Analysis
-
max time kernel
148s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
08-12-2022 01:52
Static task
static1
Behavioral task
behavioral1
Sample
3dd65f1a69d9bfc66ac90f94418e7038bb7716f55b2b75b2926a1e026ebaa093.exe
Resource
win7-20220812-en
General
-
Target
3dd65f1a69d9bfc66ac90f94418e7038bb7716f55b2b75b2926a1e026ebaa093.exe
-
Size
1.1MB
-
MD5
78c60cf7fbdfb30416050544a80ab48e
-
SHA1
a3f2348dc1a1ad60f1cbdc269632da2b4245ac65
-
SHA256
3dd65f1a69d9bfc66ac90f94418e7038bb7716f55b2b75b2926a1e026ebaa093
-
SHA512
363a3637186a87a8f5beceec59e579b4ccae86f87ab5b3536ac5c0cfc49961e840a5f6de6bac567569a3aa1bcd280a1abac7ddcd102ba623cac8250f8868bdc0
-
SSDEEP
24576:cL4LJWJYb9gCJysH0sF/xikvcKw7xWho8L64:dLJWJceIFJho+Z
Malware Config
Extracted
formbook
wnoa
Anzfj8CstzWn/Ik=
BkhCB8WrOvIUcY78lw==
xEyLf4okJGEBag18DTzNfYc8/tJTCyY=
L8YF7D0dJmDN2XbqnL6BMPM=
pLq2gHn54xib667ul/0cGeUUZA==
bKjcinHr8mKS6qLfjA==
n/YN69yEx3KoUAU52DiE+IS5ItJTCyY=
BRQILrmcFxdJkIE=
e7itYBn9mZWx1FOTUzskZA==
e7Gqlb+Fsy3d+bramPc=
SV5QF+PEQe4c7onu
F6D7r3RAggSr98cs+mWjCY/KQw53Diw=
lqixnJdBnCAJdelB0L6BMPM=
N8Y0Fx2lwnaYJNQg4iUaGeUUZA==
4tF/NC6/DfUpRbGngLVx
oLuerEDAN+8c7onu
hpiWgzD7vb4c7onu
twgjE4g2SQIjRbGngLVx
G26ZgMF1Wp4/iTtpPm9sMvU=
SQaUJPgO/kyg
Ucg8IphECQYbMq+ngLVx
J2dD3octbFc60KDm
xlOEgS/ptO5niyOXQKd1aH48GtZ8UWKw
li56Eb2eMRSV57ramPc=
duJHbXkdcvXngUFpPm9sMvU=
W5h/Lrfk6zWn/Ik=
G1yZRV9I//0c7onu
y0dmNfq0A4Nova/mjg==
B4DZoqY5OW0HnrramPc=
YJSRb/GBAb3eNVPLhA==
+TyEEoIWmFiR3E1VJpHuZg==
py6kg3jw92ZT6afr1wcxbg==
k6sg4tLiQ+4c7onu
MWpjMqEUl7ZvtF8mJ53+PXZOcw==
H1qOMl44QbNfqW/Dl6snyZEKtT8=
E6QLu/abKSZguNIEncRz
ixBYSzcO/kyg
F1RcRbMWi0FV8J7jow0gGeUUZA==
jwZB3BD081j/FIG5UIC/JrTyEy0Rmw==
AlpffYTlujWn/Ik=
FEBlUVDU4Uk00pLujMIDhlDGPhIZEmiE+A==
UZy+vUTbsjWn/Ik=
DTY1CtqLy3yr+4nz1wcxbg==
Al6PizMF1tHzRw1kLqBxbHLxNhH/
cMgJpt2+ve+R5rramPc=
5FhuWUa2vzPlKAtxOrJelqdo
v9TRhD8RcSxZ880r7mJxqu6wOM5SR/bD8A==
DnZ5UlrJpxLG8LramPc=
QX6HThLyczdcva/mjg==
70yPKeKb8KqjwTF2OrRelqdo
+zoxWYhTmD9jva/mjg==
Soi4VP2zEwIkObcBsOEJ7sTMyFL3
2PPotB76h3/tgGDOnAJ/Mfk=
2ic+Fnzoa1rQdhxmKo19uQkBEy0Rmw==
wg1N7iTFVUhohna5TuA=
dPhD5Jt9DMa7B9lKJxDPzdeEaSkUjw==
0idWB7cp0AQ=
70BQJqkXoh1F1w==
p+wWDgd+kAizva/mjg==
idQOGiyzCjwvzg==
9G++w0HFTkFtsHDEUbNelqdo
xhsq/fqEjtV7zHz7vC2MFgfFcy7phg==
Y+YrMrw6u7Yc7onu
uAUf/F/1tLoc7onu
promociones-ec.com
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
3dd65f1a69d9bfc66ac90f94418e7038bb7716f55b2b75b2926a1e026ebaa093.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 3dd65f1a69d9bfc66ac90f94418e7038bb7716f55b2b75b2926a1e026ebaa093.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
3dd65f1a69d9bfc66ac90f94418e7038bb7716f55b2b75b2926a1e026ebaa093.exedescription pid process target process PID 4740 set thread context of 3208 4740 3dd65f1a69d9bfc66ac90f94418e7038bb7716f55b2b75b2926a1e026ebaa093.exe 3dd65f1a69d9bfc66ac90f94418e7038bb7716f55b2b75b2926a1e026ebaa093.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
powershell.exe3dd65f1a69d9bfc66ac90f94418e7038bb7716f55b2b75b2926a1e026ebaa093.exepid process 500 powershell.exe 500 powershell.exe 3208 3dd65f1a69d9bfc66ac90f94418e7038bb7716f55b2b75b2926a1e026ebaa093.exe 3208 3dd65f1a69d9bfc66ac90f94418e7038bb7716f55b2b75b2926a1e026ebaa093.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 500 powershell.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
3dd65f1a69d9bfc66ac90f94418e7038bb7716f55b2b75b2926a1e026ebaa093.exedescription pid process target process PID 4740 wrote to memory of 500 4740 3dd65f1a69d9bfc66ac90f94418e7038bb7716f55b2b75b2926a1e026ebaa093.exe powershell.exe PID 4740 wrote to memory of 500 4740 3dd65f1a69d9bfc66ac90f94418e7038bb7716f55b2b75b2926a1e026ebaa093.exe powershell.exe PID 4740 wrote to memory of 500 4740 3dd65f1a69d9bfc66ac90f94418e7038bb7716f55b2b75b2926a1e026ebaa093.exe powershell.exe PID 4740 wrote to memory of 4500 4740 3dd65f1a69d9bfc66ac90f94418e7038bb7716f55b2b75b2926a1e026ebaa093.exe schtasks.exe PID 4740 wrote to memory of 4500 4740 3dd65f1a69d9bfc66ac90f94418e7038bb7716f55b2b75b2926a1e026ebaa093.exe schtasks.exe PID 4740 wrote to memory of 4500 4740 3dd65f1a69d9bfc66ac90f94418e7038bb7716f55b2b75b2926a1e026ebaa093.exe schtasks.exe PID 4740 wrote to memory of 3208 4740 3dd65f1a69d9bfc66ac90f94418e7038bb7716f55b2b75b2926a1e026ebaa093.exe 3dd65f1a69d9bfc66ac90f94418e7038bb7716f55b2b75b2926a1e026ebaa093.exe PID 4740 wrote to memory of 3208 4740 3dd65f1a69d9bfc66ac90f94418e7038bb7716f55b2b75b2926a1e026ebaa093.exe 3dd65f1a69d9bfc66ac90f94418e7038bb7716f55b2b75b2926a1e026ebaa093.exe PID 4740 wrote to memory of 3208 4740 3dd65f1a69d9bfc66ac90f94418e7038bb7716f55b2b75b2926a1e026ebaa093.exe 3dd65f1a69d9bfc66ac90f94418e7038bb7716f55b2b75b2926a1e026ebaa093.exe PID 4740 wrote to memory of 3208 4740 3dd65f1a69d9bfc66ac90f94418e7038bb7716f55b2b75b2926a1e026ebaa093.exe 3dd65f1a69d9bfc66ac90f94418e7038bb7716f55b2b75b2926a1e026ebaa093.exe PID 4740 wrote to memory of 3208 4740 3dd65f1a69d9bfc66ac90f94418e7038bb7716f55b2b75b2926a1e026ebaa093.exe 3dd65f1a69d9bfc66ac90f94418e7038bb7716f55b2b75b2926a1e026ebaa093.exe PID 4740 wrote to memory of 3208 4740 3dd65f1a69d9bfc66ac90f94418e7038bb7716f55b2b75b2926a1e026ebaa093.exe 3dd65f1a69d9bfc66ac90f94418e7038bb7716f55b2b75b2926a1e026ebaa093.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3dd65f1a69d9bfc66ac90f94418e7038bb7716f55b2b75b2926a1e026ebaa093.exe"C:\Users\Admin\AppData\Local\Temp\3dd65f1a69d9bfc66ac90f94418e7038bb7716f55b2b75b2926a1e026ebaa093.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\ilSuUHrnnZh.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:500
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ilSuUHrnnZh" /XML "C:\Users\Admin\AppData\Local\Temp\tmpCD33.tmp"2⤵
- Creates scheduled task(s)
PID:4500
-
-
C:\Users\Admin\AppData\Local\Temp\3dd65f1a69d9bfc66ac90f94418e7038bb7716f55b2b75b2926a1e026ebaa093.exe"C:\Users\Admin\AppData\Local\Temp\3dd65f1a69d9bfc66ac90f94418e7038bb7716f55b2b75b2926a1e026ebaa093.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3208
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5350e27bb4c0b320001c077a8b63849d3
SHA1e18dc93a9ad606a4947f34bfa939838de5a02b41
SHA256914315c135a62979e02dd32152ea4c249007842da9cfc0c165105fa8aab830d8
SHA5129888005e280add15ff8a3d27a286a16ec66d8839a326e81a9cb67093ee98455bb475b3d3bd6a537e16e900039aa09874dc928120cb28f96110a6a6fd939d5742