Analysis
-
max time kernel
101s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
07-03-2023 14:11
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230220-en
General
-
Target
file.exe
-
Size
308KB
-
MD5
75de993ffc429a40b338f5ab5f42f51d
-
SHA1
d6ccae60897a050b2aa9ecbdf553bc8da116be7e
-
SHA256
d75bdc11107b27e7602f31a93896dbc589dbd313cbb5e76a00d695208218e92a
-
SHA512
5c249827b118c7a26776110405f4c83540c1fe01d394860320d9a1e2010248cb9cd4958dc9246589d845d61ed47b523cc931e32a269e47c5ba734601963bf7ec
-
SSDEEP
6144:bOsY+HgEiTA14Xn0Ti8v1bbFgXIQdjrfzNt1iEP3:i814Xn0Ti8tbJyIQdjrfzMEP3
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rundll32.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3736 1876 rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
file.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation file.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 4732 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2112 4732 WerFault.exe rundll32.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 12 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
file.exefile.exepid process 4024 file.exe 4024 file.exe 3148 file.exe 3148 file.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
file.exerundll32.exedescription pid process target process PID 4024 wrote to memory of 3148 4024 file.exe file.exe PID 4024 wrote to memory of 3148 4024 file.exe file.exe PID 4024 wrote to memory of 3148 4024 file.exe file.exe PID 3736 wrote to memory of 4732 3736 rundll32.exe rundll32.exe PID 3736 wrote to memory of 4732 3736 rundll32.exe rundll32.exe PID 3736 wrote to memory of 4732 3736 rundll32.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe" -h2⤵
- Suspicious use of SetWindowsHookEx
PID:3148
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",open1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",open2⤵
- Loads dropped DLL
PID:4732 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4732 -s 6003⤵
- Program crash
PID:2112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4732 -ip 47321⤵PID:4108
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
557KB
MD545ceed48afd68359f317952e8845ea02
SHA10149982c8c5a90616c3392974b1a543eb2b4e894
SHA256ba07f9487a10ed278772d9571d6e867f53338029a3c4580eed2e08d8f5a8f9bd
SHA512c41645620e26ece7bf044c7a7a8d43383e87a07baae20596d7e01a609d403396fc1993647724185b066e48d9b7f7bddca8913c838dfa56916de7dbd27b9bd4cf
-
Filesize
52KB
MD51b20e998d058e813dfc515867d31124f
SHA1c9dc9c42a748af18ae1a8c882b90a2b9e3313e6f
SHA25624a53033a2e89acf65f6a5e60d35cb223585817032635e81bf31264eb7dabd00
SHA51279849fbdb9a9e7f7684b570d14662448b093b8aa2b23dfd95856db3a78faf75a95d95c51b8aa8506c4fbecffebcc57cd153dda38c830c05b8cd38629fae673c6
-
Filesize
52KB
MD51b20e998d058e813dfc515867d31124f
SHA1c9dc9c42a748af18ae1a8c882b90a2b9e3313e6f
SHA25624a53033a2e89acf65f6a5e60d35cb223585817032635e81bf31264eb7dabd00
SHA51279849fbdb9a9e7f7684b570d14662448b093b8aa2b23dfd95856db3a78faf75a95d95c51b8aa8506c4fbecffebcc57cd153dda38c830c05b8cd38629fae673c6