Analysis

  • max time kernel
    135s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/03/2023, 10:13 UTC

General

  • Target

    tmp.exe

  • Size

    328KB

  • MD5

    0b39012e51e6d52ddc49dd9676ba9920

  • SHA1

    7e329120d82c58a5f2ccae98eb78d749f1095ff4

  • SHA256

    6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10

  • SHA512

    8d13528c02f727d6c15257050657f702622fdbc7836f0b01eda8f48edbe2aa2bb4f8dceb3652f9adead9774f3387a6bba20f95b988dd9fee642ddba5bd457a0c

  • SSDEEP

    6144:evSBanJK/5kPas8N0HEAAf1vbViarAWbd33uEPT:evjas8uHEAAtvBpkLEPT

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Modifies registry class 44 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1644
    • C:\Users\Admin\AppData\Local\Temp\tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp.exe" -h
      2⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4952
  • C:\Windows\system32\rundll32.exe
    rundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",open
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",open
      2⤵
      • Loads dropped DLL
      PID:1992
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1992 -s 600
        3⤵
        • Program crash
        PID:308
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1992 -ip 1992
    1⤵
      PID:4612

    Network

    • flag-us
      DNS
      97.17.167.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      97.17.167.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      j.ffbbjjkk.com
      tmp.exe
      Remote address:
      8.8.8.8:53
      Request
      j.ffbbjjkk.com
      IN A
      Response
      j.ffbbjjkk.com
      IN A
      104.21.8.227
      j.ffbbjjkk.com
      IN A
      172.67.158.22
    • flag-us
      GET
      https://j.ffbbjjkk.com/35.html
      tmp.exe
      Remote address:
      104.21.8.227:443
      Request
      GET /35.html HTTP/1.1
      Connection: Keep-Alive
      Accept: */*
      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
      Host: j.ffbbjjkk.com
      Response
      HTTP/1.1 200 OK
      Date: Thu, 16 Mar 2023 10:13:39 GMT
      Content-Length: 571252
      Connection: keep-alive
      Last-Modified: Wed, 08 Mar 2023 18:26:30 GMT
      ETag: "8b774-5f667aabb0180"
      Accept-Ranges: bytes
      CF-Cache-Status: DYNAMIC
      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=P%2B65ghIkUaeFnhH6OBXOLGZ7Dgtd8FYh6e2qeLW8bd3hD07%2F0fxIrO0ctKOhlp6SB8N4atS%2Fxlzie6sU7rFEE0bXlUunbKzrUk3eKqbNHoAVHRcFoLXGr%2BxtVLSUUSeSoA%3D%3D"}],"group":"cf-nel","max_age":604800}
      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
      Server: cloudflare
      CF-RAY: 7a8c3987dfe20bb6-AMS
      alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
    • flag-us
      GET
      https://j.ffbbjjkk.com/logo.png
      tmp.exe
      Remote address:
      104.21.8.227:443
      Request
      GET /logo.png HTTP/1.1
      Connection: Keep-Alive
      Accept: */*
      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
      Host: j.ffbbjjkk.com
      Response
      HTTP/1.1 200 OK
      Date: Thu, 16 Mar 2023 10:13:40 GMT
      Content-Type: image/png
      Content-Length: 59217
      Connection: keep-alive
      Last-Modified: Tue, 31 Jan 2023 07:35:43 GMT
      ETag: "e751-5f38a611cd3c7"
      Cache-Control: max-age=14400
      CF-Cache-Status: HIT
      Age: 2741
      Accept-Ranges: bytes
      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=inhqyiJwgGPXDcOezrtRratAwGIt6FOsaTq5g3WHbn9fAWHJ2V7Jc7r3q09l7G4sIgxYmxRfYnI2Xcc243Pcj1uUkMx5MAdZSd1o4wL%2FShvIE%2F4VVpnF4wt49RK6fQFiRQ%3D%3D"}],"group":"cf-nel","max_age":604800}
      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
      Server: cloudflare
      CF-RAY: 7a8c3991fd070bb6-AMS
      alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
    • flag-us
      DNS
      76.38.195.152.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      76.38.195.152.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      227.8.21.104.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      227.8.21.104.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      210.81.184.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      210.81.184.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      39.146.190.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      39.146.190.20.in-addr.arpa
      IN PTR
      Response
      39.146.190.20.in-addr.arpa
      IN CNAME
      39.0-26.146.190.20.in-addr.arpa
    • flag-us
      DNS
      28.118.140.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      28.118.140.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      232.168.11.51.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      232.168.11.51.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      234.238.32.23.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      234.238.32.23.in-addr.arpa
      IN PTR
      Response
      234.238.32.23.in-addr.arpa
      IN PTR
      a23-32-238-234deploystaticakamaitechnologiescom
    • flag-us
      DNS
      86.8.109.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      86.8.109.52.in-addr.arpa
      IN PTR
      Response
    • 152.195.38.76:80
      46 B
      40 B
      1
      1
    • 152.195.38.76:80
      46 B
      40 B
      1
      1
    • 152.195.38.76:80
      46 B
      40 B
      1
      1
    • 104.21.8.227:443
      https://j.ffbbjjkk.com/logo.png
      tls, http
      tmp.exe
      14.3kB
      664.8kB
      297
      582

      HTTP Request

      GET https://j.ffbbjjkk.com/35.html

      HTTP Response

      200

      HTTP Request

      GET https://j.ffbbjjkk.com/logo.png

      HTTP Response

      200
    • 52.152.110.14:443
      260 B
      5
    • 20.189.173.2:443
      322 B
      7
    • 93.184.221.240:80
      322 B
      7
    • 52.152.110.14:443
      260 B
      5
    • 173.223.113.164:443
      322 B
      7
    • 173.223.113.131:80
      322 B
      7
    • 204.79.197.203:80
      322 B
      7
    • 52.152.110.14:443
      260 B
      5
    • 52.152.110.14:443
      260 B
      5
    • 52.152.110.14:443
      260 B
      5
    • 52.152.110.14:443
      260 B
      5
    • 8.8.8.8:53
      97.17.167.52.in-addr.arpa
      dns
      71 B
      145 B
      1
      1

      DNS Request

      97.17.167.52.in-addr.arpa

    • 8.8.8.8:53
      j.ffbbjjkk.com
      dns
      tmp.exe
      60 B
      92 B
      1
      1

      DNS Request

      j.ffbbjjkk.com

      DNS Response

      104.21.8.227
      172.67.158.22

    • 8.8.8.8:53
      76.38.195.152.in-addr.arpa
      dns
      72 B
      143 B
      1
      1

      DNS Request

      76.38.195.152.in-addr.arpa

    • 8.8.8.8:53
      227.8.21.104.in-addr.arpa
      dns
      71 B
      133 B
      1
      1

      DNS Request

      227.8.21.104.in-addr.arpa

    • 8.8.8.8:53
      210.81.184.52.in-addr.arpa
      dns
      72 B
      146 B
      1
      1

      DNS Request

      210.81.184.52.in-addr.arpa

    • 8.8.8.8:53
      39.146.190.20.in-addr.arpa
      dns
      72 B
      168 B
      1
      1

      DNS Request

      39.146.190.20.in-addr.arpa

    • 8.8.8.8:53
      28.118.140.52.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      28.118.140.52.in-addr.arpa

    • 8.8.8.8:53
      232.168.11.51.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      232.168.11.51.in-addr.arpa

    • 8.8.8.8:53
      234.238.32.23.in-addr.arpa
      dns
      72 B
      137 B
      1
      1

      DNS Request

      234.238.32.23.in-addr.arpa

    • 8.8.8.8:53
      86.8.109.52.in-addr.arpa
      dns
      70 B
      144 B
      1
      1

      DNS Request

      86.8.109.52.in-addr.arpa

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\db.dat

      Filesize

      557KB

      MD5

      b15c9612f747a2c7d6c429275c853b23

      SHA1

      46b5013dcc6677feabafb3c35d8aec6e79e1e6d3

      SHA256

      07b7dbc6e80247cee12695bc386079435ec90d0228f799ff884330b9f4e3c2d5

      SHA512

      2f70c8c18434e7a7e1475acda04ba2d3e13fd20c73ee14ff28eda50394898333e8c7067bea69cca28cff1226cdf050db55df2bcd629fb82b9f0535a505d07305

    • C:\Users\Admin\AppData\Local\Temp\db.dll

      Filesize

      52KB

      MD5

      1b20e998d058e813dfc515867d31124f

      SHA1

      c9dc9c42a748af18ae1a8c882b90a2b9e3313e6f

      SHA256

      24a53033a2e89acf65f6a5e60d35cb223585817032635e81bf31264eb7dabd00

      SHA512

      79849fbdb9a9e7f7684b570d14662448b093b8aa2b23dfd95856db3a78faf75a95d95c51b8aa8506c4fbecffebcc57cd153dda38c830c05b8cd38629fae673c6

    • C:\Users\Admin\AppData\Local\Temp\db.dll

      Filesize

      52KB

      MD5

      1b20e998d058e813dfc515867d31124f

      SHA1

      c9dc9c42a748af18ae1a8c882b90a2b9e3313e6f

      SHA256

      24a53033a2e89acf65f6a5e60d35cb223585817032635e81bf31264eb7dabd00

      SHA512

      79849fbdb9a9e7f7684b570d14662448b093b8aa2b23dfd95856db3a78faf75a95d95c51b8aa8506c4fbecffebcc57cd153dda38c830c05b8cd38629fae673c6

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.