Analysis
-
max time kernel
66s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22-02-2023 11:00
Static task
static1
Behavioral task
behavioral1
Sample
8c4b7faad766aea25bebe85e8f15f705.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
8c4b7faad766aea25bebe85e8f15f705.exe
Resource
win10v2004-20230220-en
General
-
Target
8c4b7faad766aea25bebe85e8f15f705.exe
-
Size
312KB
-
MD5
8c4b7faad766aea25bebe85e8f15f705
-
SHA1
7e3588daf272343e6404195355dca4fb45b21bca
-
SHA256
9a8d4f6c8f24d96d32ef8974ba8c96cc02d4fca7d46c3d1edf7e70d6027805f5
-
SHA512
c0b3a92cbbae4c696039eb8dd543c8fd705ddfcbc9885070eac7ae31f3948cad1be3553fd1a8b222b50810d7dc4ca785ae636b6a979f5ab3395b34290b03abfc
-
SSDEEP
6144:E4PWLN3m+XeeqeO0UQeQ8KbLVHqAQg5jIQswEPn:6aeqeO0UQB8KFHqAYwEPn
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1352 536 rundll32.exe 78 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation 8c4b7faad766aea25bebe85e8f15f705.exe -
Loads dropped DLL 1 IoCs
pid Process 4416 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3564 4416 WerFault.exe 83 -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 2 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4616 8c4b7faad766aea25bebe85e8f15f705.exe 4616 8c4b7faad766aea25bebe85e8f15f705.exe 2008 8c4b7faad766aea25bebe85e8f15f705.exe 2008 8c4b7faad766aea25bebe85e8f15f705.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4616 wrote to memory of 2008 4616 8c4b7faad766aea25bebe85e8f15f705.exe 81 PID 4616 wrote to memory of 2008 4616 8c4b7faad766aea25bebe85e8f15f705.exe 81 PID 4616 wrote to memory of 2008 4616 8c4b7faad766aea25bebe85e8f15f705.exe 81 PID 1352 wrote to memory of 4416 1352 rundll32.exe 83 PID 1352 wrote to memory of 4416 1352 rundll32.exe 83 PID 1352 wrote to memory of 4416 1352 rundll32.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c4b7faad766aea25bebe85e8f15f705.exe"C:\Users\Admin\AppData\Local\Temp\8c4b7faad766aea25bebe85e8f15f705.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\8c4b7faad766aea25bebe85e8f15f705.exe"C:\Users\Admin\AppData\Local\Temp\8c4b7faad766aea25bebe85e8f15f705.exe" -h2⤵
- Suspicious use of SetWindowsHookEx
PID:2008
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",open1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",open2⤵
- Loads dropped DLL
PID:4416 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4416 -s 5723⤵
- Program crash
PID:3564
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 4416 -ip 44161⤵PID:2188
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
557KB
MD5f7e8df8e09b2ece08e769ba285f7bb92
SHA152157d2b18f5e9f1d932652fb4a414b5ceadfc1b
SHA25620fb5f8100fa609f83b3af630e89091135f887d88007885aab16f89a2b38e7dc
SHA512d21490bd29490a62250b97dd14ff951f8cadb65429010b0057c31371f01487f7439f9b6327b3f214a2aaa83c4c8c5a964e76fc19936f5403f2258b777b2a29b5
-
Filesize
52KB
MD51b20e998d058e813dfc515867d31124f
SHA1c9dc9c42a748af18ae1a8c882b90a2b9e3313e6f
SHA25624a53033a2e89acf65f6a5e60d35cb223585817032635e81bf31264eb7dabd00
SHA51279849fbdb9a9e7f7684b570d14662448b093b8aa2b23dfd95856db3a78faf75a95d95c51b8aa8506c4fbecffebcc57cd153dda38c830c05b8cd38629fae673c6
-
Filesize
52KB
MD51b20e998d058e813dfc515867d31124f
SHA1c9dc9c42a748af18ae1a8c882b90a2b9e3313e6f
SHA25624a53033a2e89acf65f6a5e60d35cb223585817032635e81bf31264eb7dabd00
SHA51279849fbdb9a9e7f7684b570d14662448b093b8aa2b23dfd95856db3a78faf75a95d95c51b8aa8506c4fbecffebcc57cd153dda38c830c05b8cd38629fae673c6