Overview
overview
10Static
static
102d640e53d6...02.exe
windows10-1703-x64
102d640e53d6...02.exe
windows7-x64
102d640e53d6...02.exe
windows10-2004-x64
1095de56b7b2...57.exe
windows10-1703-x64
195de56b7b2...57.exe
windows7-x64
1095de56b7b2...57.exe
windows10-2004-x64
10d950b50f5f...4e.exe
windows10-1703-x64
10d950b50f5f...4e.exe
windows7-x64
10d950b50f5f...4e.exe
windows10-2004-x64
10d62c1f65b0...b4.exe
windows10-1703-x64
10d62c1f65b0...b4.exe
windows7-x64
10d62c1f65b0...b4.exe
windows10-2004-x64
10Resubmissions
25-12-2022 14:22
221225-rppf7abf39 1025-12-2022 14:22
221225-rpkg8seg4s 1025-12-2022 14:21
221225-rpexraeg31 1025-12-2022 14:21
221225-rn92haeg3z 1025-12-2022 14:13
221225-rjx65seg3w 10Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2022 14:21
Behavioral task
behavioral1
Sample
2d640e53d6e6d96266afb87c150403609c66d66ab1a5404c20efb13c85f9ae02.exe
Resource
win10-20220812-en
Behavioral task
behavioral2
Sample
2d640e53d6e6d96266afb87c150403609c66d66ab1a5404c20efb13c85f9ae02.exe
Resource
win7-20221111-en
Behavioral task
behavioral3
Sample
2d640e53d6e6d96266afb87c150403609c66d66ab1a5404c20efb13c85f9ae02.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral4
Sample
95de56b7b27bfdfae1c741a5f02a42d1a4f7a23286ca8b292e85132b8b87bb57.exe
Resource
win10-20220812-en
Behavioral task
behavioral5
Sample
95de56b7b27bfdfae1c741a5f02a42d1a4f7a23286ca8b292e85132b8b87bb57.exe
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
95de56b7b27bfdfae1c741a5f02a42d1a4f7a23286ca8b292e85132b8b87bb57.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
d950b50f5f6430bec1db8de9f36b9a4e.exe
Resource
win10-20220812-en
Behavioral task
behavioral8
Sample
d950b50f5f6430bec1db8de9f36b9a4e.exe
Resource
win7-20220812-en
Behavioral task
behavioral9
Sample
d950b50f5f6430bec1db8de9f36b9a4e.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral10
Sample
d62c1f65b0ad9427fa41e32951526435e372d2f09bb81e6079dabdad915f84b4.exe
Resource
win10-20220901-en
Behavioral task
behavioral11
Sample
d62c1f65b0ad9427fa41e32951526435e372d2f09bb81e6079dabdad915f84b4.exe
Resource
win7-20220812-en
General
-
Target
d62c1f65b0ad9427fa41e32951526435e372d2f09bb81e6079dabdad915f84b4.exe
-
Size
120KB
-
MD5
e5d69699bde3b15ff93d21c5b673bd8a
-
SHA1
7407968eb3d942ebabee4b432df4c4a9ac96c3e3
-
SHA256
d62c1f65b0ad9427fa41e32951526435e372d2f09bb81e6079dabdad915f84b4
-
SHA512
46312be3e25e994e56e92869ea93a2452a149d0c04fb9067f13412f5d5f527597ec1c62a2c682d93a6d84f8b9065c21713177056f6853427853bdf9aa4038121
-
SSDEEP
3072:A5vUIjgiKb54RAYC5B5mAwCEOaIx91R6CW454DOeMxSXc:AdRgvb5wAN5mAFaIaRMxSX
Malware Config
Extracted
allcome
http://dba692117be7b6d3480fe5220fdd58b38bf.xyz/exp.php?usr=Class1c228
D92TTxkBTyJfavHWmAJfHpZRLeUY9ReHvf
rEtKYAu1Pwa9ydAB9YfXrTgVTtwB7QAghY
0x4aab8F9FFFE07459b1365A10405a4Fe7Aa7F1f81
XeZnNrJyBV3NimCP61bnJK8EYEqe984rn8
t1Vrj6CU9hHRwiuoSWDhgwtRhmPxRu9MqXs
GBEARLBYJHWXMY7AFAGF7VGMRMRK2D5HSRADSABSPMRIW6XPDQBRQSMI
0x43B091611E359447bAC8b2aE1619424A8417De38
qqvqg5fjmjjkd6egvwxv5et63jpakdqvuq3ye335x0
bc1qrzlvgv39ynr32vzacpg8y4y4yklmr370sxwqj3
0x4aab8F9FFFE07459b1365A10405a4Fe7Aa7F1f81
ltc1qef2n5uu37e34nvtrfhnurdj9lc574h90grpa0e
380990138409
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
subst.exepid Process 1340 subst.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
d62c1f65b0ad9427fa41e32951526435e372d2f09bb81e6079dabdad915f84b4.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation d62c1f65b0ad9427fa41e32951526435e372d2f09bb81e6079dabdad915f84b4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
subst.exepid Process 1340 subst.exe 1340 subst.exe 1340 subst.exe 1340 subst.exe 1340 subst.exe 1340 subst.exe 1340 subst.exe 1340 subst.exe 1340 subst.exe 1340 subst.exe 1340 subst.exe 1340 subst.exe 1340 subst.exe 1340 subst.exe 1340 subst.exe 1340 subst.exe 1340 subst.exe 1340 subst.exe 1340 subst.exe 1340 subst.exe 1340 subst.exe 1340 subst.exe 1340 subst.exe 1340 subst.exe 1340 subst.exe 1340 subst.exe 1340 subst.exe 1340 subst.exe 1340 subst.exe 1340 subst.exe 1340 subst.exe 1340 subst.exe 1340 subst.exe 1340 subst.exe 1340 subst.exe 1340 subst.exe 1340 subst.exe 1340 subst.exe 1340 subst.exe 1340 subst.exe 1340 subst.exe 1340 subst.exe 1340 subst.exe 1340 subst.exe 1340 subst.exe 1340 subst.exe 1340 subst.exe 1340 subst.exe 1340 subst.exe 1340 subst.exe 1340 subst.exe 1340 subst.exe 1340 subst.exe 1340 subst.exe 1340 subst.exe 1340 subst.exe 1340 subst.exe 1340 subst.exe 1340 subst.exe 1340 subst.exe 1340 subst.exe 1340 subst.exe 1340 subst.exe 1340 subst.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
d62c1f65b0ad9427fa41e32951526435e372d2f09bb81e6079dabdad915f84b4.exedescription pid Process procid_target PID 5020 wrote to memory of 3988 5020 d62c1f65b0ad9427fa41e32951526435e372d2f09bb81e6079dabdad915f84b4.exe 81 PID 5020 wrote to memory of 3988 5020 d62c1f65b0ad9427fa41e32951526435e372d2f09bb81e6079dabdad915f84b4.exe 81 PID 5020 wrote to memory of 3988 5020 d62c1f65b0ad9427fa41e32951526435e372d2f09bb81e6079dabdad915f84b4.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\d62c1f65b0ad9427fa41e32951526435e372d2f09bb81e6079dabdad915f84b4.exe"C:\Users\Admin\AppData\Local\Temp\d62c1f65b0ad9427fa41e32951526435e372d2f09bb81e6079dabdad915f84b4.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /tn NvTmRep_CrashReport3_{B2FE1952-0186} /sc MINUTE /tr C:\Users\Admin\AppData\Local\CrashDumps\subst.exe2⤵
- Creates scheduled task(s)
PID:3988
-
-
C:\Users\Admin\AppData\Local\CrashDumps\subst.exeC:\Users\Admin\AppData\Local\CrashDumps\subst.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1340
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120KB
MD5e5d69699bde3b15ff93d21c5b673bd8a
SHA17407968eb3d942ebabee4b432df4c4a9ac96c3e3
SHA256d62c1f65b0ad9427fa41e32951526435e372d2f09bb81e6079dabdad915f84b4
SHA51246312be3e25e994e56e92869ea93a2452a149d0c04fb9067f13412f5d5f527597ec1c62a2c682d93a6d84f8b9065c21713177056f6853427853bdf9aa4038121
-
Filesize
120KB
MD5e5d69699bde3b15ff93d21c5b673bd8a
SHA17407968eb3d942ebabee4b432df4c4a9ac96c3e3
SHA256d62c1f65b0ad9427fa41e32951526435e372d2f09bb81e6079dabdad915f84b4
SHA51246312be3e25e994e56e92869ea93a2452a149d0c04fb9067f13412f5d5f527597ec1c62a2c682d93a6d84f8b9065c21713177056f6853427853bdf9aa4038121