Analysis
-
max time kernel
214s -
max time network
248s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11-02-2023 07:54
Static task
static1
Behavioral task
behavioral1
Sample
9b6804cbcaac70e19486e370cb472190faeaf65bd4d5b438d229bb56efcf48a1.exe
Resource
win10v2004-20220812-en
General
-
Target
9b6804cbcaac70e19486e370cb472190faeaf65bd4d5b438d229bb56efcf48a1.exe
-
Size
2.6MB
-
MD5
934c49d59355222d86f973eb2d718f80
-
SHA1
53e3d8dc0ae006a223685050f14727756800bb45
-
SHA256
9b6804cbcaac70e19486e370cb472190faeaf65bd4d5b438d229bb56efcf48a1
-
SHA512
d08a18579b5fa0008e7bd11b840c5a83aea71c860a659d28f916cc56c0fb3952f0caaa3a419b464ea72a07c3ba35c993f8f4dc991a3931ff0680d351ae654cc3
-
SSDEEP
49152:fqe3f6Rzn4NeTuiywMnNko/oejqVX5rIJwI2J5PiH7nBGtj:CSiRzn4NXnNkovjgJLTiH7BUj
Malware Config
Signatures
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 9b6804cbcaac70e19486e370cb472190faeaf65bd4d5b438d229bb56efcf48a1.tmp Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 9b6804cbcaac70e19486e370cb472190faeaf65bd4d5b438d229bb56efcf48a1.tmp -
Executes dropped EXE 4 IoCs
pid Process 3032 9b6804cbcaac70e19486e370cb472190faeaf65bd4d5b438d229bb56efcf48a1.tmp 4892 9b6804cbcaac70e19486e370cb472190faeaf65bd4d5b438d229bb56efcf48a1.tmp 1528 OneLaunch Setup_.exe 3352 OneLaunch Setup_.tmp -
Loads dropped DLL 7 IoCs
pid Process 3032 9b6804cbcaac70e19486e370cb472190faeaf65bd4d5b438d229bb56efcf48a1.tmp 3032 9b6804cbcaac70e19486e370cb472190faeaf65bd4d5b438d229bb56efcf48a1.tmp 3032 9b6804cbcaac70e19486e370cb472190faeaf65bd4d5b438d229bb56efcf48a1.tmp 4892 9b6804cbcaac70e19486e370cb472190faeaf65bd4d5b438d229bb56efcf48a1.tmp 3352 OneLaunch Setup_.tmp 3352 OneLaunch Setup_.tmp 3352 OneLaunch Setup_.tmp -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Script User-Agent 9 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 15 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 49 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 129 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 131 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 132 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 134 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 9 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 135 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 133 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3032 9b6804cbcaac70e19486e370cb472190faeaf65bd4d5b438d229bb56efcf48a1.tmp -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4092 wrote to memory of 3032 4092 9b6804cbcaac70e19486e370cb472190faeaf65bd4d5b438d229bb56efcf48a1.exe 80 PID 4092 wrote to memory of 3032 4092 9b6804cbcaac70e19486e370cb472190faeaf65bd4d5b438d229bb56efcf48a1.exe 80 PID 4092 wrote to memory of 3032 4092 9b6804cbcaac70e19486e370cb472190faeaf65bd4d5b438d229bb56efcf48a1.exe 80 PID 3032 wrote to memory of 3276 3032 9b6804cbcaac70e19486e370cb472190faeaf65bd4d5b438d229bb56efcf48a1.tmp 95 PID 3032 wrote to memory of 3276 3032 9b6804cbcaac70e19486e370cb472190faeaf65bd4d5b438d229bb56efcf48a1.tmp 95 PID 3032 wrote to memory of 3276 3032 9b6804cbcaac70e19486e370cb472190faeaf65bd4d5b438d229bb56efcf48a1.tmp 95 PID 3276 wrote to memory of 4892 3276 9b6804cbcaac70e19486e370cb472190faeaf65bd4d5b438d229bb56efcf48a1.exe 96 PID 3276 wrote to memory of 4892 3276 9b6804cbcaac70e19486e370cb472190faeaf65bd4d5b438d229bb56efcf48a1.exe 96 PID 3276 wrote to memory of 4892 3276 9b6804cbcaac70e19486e370cb472190faeaf65bd4d5b438d229bb56efcf48a1.exe 96 PID 4892 wrote to memory of 1528 4892 9b6804cbcaac70e19486e370cb472190faeaf65bd4d5b438d229bb56efcf48a1.tmp 97 PID 4892 wrote to memory of 1528 4892 9b6804cbcaac70e19486e370cb472190faeaf65bd4d5b438d229bb56efcf48a1.tmp 97 PID 4892 wrote to memory of 1528 4892 9b6804cbcaac70e19486e370cb472190faeaf65bd4d5b438d229bb56efcf48a1.tmp 97 PID 1528 wrote to memory of 3352 1528 OneLaunch Setup_.exe 98 PID 1528 wrote to memory of 3352 1528 OneLaunch Setup_.exe 98 PID 1528 wrote to memory of 3352 1528 OneLaunch Setup_.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b6804cbcaac70e19486e370cb472190faeaf65bd4d5b438d229bb56efcf48a1.exe"C:\Users\Admin\AppData\Local\Temp\9b6804cbcaac70e19486e370cb472190faeaf65bd4d5b438d229bb56efcf48a1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\is-OBAK5.tmp\9b6804cbcaac70e19486e370cb472190faeaf65bd4d5b438d229bb56efcf48a1.tmp"C:\Users\Admin\AppData\Local\Temp\is-OBAK5.tmp\9b6804cbcaac70e19486e370cb472190faeaf65bd4d5b438d229bb56efcf48a1.tmp" /SL5="$401D2,1888169,893952,C:\Users\Admin\AppData\Local\Temp\9b6804cbcaac70e19486e370cb472190faeaf65bd4d5b438d229bb56efcf48a1.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\9b6804cbcaac70e19486e370cb472190faeaf65bd4d5b438d229bb56efcf48a1.exe"C:\Users\Admin\AppData\Local\Temp\9b6804cbcaac70e19486e370cb472190faeaf65bd4d5b438d229bb56efcf48a1.exe" /PDATA=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 /LAUNCHER /VERYSILENT3⤵
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Users\Admin\AppData\Local\Temp\is-RPM69.tmp\9b6804cbcaac70e19486e370cb472190faeaf65bd4d5b438d229bb56efcf48a1.tmp"C:\Users\Admin\AppData\Local\Temp\is-RPM69.tmp\9b6804cbcaac70e19486e370cb472190faeaf65bd4d5b438d229bb56efcf48a1.tmp" /SL5="$50204,1888169,893952,C:\Users\Admin\AppData\Local\Temp\9b6804cbcaac70e19486e370cb472190faeaf65bd4d5b438d229bb56efcf48a1.exe" /PDATA=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 /LAUNCHER /VERYSILENT4⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\OneLaunch Setup_.exe"C:\Users\Admin\AppData\Local\Temp\OneLaunch Setup_.exe" /PDATA=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⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\is-RL9SN.tmp\OneLaunch Setup_.tmp"C:\Users\Admin\AppData\Local\Temp\is-RL9SN.tmp\OneLaunch Setup_.tmp" /SL5="$5019C,94007329,893952,C:\Users\Admin\AppData\Local\Temp\OneLaunch Setup_.exe" /PDATA=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⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3352
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90.5MB
MD594c57e96e8a714d2e1b0693db17f4710
SHA1ae2a38ef35bc4af08eba072aea9b3f16c0f1cb43
SHA25608136c63d659df15296e2c10d7b3a12355e921025f0abd3f9ceb910da2bc44df
SHA5120bdad6665672646e4da7a9f69bc7ffb88ad245d90e95a1e43e9009670ead7430d00c45301d89557a6afd5dafdf04d919013718adfa45c48251a4b99754c39fa3
-
Filesize
90.5MB
MD594c57e96e8a714d2e1b0693db17f4710
SHA1ae2a38ef35bc4af08eba072aea9b3f16c0f1cb43
SHA25608136c63d659df15296e2c10d7b3a12355e921025f0abd3f9ceb910da2bc44df
SHA5120bdad6665672646e4da7a9f69bc7ffb88ad245d90e95a1e43e9009670ead7430d00c45301d89557a6afd5dafdf04d919013718adfa45c48251a4b99754c39fa3
-
Filesize
45KB
MD55f4498860152be91f8f6b4ba36c61b99
SHA107a5b1a9c476d948568e2e3cf49a0efd489aa612
SHA2567087e0b6ee679c3cdae20f889c6d52f3d6e477e11cb73150c804f25e342dfb97
SHA512ab752c0c60a8589c4cffe53954466123881f26355ebca3921a000c33d0e97e333ef279857be21f15da2cf42467d3817db6cba8edf2c6e189a59e52af383373f4
-
Filesize
45KB
MD55f4498860152be91f8f6b4ba36c61b99
SHA107a5b1a9c476d948568e2e3cf49a0efd489aa612
SHA2567087e0b6ee679c3cdae20f889c6d52f3d6e477e11cb73150c804f25e342dfb97
SHA512ab752c0c60a8589c4cffe53954466123881f26355ebca3921a000c33d0e97e333ef279857be21f15da2cf42467d3817db6cba8edf2c6e189a59e52af383373f4
-
Filesize
45KB
MD55f4498860152be91f8f6b4ba36c61b99
SHA107a5b1a9c476d948568e2e3cf49a0efd489aa612
SHA2567087e0b6ee679c3cdae20f889c6d52f3d6e477e11cb73150c804f25e342dfb97
SHA512ab752c0c60a8589c4cffe53954466123881f26355ebca3921a000c33d0e97e333ef279857be21f15da2cf42467d3817db6cba8edf2c6e189a59e52af383373f4
-
Filesize
45KB
MD55f4498860152be91f8f6b4ba36c61b99
SHA107a5b1a9c476d948568e2e3cf49a0efd489aa612
SHA2567087e0b6ee679c3cdae20f889c6d52f3d6e477e11cb73150c804f25e342dfb97
SHA512ab752c0c60a8589c4cffe53954466123881f26355ebca3921a000c33d0e97e333ef279857be21f15da2cf42467d3817db6cba8edf2c6e189a59e52af383373f4
-
Filesize
45KB
MD55f4498860152be91f8f6b4ba36c61b99
SHA107a5b1a9c476d948568e2e3cf49a0efd489aa612
SHA2567087e0b6ee679c3cdae20f889c6d52f3d6e477e11cb73150c804f25e342dfb97
SHA512ab752c0c60a8589c4cffe53954466123881f26355ebca3921a000c33d0e97e333ef279857be21f15da2cf42467d3817db6cba8edf2c6e189a59e52af383373f4
-
Filesize
45KB
MD55f4498860152be91f8f6b4ba36c61b99
SHA107a5b1a9c476d948568e2e3cf49a0efd489aa612
SHA2567087e0b6ee679c3cdae20f889c6d52f3d6e477e11cb73150c804f25e342dfb97
SHA512ab752c0c60a8589c4cffe53954466123881f26355ebca3921a000c33d0e97e333ef279857be21f15da2cf42467d3817db6cba8edf2c6e189a59e52af383373f4
-
Filesize
45KB
MD55f4498860152be91f8f6b4ba36c61b99
SHA107a5b1a9c476d948568e2e3cf49a0efd489aa612
SHA2567087e0b6ee679c3cdae20f889c6d52f3d6e477e11cb73150c804f25e342dfb97
SHA512ab752c0c60a8589c4cffe53954466123881f26355ebca3921a000c33d0e97e333ef279857be21f15da2cf42467d3817db6cba8edf2c6e189a59e52af383373f4
-
C:\Users\Admin\AppData\Local\Temp\is-OBAK5.tmp\9b6804cbcaac70e19486e370cb472190faeaf65bd4d5b438d229bb56efcf48a1.tmp
Filesize3.0MB
MD57e4d39aff96ee21f2c4b6fef0ed1e370
SHA18c4d12d12b992b3c3d96fb8a6e92f0518e4067c7
SHA256247c55c901f10aa33749b41f5805e69c17e2cf65f4a0737a55809b7c20f65f96
SHA512093ea64c3983370675b20ab937aa4720304b44f83cb67a09f6d0e8649783b4b464f2b5ab60e36f422cfc07fbfb20258a2e5e746f41f4505b595313e4d3a667fc
-
Filesize
3.0MB
MD5007a67d52a97724f3eec3ab2e12742ac
SHA1196442041f7e2595685de72b339eb8fddb22126b
SHA256ebd3cd9303f09a920463a7f444a594b1f7d163790f83628d3f5d66d2471cd96d
SHA5127936b9aa08e30eb74093d2dac0ccbe0bc7b23b094196aa71dbfc949a42de1f76cdb99418ccd624b541913281540577708e063930eb02b49a7a833f94024de34c
-
Filesize
3.0MB
MD5007a67d52a97724f3eec3ab2e12742ac
SHA1196442041f7e2595685de72b339eb8fddb22126b
SHA256ebd3cd9303f09a920463a7f444a594b1f7d163790f83628d3f5d66d2471cd96d
SHA5127936b9aa08e30eb74093d2dac0ccbe0bc7b23b094196aa71dbfc949a42de1f76cdb99418ccd624b541913281540577708e063930eb02b49a7a833f94024de34c
-
C:\Users\Admin\AppData\Local\Temp\is-RPM69.tmp\9b6804cbcaac70e19486e370cb472190faeaf65bd4d5b438d229bb56efcf48a1.tmp
Filesize3.0MB
MD57e4d39aff96ee21f2c4b6fef0ed1e370
SHA18c4d12d12b992b3c3d96fb8a6e92f0518e4067c7
SHA256247c55c901f10aa33749b41f5805e69c17e2cf65f4a0737a55809b7c20f65f96
SHA512093ea64c3983370675b20ab937aa4720304b44f83cb67a09f6d0e8649783b4b464f2b5ab60e36f422cfc07fbfb20258a2e5e746f41f4505b595313e4d3a667fc