Analysis
-
max time kernel
100s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22-02-2023 11:00
Static task
static1
Behavioral task
behavioral1
Sample
a3b3e417dc721aaa4fdcaa8f65eef81a.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
a3b3e417dc721aaa4fdcaa8f65eef81a.exe
Resource
win10v2004-20230220-en
General
-
Target
a3b3e417dc721aaa4fdcaa8f65eef81a.exe
-
Size
312KB
-
MD5
a3b3e417dc721aaa4fdcaa8f65eef81a
-
SHA1
21ea098b035b5fd93037054f59ee506aa66d030c
-
SHA256
9d6f720f4d9bd455371b863ce479c490ebb437ff53c1635fe7befd5eff30af10
-
SHA512
10b658b0b440c01bf0d1fe49c5092b82a59ba8c4ebd214b4c7b3fae8f3d8c4d67598154bf53e13fbf80174bf7411b4f12e044832967c528c5f917efe5b6f2585
-
SSDEEP
6144:E4PWLN3m+XeeqeO0UQeQ8KbLVHqAQg5jIQshEPn:6aeqeO0UQB8KFHqAYhEPn
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 516 924 rundll32.exe 78 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation a3b3e417dc721aaa4fdcaa8f65eef81a.exe -
Loads dropped DLL 1 IoCs
pid Process 1776 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 5104 1776 WerFault.exe 82 -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 2 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4120 a3b3e417dc721aaa4fdcaa8f65eef81a.exe 4120 a3b3e417dc721aaa4fdcaa8f65eef81a.exe 3264 a3b3e417dc721aaa4fdcaa8f65eef81a.exe 3264 a3b3e417dc721aaa4fdcaa8f65eef81a.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4120 wrote to memory of 3264 4120 a3b3e417dc721aaa4fdcaa8f65eef81a.exe 80 PID 4120 wrote to memory of 3264 4120 a3b3e417dc721aaa4fdcaa8f65eef81a.exe 80 PID 4120 wrote to memory of 3264 4120 a3b3e417dc721aaa4fdcaa8f65eef81a.exe 80 PID 516 wrote to memory of 1776 516 rundll32.exe 82 PID 516 wrote to memory of 1776 516 rundll32.exe 82 PID 516 wrote to memory of 1776 516 rundll32.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3b3e417dc721aaa4fdcaa8f65eef81a.exe"C:\Users\Admin\AppData\Local\Temp\a3b3e417dc721aaa4fdcaa8f65eef81a.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Users\Admin\AppData\Local\Temp\a3b3e417dc721aaa4fdcaa8f65eef81a.exe"C:\Users\Admin\AppData\Local\Temp\a3b3e417dc721aaa4fdcaa8f65eef81a.exe" -h2⤵
- Suspicious use of SetWindowsHookEx
PID:3264
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",open1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",open2⤵
- Loads dropped DLL
PID:1776 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1776 -s 5723⤵
- Program crash
PID:5104
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1776 -ip 17761⤵PID:1328
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
557KB
MD51bd81dc243577b6a0c7f93f6bd9ae40b
SHA19d4e908b53e52c5216ea7746d2e1b33abea9bc1c
SHA2563b667512e2dc899bc4e0d92628a981b4487b9423c6ae3804893a30c67a2de21c
SHA512e7e647733b88c78b8bb6c1951780b2627e2b0b66dc2b29d257f2925d837936bd12eaa56b43c7d59ec663e81fa31ec50f4767de8ab1441c645c0890aec79a8d10
-
Filesize
52KB
MD51b20e998d058e813dfc515867d31124f
SHA1c9dc9c42a748af18ae1a8c882b90a2b9e3313e6f
SHA25624a53033a2e89acf65f6a5e60d35cb223585817032635e81bf31264eb7dabd00
SHA51279849fbdb9a9e7f7684b570d14662448b093b8aa2b23dfd95856db3a78faf75a95d95c51b8aa8506c4fbecffebcc57cd153dda38c830c05b8cd38629fae673c6
-
Filesize
52KB
MD51b20e998d058e813dfc515867d31124f
SHA1c9dc9c42a748af18ae1a8c882b90a2b9e3313e6f
SHA25624a53033a2e89acf65f6a5e60d35cb223585817032635e81bf31264eb7dabd00
SHA51279849fbdb9a9e7f7684b570d14662448b093b8aa2b23dfd95856db3a78faf75a95d95c51b8aa8506c4fbecffebcc57cd153dda38c830c05b8cd38629fae673c6