Analysis
-
max time kernel
143s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
09-03-2023 01:59
Static task
static1
Behavioral task
behavioral1
Sample
6bbbf2b1e89ed9d3b1bba44fc9acec53.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
6bbbf2b1e89ed9d3b1bba44fc9acec53.exe
Resource
win10v2004-20230220-en
General
-
Target
6bbbf2b1e89ed9d3b1bba44fc9acec53.exe
-
Size
308KB
-
MD5
6bbbf2b1e89ed9d3b1bba44fc9acec53
-
SHA1
bb6b962ba30a55a9cbb87030bdd282223e42a48d
-
SHA256
ad716b9b395d65dca7a31117215c2adedf392162eab7beee500f8061db4785c0
-
SHA512
a7651ba72b4b45f3f4a7901412d1d3b41f8847fd59b15b9a61092cb9a2c4bc38aa1a2d274b549e49608e70b4ff1f4ab120a814e1fd5cffe7dd8d1a644aa737a0
-
SSDEEP
6144:bOsY+HgEiTA14Xn0Ti8v1bbFgXIQdjrfzNt1sEP3:i814Xn0Ti8tbJyIQdjrfzCEP3
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4492 784 rundll32.exe 75 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation 6bbbf2b1e89ed9d3b1bba44fc9acec53.exe -
Loads dropped DLL 1 IoCs
pid Process 224 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4196 224 WerFault.exe 88 -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 18 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2300 6bbbf2b1e89ed9d3b1bba44fc9acec53.exe 2300 6bbbf2b1e89ed9d3b1bba44fc9acec53.exe 3228 6bbbf2b1e89ed9d3b1bba44fc9acec53.exe 3228 6bbbf2b1e89ed9d3b1bba44fc9acec53.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2300 wrote to memory of 3228 2300 6bbbf2b1e89ed9d3b1bba44fc9acec53.exe 86 PID 2300 wrote to memory of 3228 2300 6bbbf2b1e89ed9d3b1bba44fc9acec53.exe 86 PID 2300 wrote to memory of 3228 2300 6bbbf2b1e89ed9d3b1bba44fc9acec53.exe 86 PID 4492 wrote to memory of 224 4492 rundll32.exe 88 PID 4492 wrote to memory of 224 4492 rundll32.exe 88 PID 4492 wrote to memory of 224 4492 rundll32.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\6bbbf2b1e89ed9d3b1bba44fc9acec53.exe"C:\Users\Admin\AppData\Local\Temp\6bbbf2b1e89ed9d3b1bba44fc9acec53.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\6bbbf2b1e89ed9d3b1bba44fc9acec53.exe"C:\Users\Admin\AppData\Local\Temp\6bbbf2b1e89ed9d3b1bba44fc9acec53.exe" -h2⤵
- Suspicious use of SetWindowsHookEx
PID:3228
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",open1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",open2⤵
- Loads dropped DLL
PID:224 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 224 -s 5723⤵
- Program crash
PID:4196
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 224 -ip 2241⤵PID:4500
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
557KB
MD5ee5d452cc4ee71e1f544582bf6fca143
SHA1a193952075b2b4a83759098754e814a931b8ba90
SHA256f5cb9476e4b5576bb94eae1d278093b6470b0238226d4c05ec8c76747d57cbfe
SHA5127a935ae3df65b949c5e7f1ed93bd2173165ef4e347ceb5879725fbb995aedeef853b5b1dc4c4155d423f34d004f8a0df59258cefdad5f49e617d0a74764c896b
-
Filesize
52KB
MD51b20e998d058e813dfc515867d31124f
SHA1c9dc9c42a748af18ae1a8c882b90a2b9e3313e6f
SHA25624a53033a2e89acf65f6a5e60d35cb223585817032635e81bf31264eb7dabd00
SHA51279849fbdb9a9e7f7684b570d14662448b093b8aa2b23dfd95856db3a78faf75a95d95c51b8aa8506c4fbecffebcc57cd153dda38c830c05b8cd38629fae673c6
-
Filesize
52KB
MD51b20e998d058e813dfc515867d31124f
SHA1c9dc9c42a748af18ae1a8c882b90a2b9e3313e6f
SHA25624a53033a2e89acf65f6a5e60d35cb223585817032635e81bf31264eb7dabd00
SHA51279849fbdb9a9e7f7684b570d14662448b093b8aa2b23dfd95856db3a78faf75a95d95c51b8aa8506c4fbecffebcc57cd153dda38c830c05b8cd38629fae673c6