Analysis
-
max time kernel
134s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
10-03-2023 12:22
Static task
static1
Behavioral task
behavioral1
Sample
04639854539053e9c2a0eea9e38b5b6c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
04639854539053e9c2a0eea9e38b5b6c.exe
Resource
win10v2004-20230221-en
General
-
Target
04639854539053e9c2a0eea9e38b5b6c.exe
-
Size
328KB
-
MD5
04639854539053e9c2a0eea9e38b5b6c
-
SHA1
f82c1215b7d4fbea5a136a483f9bd0d022ed36cd
-
SHA256
7db1175e55e2bc864c8e8f0915b5f4167cb0a49a87a751b3fa429be6dc4a8896
-
SHA512
aa0e94af988449358310000d94021b1fbbd7736e6ae505a79b88b14a6563f19157712b78d49e5e1b9e27b9f6a314823d3e8ad89d3ccc7979878fbea05f5acfb5
-
SSDEEP
6144:evSBanJK/5kPas8N0HEAAf1vbViarAWbd33UEPT:evjas8uHEAAtvBpkREPT
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4984 3692 rundll32.exe 51 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation 04639854539053e9c2a0eea9e38b5b6c.exe -
Loads dropped DLL 1 IoCs
pid Process 3896 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2436 3896 WerFault.exe 96 -
Modifies registry class 44 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4}\ProgID\ = "sqltest.Application" 04639854539053e9c2a0eea9e38b5b6c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4}\InprocHandler32\ = "ole32.dll" 04639854539053e9c2a0eea9e38b5b6c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B4BD8AC7-1474-45B9-87B4-845611FD1CAD}\1.0 04639854539053e9c2a0eea9e38b5b6c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B4BD8AC7-1474-45B9-87B4-845611FD1CAD}\1.0\HELPDIR 04639854539053e9c2a0eea9e38b5b6c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6BE54215-DFC6-4D78-BF1A-E1F869104825}\ProxyStubClsid32 04639854539053e9c2a0eea9e38b5b6c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4}\InprocHandler32\ = "ole32.dll" 04639854539053e9c2a0eea9e38b5b6c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4}\ = "sqltest.Application" 04639854539053e9c2a0eea9e38b5b6c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\sqltest.Application\CLSID\ = "{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4}" 04639854539053e9c2a0eea9e38b5b6c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\046398~1.EXE" 04639854539053e9c2a0eea9e38b5b6c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B4BD8AC7-1474-45B9-87B4-845611FD1CAD}\1.0\FLAGS\ = "0" 04639854539053e9c2a0eea9e38b5b6c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6BE54215-DFC6-4D78-BF1A-E1F869104825}\ = "Isqltest" 04639854539053e9c2a0eea9e38b5b6c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4}\LocalServer32 04639854539053e9c2a0eea9e38b5b6c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sqltest.Application\CLSID 04639854539053e9c2a0eea9e38b5b6c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6BE54215-DFC6-4D78-BF1A-E1F869104825}\ = "Isqltest" 04639854539053e9c2a0eea9e38b5b6c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6BE54215-DFC6-4D78-BF1A-E1F869104825}\TypeLib\Version = "1.0" 04639854539053e9c2a0eea9e38b5b6c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sqltest.Application\CLSID 04639854539053e9c2a0eea9e38b5b6c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4}\InprocHandler32 04639854539053e9c2a0eea9e38b5b6c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\sqltest.Application\ = "sqltest.Application" 04639854539053e9c2a0eea9e38b5b6c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B4BD8AC7-1474-45B9-87B4-845611FD1CAD}\1.0\HELPDIR\ 04639854539053e9c2a0eea9e38b5b6c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6BE54215-DFC6-4D78-BF1A-E1F869104825}\TypeLib 04639854539053e9c2a0eea9e38b5b6c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6BE54215-DFC6-4D78-BF1A-E1F869104825}\TypeLib 04639854539053e9c2a0eea9e38b5b6c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sqltest.Application 04639854539053e9c2a0eea9e38b5b6c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B4BD8AC7-1474-45B9-87B4-845611FD1CAD}\1.0\FLAGS 04639854539053e9c2a0eea9e38b5b6c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4}\ProgID 04639854539053e9c2a0eea9e38b5b6c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B4BD8AC7-1474-45B9-87B4-845611FD1CAD}\1.0\ = "sqltest" 04639854539053e9c2a0eea9e38b5b6c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B4BD8AC7-1474-45B9-87B4-845611FD1CAD}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\04639854539053e9c2a0eea9e38b5b6c.exe" 04639854539053e9c2a0eea9e38b5b6c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6BE54215-DFC6-4D78-BF1A-E1F869104825} 04639854539053e9c2a0eea9e38b5b6c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6BE54215-DFC6-4D78-BF1A-E1F869104825}\TypeLib\ = "{B4BD8AC7-1474-45B9-87B4-845611FD1CAD}" 04639854539053e9c2a0eea9e38b5b6c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4}\ProgID\ = "sqltest.Application" 04639854539053e9c2a0eea9e38b5b6c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4}\ProgID 04639854539053e9c2a0eea9e38b5b6c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4}\InprocHandler32 04639854539053e9c2a0eea9e38b5b6c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4}\LocalServer32 04639854539053e9c2a0eea9e38b5b6c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B4BD8AC7-1474-45B9-87B4-845611FD1CAD}\1.0\0 04639854539053e9c2a0eea9e38b5b6c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6BE54215-DFC6-4D78-BF1A-E1F869104825} 04639854539053e9c2a0eea9e38b5b6c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6BE54215-DFC6-4D78-BF1A-E1F869104825}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" 04639854539053e9c2a0eea9e38b5b6c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4} 04639854539053e9c2a0eea9e38b5b6c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B4BD8AC7-1474-45B9-87B4-845611FD1CAD} 04639854539053e9c2a0eea9e38b5b6c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B4BD8AC7-1474-45B9-87B4-845611FD1CAD}\1.0\0\win32 04639854539053e9c2a0eea9e38b5b6c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6BE54215-DFC6-4D78-BF1A-E1F869104825}\ProxyStubClsid32 04639854539053e9c2a0eea9e38b5b6c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6BE54215-DFC6-4D78-BF1A-E1F869104825}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" 04639854539053e9c2a0eea9e38b5b6c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6BE54215-DFC6-4D78-BF1A-E1F869104825}\TypeLib\ = "{B4BD8AC7-1474-45B9-87B4-845611FD1CAD}" 04639854539053e9c2a0eea9e38b5b6c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6BE54215-DFC6-4D78-BF1A-E1F869104825}\TypeLib\Version = "1.0" 04639854539053e9c2a0eea9e38b5b6c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\sqltest.Application\CLSID\ = "{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4}" 04639854539053e9c2a0eea9e38b5b6c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\046398~1.EXE" 04639854539053e9c2a0eea9e38b5b6c.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 52 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4836 04639854539053e9c2a0eea9e38b5b6c.exe 4836 04639854539053e9c2a0eea9e38b5b6c.exe 2024 04639854539053e9c2a0eea9e38b5b6c.exe 2024 04639854539053e9c2a0eea9e38b5b6c.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4836 wrote to memory of 2024 4836 04639854539053e9c2a0eea9e38b5b6c.exe 85 PID 4836 wrote to memory of 2024 4836 04639854539053e9c2a0eea9e38b5b6c.exe 85 PID 4836 wrote to memory of 2024 4836 04639854539053e9c2a0eea9e38b5b6c.exe 85 PID 4984 wrote to memory of 3896 4984 rundll32.exe 96 PID 4984 wrote to memory of 3896 4984 rundll32.exe 96 PID 4984 wrote to memory of 3896 4984 rundll32.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\04639854539053e9c2a0eea9e38b5b6c.exe"C:\Users\Admin\AppData\Local\Temp\04639854539053e9c2a0eea9e38b5b6c.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\04639854539053e9c2a0eea9e38b5b6c.exe"C:\Users\Admin\AppData\Local\Temp\04639854539053e9c2a0eea9e38b5b6c.exe" -h2⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2024
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",open1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",open2⤵
- Loads dropped DLL
PID:3896 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3896 -s 6003⤵
- Program crash
PID:2436
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3896 -ip 38961⤵PID:2580
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
557KB
MD550195924762ca74975bfe703a408e687
SHA1e3d29ab66cba1da445c98ae7c26c3e822aa5debf
SHA256a04ae2447a8a37d4a5542815189ccca3dca71c02d744f51c6cbcee4048204116
SHA51261902d8b500b19438fdcdc3d99b238313c95d15947f29e6f5c30b5e5a90aaf92624ee153648d33024cba20f6dbaf599deca5cd5c64cb2b7f3d9f8ea1de9800a0
-
Filesize
52KB
MD51b20e998d058e813dfc515867d31124f
SHA1c9dc9c42a748af18ae1a8c882b90a2b9e3313e6f
SHA25624a53033a2e89acf65f6a5e60d35cb223585817032635e81bf31264eb7dabd00
SHA51279849fbdb9a9e7f7684b570d14662448b093b8aa2b23dfd95856db3a78faf75a95d95c51b8aa8506c4fbecffebcc57cd153dda38c830c05b8cd38629fae673c6
-
Filesize
52KB
MD51b20e998d058e813dfc515867d31124f
SHA1c9dc9c42a748af18ae1a8c882b90a2b9e3313e6f
SHA25624a53033a2e89acf65f6a5e60d35cb223585817032635e81bf31264eb7dabd00
SHA51279849fbdb9a9e7f7684b570d14662448b093b8aa2b23dfd95856db3a78faf75a95d95c51b8aa8506c4fbecffebcc57cd153dda38c830c05b8cd38629fae673c6