Analysis
-
max time kernel
145s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
09-03-2023 07:54
Static task
static1
Behavioral task
behavioral1
Sample
32e60467041b40146d87fc1c8c734f60f7e3763820e0c2a852a801c8afd1c7ab.100-200.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
32e60467041b40146d87fc1c8c734f60f7e3763820e0c2a852a801c8afd1c7ab.100-200.exe
Resource
win10v2004-20230220-en
General
-
Target
32e60467041b40146d87fc1c8c734f60f7e3763820e0c2a852a801c8afd1c7ab.100-200.exe
-
Size
143.3MB
-
MD5
b0ed21aa62e33da473528fbc1ed159bb
-
SHA1
441a9c102b61ada34762ce015535c8510170dcf0
-
SHA256
312618f9617883ff91935c9407feb70603fd1f7d246db75ab3f129e267752aab
-
SHA512
086665d64d431975d9ba7e9532adedcfaf0ccc9c184c1fedc8fc1baa197c0f1080b78a160b89f84c875f3bffd74c70b24e0f2dbd35d29bb0fdec22d5bb38252c
-
SSDEEP
6144:/OsY+HgEiTA14Xn0Ti8v1bbFgXIQdjrfzNt1KEP:O814Xn0Ti8tbJyIQdjrfzQEP
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2092 2872 rundll32.exe 19 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation 32e60467041b40146d87fc1c8c734f60f7e3763820e0c2a852a801c8afd1c7ab.100-200.exe -
Loads dropped DLL 1 IoCs
pid Process 2124 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4960 2124 WerFault.exe 88 -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 25 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 5008 32e60467041b40146d87fc1c8c734f60f7e3763820e0c2a852a801c8afd1c7ab.100-200.exe 5008 32e60467041b40146d87fc1c8c734f60f7e3763820e0c2a852a801c8afd1c7ab.100-200.exe 3364 32e60467041b40146d87fc1c8c734f60f7e3763820e0c2a852a801c8afd1c7ab.100-200.exe 3364 32e60467041b40146d87fc1c8c734f60f7e3763820e0c2a852a801c8afd1c7ab.100-200.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5008 wrote to memory of 3364 5008 32e60467041b40146d87fc1c8c734f60f7e3763820e0c2a852a801c8afd1c7ab.100-200.exe 84 PID 5008 wrote to memory of 3364 5008 32e60467041b40146d87fc1c8c734f60f7e3763820e0c2a852a801c8afd1c7ab.100-200.exe 84 PID 5008 wrote to memory of 3364 5008 32e60467041b40146d87fc1c8c734f60f7e3763820e0c2a852a801c8afd1c7ab.100-200.exe 84 PID 2092 wrote to memory of 2124 2092 rundll32.exe 88 PID 2092 wrote to memory of 2124 2092 rundll32.exe 88 PID 2092 wrote to memory of 2124 2092 rundll32.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\32e60467041b40146d87fc1c8c734f60f7e3763820e0c2a852a801c8afd1c7ab.100-200.exe"C:\Users\Admin\AppData\Local\Temp\32e60467041b40146d87fc1c8c734f60f7e3763820e0c2a852a801c8afd1c7ab.100-200.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\32e60467041b40146d87fc1c8c734f60f7e3763820e0c2a852a801c8afd1c7ab.100-200.exe"C:\Users\Admin\AppData\Local\Temp\32e60467041b40146d87fc1c8c734f60f7e3763820e0c2a852a801c8afd1c7ab.100-200.exe" -h2⤵
- Suspicious use of SetWindowsHookEx
PID:3364
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",open1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",open2⤵
- Loads dropped DLL
PID:2124 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 6003⤵
- Program crash
PID:4960
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2124 -ip 21241⤵PID:2492
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
557KB
MD5819ae848dc8b172ef0db45a423cc4024
SHA1e78a66524da011216a63d9936bd4b22b9d0335d2
SHA2561213515bf29bf5dbedd80835b8cf1310b952525fcc716faf0b3d602930cacf24
SHA512a8fe171c6edc22ee62999c70167a9d904d5d94a50e9dca7a7240dbd6a14b0e684fc19d5bc99dfbd3a82bdf8ccb62f6144a8b310f77432224631ac428ded0b084
-
Filesize
52KB
MD51b20e998d058e813dfc515867d31124f
SHA1c9dc9c42a748af18ae1a8c882b90a2b9e3313e6f
SHA25624a53033a2e89acf65f6a5e60d35cb223585817032635e81bf31264eb7dabd00
SHA51279849fbdb9a9e7f7684b570d14662448b093b8aa2b23dfd95856db3a78faf75a95d95c51b8aa8506c4fbecffebcc57cd153dda38c830c05b8cd38629fae673c6
-
Filesize
52KB
MD51b20e998d058e813dfc515867d31124f
SHA1c9dc9c42a748af18ae1a8c882b90a2b9e3313e6f
SHA25624a53033a2e89acf65f6a5e60d35cb223585817032635e81bf31264eb7dabd00
SHA51279849fbdb9a9e7f7684b570d14662448b093b8aa2b23dfd95856db3a78faf75a95d95c51b8aa8506c4fbecffebcc57cd153dda38c830c05b8cd38629fae673c6