Resubmissions
10/01/2023, 00:56
230110-batjlabg9z 1010/01/2023, 00:50
230110-a6w4xsbg8x 1009/01/2023, 22:18
230109-172nxabd8y 8Analysis
-
max time kernel
140s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
10/01/2023, 00:56
Static task
static1
Behavioral task
behavioral1
Sample
8e83b4c798ca9e24e6b33ff30817a4bd2703bad34701f220f9b5f5e730fedcd9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8e83b4c798ca9e24e6b33ff30817a4bd2703bad34701f220f9b5f5e730fedcd9.exe
Resource
win10v2004-20220812-en
General
-
Target
8e83b4c798ca9e24e6b33ff30817a4bd2703bad34701f220f9b5f5e730fedcd9.exe
-
Size
1.0MB
-
MD5
dd30580c68a1fe179b2c1fed353b2ecb
-
SHA1
a6d06a2904cafe55f4832337dcb2a5cc563ca456
-
SHA256
8e83b4c798ca9e24e6b33ff30817a4bd2703bad34701f220f9b5f5e730fedcd9
-
SHA512
5b54a3f73c9e8fb3d9eff6ee579475c05724c5af703fa917438899857abeb730bea50f50752be4c10f12042c380d9a57d98ef9ef6b16658b39a950ff9b43a211
-
SSDEEP
24576:uurEZ30cjU8lSp/jh+Nc3VLn5W32gftwUys5NV:c0Olu/jwNcO9twH+
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" InstallUtil.exe -
Executes dropped EXE 1 IoCs
pid Process 372 kernel32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 8e83b4c798ca9e24e6b33ff30817a4bd2703bad34701f220f9b5f5e730fedcd9.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run 8e83b4c798ca9e24e6b33ff30817a4bd2703bad34701f220f9b5f5e730fedcd9.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Baskov = "C:\\Users\\Admin\\Baskov\\kernel32.exe" 8e83b4c798ca9e24e6b33ff30817a4bd2703bad34701f220f9b5f5e730fedcd9.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 61 eth0.me -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 372 set thread context of 4676 372 kernel32.exe 86 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 5096 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4676 InstallUtil.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4876 wrote to memory of 372 4876 8e83b4c798ca9e24e6b33ff30817a4bd2703bad34701f220f9b5f5e730fedcd9.exe 81 PID 4876 wrote to memory of 372 4876 8e83b4c798ca9e24e6b33ff30817a4bd2703bad34701f220f9b5f5e730fedcd9.exe 81 PID 4876 wrote to memory of 372 4876 8e83b4c798ca9e24e6b33ff30817a4bd2703bad34701f220f9b5f5e730fedcd9.exe 81 PID 4876 wrote to memory of 4072 4876 8e83b4c798ca9e24e6b33ff30817a4bd2703bad34701f220f9b5f5e730fedcd9.exe 82 PID 4876 wrote to memory of 4072 4876 8e83b4c798ca9e24e6b33ff30817a4bd2703bad34701f220f9b5f5e730fedcd9.exe 82 PID 4876 wrote to memory of 4072 4876 8e83b4c798ca9e24e6b33ff30817a4bd2703bad34701f220f9b5f5e730fedcd9.exe 82 PID 4072 wrote to memory of 2620 4072 cmd.exe 84 PID 4072 wrote to memory of 2620 4072 cmd.exe 84 PID 4072 wrote to memory of 2620 4072 cmd.exe 84 PID 4072 wrote to memory of 5096 4072 cmd.exe 85 PID 4072 wrote to memory of 5096 4072 cmd.exe 85 PID 4072 wrote to memory of 5096 4072 cmd.exe 85 PID 372 wrote to memory of 4676 372 kernel32.exe 86 PID 372 wrote to memory of 4676 372 kernel32.exe 86 PID 372 wrote to memory of 4676 372 kernel32.exe 86 PID 372 wrote to memory of 4676 372 kernel32.exe 86 PID 372 wrote to memory of 4676 372 kernel32.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e83b4c798ca9e24e6b33ff30817a4bd2703bad34701f220f9b5f5e730fedcd9.exe"C:\Users\Admin\AppData\Local\Temp\8e83b4c798ca9e24e6b33ff30817a4bd2703bad34701f220f9b5f5e730fedcd9.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Users\Admin\Baskov\kernel32.exe"C:\Users\Admin\Baskov\kernel32.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵
- UAC bypass
- Suspicious use of AdjustPrivilegeToken
PID:4676
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\8e83b4c798ca9e24e6b33ff30817a4bd2703bad34701f220f9b5f5e730fedcd9.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:2620
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:5096
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
651.0MB
MD58237709142d50ce4ea264e7e4422afa9
SHA122b8fbebd5d666594c1338c2fde727cf6ace6d28
SHA256b0e088b6ab0d94ec71f4ec38933ac35aca91e25ecbb3e8daf493770122165874
SHA512b121df712864397d45280f90e826e918a42aa5bae5d14c0bba1da330152dec8786451b0dcb44e364d27254421b68d90c1238bd75b7a437b8019e049ede9d7a96
-
Filesize
651.0MB
MD58237709142d50ce4ea264e7e4422afa9
SHA122b8fbebd5d666594c1338c2fde727cf6ace6d28
SHA256b0e088b6ab0d94ec71f4ec38933ac35aca91e25ecbb3e8daf493770122165874
SHA512b121df712864397d45280f90e826e918a42aa5bae5d14c0bba1da330152dec8786451b0dcb44e364d27254421b68d90c1238bd75b7a437b8019e049ede9d7a96