Analysis
-
max time kernel
81s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22-02-2023 11:00
Static task
static1
Behavioral task
behavioral1
Sample
dc719929115e50ed4383bcc7f7182be3.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
dc719929115e50ed4383bcc7f7182be3.exe
Resource
win10v2004-20230220-en
General
-
Target
dc719929115e50ed4383bcc7f7182be3.exe
-
Size
312KB
-
MD5
dc719929115e50ed4383bcc7f7182be3
-
SHA1
562e69bdf814c156872fd6ad6a3d0116b0304516
-
SHA256
5b0708551a5c3cf9932c8aea5e890e3f2abe7b7b5911cefebc6155d20692e365
-
SHA512
34b1dda47ff7a20052f582f4874dc35f4e768558baf8727419d5f91ec2f8c6e28d2a6bc0253975e6bac5d45edfa1edd09aabc5339d2caade73418b73096b9404
-
SSDEEP
6144:E4PWLN3m+XeeqeO0UQeQ8KbLVHqAQg5jIQspEPn:6aeqeO0UQB8KFHqAYpEPn
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4780 3972 rundll32.exe 80 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation dc719929115e50ed4383bcc7f7182be3.exe -
Loads dropped DLL 1 IoCs
pid Process 4868 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 828 4868 WerFault.exe 84 -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 4 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 340 dc719929115e50ed4383bcc7f7182be3.exe 340 dc719929115e50ed4383bcc7f7182be3.exe 4896 dc719929115e50ed4383bcc7f7182be3.exe 4896 dc719929115e50ed4383bcc7f7182be3.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 340 wrote to memory of 4896 340 dc719929115e50ed4383bcc7f7182be3.exe 82 PID 340 wrote to memory of 4896 340 dc719929115e50ed4383bcc7f7182be3.exe 82 PID 340 wrote to memory of 4896 340 dc719929115e50ed4383bcc7f7182be3.exe 82 PID 4780 wrote to memory of 4868 4780 rundll32.exe 84 PID 4780 wrote to memory of 4868 4780 rundll32.exe 84 PID 4780 wrote to memory of 4868 4780 rundll32.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc719929115e50ed4383bcc7f7182be3.exe"C:\Users\Admin\AppData\Local\Temp\dc719929115e50ed4383bcc7f7182be3.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:340 -
C:\Users\Admin\AppData\Local\Temp\dc719929115e50ed4383bcc7f7182be3.exe"C:\Users\Admin\AppData\Local\Temp\dc719929115e50ed4383bcc7f7182be3.exe" -h2⤵
- Suspicious use of SetWindowsHookEx
PID:4896
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",open1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",open2⤵
- Loads dropped DLL
PID:4868 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4868 -s 6043⤵
- Program crash
PID:828
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4868 -ip 48681⤵PID:1104
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
557KB
MD576c3dbb1e9fea62090cdf53dadcbe28e
SHA1d44b32d04adc810c6df258be85dc6b62bd48a307
SHA256556fd54e5595d222cfa2bd353afa66d8d4d1fbb3003afed604672fceae991860
SHA512de4ea57497cf26237430880742f59e8d2a0ac7e7a0b09ed7be590f36fbd08c9ced0ffe46eb69ec2215a9cff55720f24fffcae752cd282250b4da6b75a30b3a1b
-
Filesize
52KB
MD51b20e998d058e813dfc515867d31124f
SHA1c9dc9c42a748af18ae1a8c882b90a2b9e3313e6f
SHA25624a53033a2e89acf65f6a5e60d35cb223585817032635e81bf31264eb7dabd00
SHA51279849fbdb9a9e7f7684b570d14662448b093b8aa2b23dfd95856db3a78faf75a95d95c51b8aa8506c4fbecffebcc57cd153dda38c830c05b8cd38629fae673c6
-
Filesize
52KB
MD51b20e998d058e813dfc515867d31124f
SHA1c9dc9c42a748af18ae1a8c882b90a2b9e3313e6f
SHA25624a53033a2e89acf65f6a5e60d35cb223585817032635e81bf31264eb7dabd00
SHA51279849fbdb9a9e7f7684b570d14662448b093b8aa2b23dfd95856db3a78faf75a95d95c51b8aa8506c4fbecffebcc57cd153dda38c830c05b8cd38629fae673c6