernel
    146s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/12/2022, 01:19

General

  • Target

    bd4fe9e82e9bb499e8ebf119416cd2f57d6f94ecf2fd2b7fb02f28ba071c411a.exe

  • Size

    1.1MB

  • MD5

    8846b0761255af29bd5fa2ed409c71ea

  • SHA1

    eeb349c0f99c6348d2bb564ab4f68fc637af25fb

  • SHA256

    bd4fe9e82e9bb499e8ebf119416cd2f57d6f94ecf2fd2b7fb02f28ba071c411a

  • SHA512

    90a9e551dced717241695075bd4e12e1f84858583b100801041647d8794f7c2ddc2de4d2592d1673b85f0a430f939d4aaa5bc45b47798d7c2660f35aacfa5368

  • SSDEEP

    24576:4hBlWCe04RvcOdMSsDxmYRtWGsa0leTiiqTJ:4hBLBWgmYRMQweT

Malware Config

Signatures

  • Sets file execution options in registry 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Modifies registry class 41 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bd4fe9e82e9bb499e8ebf119416cd2f57d6f94ecf2fd2b7fb02f28ba071c411a.exe
    "C:\Users\Admin\AppData\Local\Temp\bd4fe9e82e9bb499e8ebf119416cd2f57d6f94ecf2fd2b7fb02f28ba071c411a.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:448
    • C:\Users\Admin\AppData\Local\Temp\bd4fe9e82e9bb499e8ebf119416cd2f57d6f94ecf2fd2b7fb02f28ba071c411a.exe
      C:\Users\Admin\AppData\Local\Temp\bd4fe9e82e9bb499e8ebf119416cd2f57d6f94ecf2fd2b7fb02f28ba071c411a.exe
      2⤵
        PID:5020
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5020 -s 12
          3⤵
          • Program crash
          PID:540
      • C:\Windows\SysWOW64\regsvr32.exe
        "C:\Windows\System32\regsvr32.exe" /s C:\Windows\system32\xwr61087.dll
        2⤵
        • Sets file execution options in registry
        • Loads dropped DLL
        • Installs/modifies Browser Helper Object
        • Drops file in System32 directory
        • Modifies registry class
        PID:5100
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 5020 -ip 5020
      1⤵
        PID:2128

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Windows\SysWOW64\xwr61087.dll

              Filesize

              196KB

              MD5

              ae8d9f806941a55303375b03fa3ae77b

              SHA1

              5f83ad57d65ae8eb1acb8a74d0d7cc1dfa18b6ec

              SHA256

              c466b07cd702b18d05a0f85da15a89107b31b41a6f20044192010783ea5ed062

              SHA512

              0c78a5d45e5f2e498126fd9aacd9a064c31fd824ad28b438ea7de528326ed9153b1632239aeb44a61b7c8a573b12033b23500f32f370d379d357ab9596903c33

            • C:\Windows\SysWOW64\xwr61087.dll

              Filesize

              196KB

              MD5

              ae8d9f806941a55303375b03fa3ae77b

              SHA1

              5f83ad57d65ae8eb1acb8a74d0d7cc1dfa18b6ec

              SHA256

              c466b07cd702b18d05a0f85da15a89107b31b41a6f20044192010783ea5ed062

              SHA512

              0c78a5d45e5f2e498126fd9aacd9a064c31fd824ad28b438ea7de528326ed9153b1632239aeb44a61b7c8a573b12033b23500f32f370d379d357ab9596903c33