Analysis
-
max time kernel
123s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
09-03-2023 02:53
Static task
static1
Behavioral task
behavioral1
Sample
24527c1cb60027d91ddc051990ba55ca.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
24527c1cb60027d91ddc051990ba55ca.exe
Resource
win10v2004-20230220-en
General
-
Target
24527c1cb60027d91ddc051990ba55ca.exe
-
Size
308KB
-
MD5
24527c1cb60027d91ddc051990ba55ca
-
SHA1
6f55efac879c92f116ab73ccd431c898c6f794f9
-
SHA256
eaf978fd469c4acc54a1b4cdaa4298c04b385b0cce10215f96a737b26a27fd30
-
SHA512
cbf0dab2eb7e3b44359db887a7441459a49575faaab0cfec6ddb67b43957391510fb7a0beb63098c3d826c96c91fff284e726c16284f70128b7cd577d30ee11e
-
SSDEEP
6144:bOsY+HgEiTA14Xn0Ti8v1bbFgXIQdjrfzNt1mEP3:i814Xn0Ti8tbJyIQdjrfzQEP3
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3524 2824 rundll32.exe 36 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation 24527c1cb60027d91ddc051990ba55ca.exe -
Loads dropped DLL 1 IoCs
pid Process 228 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4632 228 WerFault.exe 89 -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 26 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1272 24527c1cb60027d91ddc051990ba55ca.exe 1272 24527c1cb60027d91ddc051990ba55ca.exe 1564 24527c1cb60027d91ddc051990ba55ca.exe 1564 24527c1cb60027d91ddc051990ba55ca.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1272 wrote to memory of 1564 1272 24527c1cb60027d91ddc051990ba55ca.exe 85 PID 1272 wrote to memory of 1564 1272 24527c1cb60027d91ddc051990ba55ca.exe 85 PID 1272 wrote to memory of 1564 1272 24527c1cb60027d91ddc051990ba55ca.exe 85 PID 3524 wrote to memory of 228 3524 rundll32.exe 89 PID 3524 wrote to memory of 228 3524 rundll32.exe 89 PID 3524 wrote to memory of 228 3524 rundll32.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\24527c1cb60027d91ddc051990ba55ca.exe"C:\Users\Admin\AppData\Local\Temp\24527c1cb60027d91ddc051990ba55ca.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Users\Admin\AppData\Local\Temp\24527c1cb60027d91ddc051990ba55ca.exe"C:\Users\Admin\AppData\Local\Temp\24527c1cb60027d91ddc051990ba55ca.exe" -h2⤵
- Suspicious use of SetWindowsHookEx
PID:1564
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",open1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",open2⤵
- Loads dropped DLL
PID:228 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 228 -s 5723⤵
- Program crash
PID:4632
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 228 -ip 2281⤵PID:2124
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
557KB
MD550195924762ca74975bfe703a408e687
SHA1e3d29ab66cba1da445c98ae7c26c3e822aa5debf
SHA256a04ae2447a8a37d4a5542815189ccca3dca71c02d744f51c6cbcee4048204116
SHA51261902d8b500b19438fdcdc3d99b238313c95d15947f29e6f5c30b5e5a90aaf92624ee153648d33024cba20f6dbaf599deca5cd5c64cb2b7f3d9f8ea1de9800a0
-
Filesize
52KB
MD51b20e998d058e813dfc515867d31124f
SHA1c9dc9c42a748af18ae1a8c882b90a2b9e3313e6f
SHA25624a53033a2e89acf65f6a5e60d35cb223585817032635e81bf31264eb7dabd00
SHA51279849fbdb9a9e7f7684b570d14662448b093b8aa2b23dfd95856db3a78faf75a95d95c51b8aa8506c4fbecffebcc57cd153dda38c830c05b8cd38629fae673c6
-
Filesize
52KB
MD51b20e998d058e813dfc515867d31124f
SHA1c9dc9c42a748af18ae1a8c882b90a2b9e3313e6f
SHA25624a53033a2e89acf65f6a5e60d35cb223585817032635e81bf31264eb7dabd00
SHA51279849fbdb9a9e7f7684b570d14662448b093b8aa2b23dfd95856db3a78faf75a95d95c51b8aa8506c4fbecffebcc57cd153dda38c830c05b8cd38629fae673c6