Analysis
-
max time kernel
128s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
16-03-2023 17:04
Static task
static1
Behavioral task
behavioral1
Sample
0b39012e51e6d52ddc49dd9676ba9920.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
0b39012e51e6d52ddc49dd9676ba9920.exe
Resource
win10v2004-20230220-en
General
-
Target
0b39012e51e6d52ddc49dd9676ba9920.exe
-
Size
328KB
-
MD5
0b39012e51e6d52ddc49dd9676ba9920
-
SHA1
7e329120d82c58a5f2ccae98eb78d749f1095ff4
-
SHA256
6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10
-
SHA512
8d13528c02f727d6c15257050657f702622fdbc7836f0b01eda8f48edbe2aa2bb4f8dceb3652f9adead9774f3387a6bba20f95b988dd9fee642ddba5bd457a0c
-
SSDEEP
6144:evSBanJK/5kPas8N0HEAAf1vbViarAWbd33uEPT:evjas8uHEAAtvBpkLEPT
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rundll32.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3416 4976 rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
0b39012e51e6d52ddc49dd9676ba9920.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation 0b39012e51e6d52ddc49dd9676ba9920.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 2800 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2232 2800 WerFault.exe rundll32.exe -
Modifies registry class 44 IoCs
Processes:
0b39012e51e6d52ddc49dd9676ba9920.exe0b39012e51e6d52ddc49dd9676ba9920.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6BE54215-DFC6-4D78-BF1A-E1F869104825}\ProxyStubClsid32 0b39012e51e6d52ddc49dd9676ba9920.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6BE54215-DFC6-4D78-BF1A-E1F869104825}\TypeLib\Version = "1.0" 0b39012e51e6d52ddc49dd9676ba9920.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4} 0b39012e51e6d52ddc49dd9676ba9920.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sqltest.Application\CLSID 0b39012e51e6d52ddc49dd9676ba9920.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4}\ProgID\ = "sqltest.Application" 0b39012e51e6d52ddc49dd9676ba9920.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4}\InprocHandler32\ = "ole32.dll" 0b39012e51e6d52ddc49dd9676ba9920.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B4BD8AC7-1474-45B9-87B4-845611FD1CAD}\1.0\HELPDIR\ 0b39012e51e6d52ddc49dd9676ba9920.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6BE54215-DFC6-4D78-BF1A-E1F869104825}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" 0b39012e51e6d52ddc49dd9676ba9920.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4}\InprocHandler32 0b39012e51e6d52ddc49dd9676ba9920.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6BE54215-DFC6-4D78-BF1A-E1F869104825}\ProxyStubClsid32 0b39012e51e6d52ddc49dd9676ba9920.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6BE54215-DFC6-4D78-BF1A-E1F869104825}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" 0b39012e51e6d52ddc49dd9676ba9920.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\sqltest.Application\CLSID\ = "{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4}" 0b39012e51e6d52ddc49dd9676ba9920.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B4BD8AC7-1474-45B9-87B4-845611FD1CAD} 0b39012e51e6d52ddc49dd9676ba9920.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B4BD8AC7-1474-45B9-87B4-845611FD1CAD}\1.0\FLAGS 0b39012e51e6d52ddc49dd9676ba9920.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4}\ProgID 0b39012e51e6d52ddc49dd9676ba9920.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4}\InprocHandler32 0b39012e51e6d52ddc49dd9676ba9920.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6BE54215-DFC6-4D78-BF1A-E1F869104825}\ = "Isqltest" 0b39012e51e6d52ddc49dd9676ba9920.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6BE54215-DFC6-4D78-BF1A-E1F869104825}\TypeLib 0b39012e51e6d52ddc49dd9676ba9920.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6BE54215-DFC6-4D78-BF1A-E1F869104825}\TypeLib\Version = "1.0" 0b39012e51e6d52ddc49dd9676ba9920.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sqltest.Application 0b39012e51e6d52ddc49dd9676ba9920.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\sqltest.Application\ = "sqltest.Application" 0b39012e51e6d52ddc49dd9676ba9920.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4}\ = "sqltest.Application" 0b39012e51e6d52ddc49dd9676ba9920.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\sqltest.Application\CLSID\ = "{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4}" 0b39012e51e6d52ddc49dd9676ba9920.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4}\LocalServer32 0b39012e51e6d52ddc49dd9676ba9920.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4}\ProgID 0b39012e51e6d52ddc49dd9676ba9920.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B4BD8AC7-1474-45B9-87B4-845611FD1CAD}\1.0\0 0b39012e51e6d52ddc49dd9676ba9920.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6BE54215-DFC6-4D78-BF1A-E1F869104825}\ = "Isqltest" 0b39012e51e6d52ddc49dd9676ba9920.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6BE54215-DFC6-4D78-BF1A-E1F869104825}\TypeLib 0b39012e51e6d52ddc49dd9676ba9920.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6BE54215-DFC6-4D78-BF1A-E1F869104825} 0b39012e51e6d52ddc49dd9676ba9920.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sqltest.Application\CLSID 0b39012e51e6d52ddc49dd9676ba9920.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4}\LocalServer32 0b39012e51e6d52ddc49dd9676ba9920.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B4BD8AC7-1474-45B9-87B4-845611FD1CAD}\1.0 0b39012e51e6d52ddc49dd9676ba9920.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B4BD8AC7-1474-45B9-87B4-845611FD1CAD}\1.0\0\win32 0b39012e51e6d52ddc49dd9676ba9920.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B4BD8AC7-1474-45B9-87B4-845611FD1CAD}\1.0\HELPDIR 0b39012e51e6d52ddc49dd9676ba9920.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6BE54215-DFC6-4D78-BF1A-E1F869104825} 0b39012e51e6d52ddc49dd9676ba9920.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6BE54215-DFC6-4D78-BF1A-E1F869104825}\TypeLib\ = "{B4BD8AC7-1474-45B9-87B4-845611FD1CAD}" 0b39012e51e6d52ddc49dd9676ba9920.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4}\ProgID\ = "sqltest.Application" 0b39012e51e6d52ddc49dd9676ba9920.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\0B3901~1.EXE" 0b39012e51e6d52ddc49dd9676ba9920.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B4BD8AC7-1474-45B9-87B4-845611FD1CAD}\1.0\ = "sqltest" 0b39012e51e6d52ddc49dd9676ba9920.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B4BD8AC7-1474-45B9-87B4-845611FD1CAD}\1.0\FLAGS\ = "0" 0b39012e51e6d52ddc49dd9676ba9920.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\0B3901~1.EXE" 0b39012e51e6d52ddc49dd9676ba9920.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4}\InprocHandler32\ = "ole32.dll" 0b39012e51e6d52ddc49dd9676ba9920.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B4BD8AC7-1474-45B9-87B4-845611FD1CAD}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\0b39012e51e6d52ddc49dd9676ba9920.exe" 0b39012e51e6d52ddc49dd9676ba9920.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6BE54215-DFC6-4D78-BF1A-E1F869104825}\TypeLib\ = "{B4BD8AC7-1474-45B9-87B4-845611FD1CAD}" 0b39012e51e6d52ddc49dd9676ba9920.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 31 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
0b39012e51e6d52ddc49dd9676ba9920.exe0b39012e51e6d52ddc49dd9676ba9920.exepid process 2160 0b39012e51e6d52ddc49dd9676ba9920.exe 2160 0b39012e51e6d52ddc49dd9676ba9920.exe 1360 0b39012e51e6d52ddc49dd9676ba9920.exe 1360 0b39012e51e6d52ddc49dd9676ba9920.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
0b39012e51e6d52ddc49dd9676ba9920.exerundll32.exedescription pid process target process PID 2160 wrote to memory of 1360 2160 0b39012e51e6d52ddc49dd9676ba9920.exe 0b39012e51e6d52ddc49dd9676ba9920.exe PID 2160 wrote to memory of 1360 2160 0b39012e51e6d52ddc49dd9676ba9920.exe 0b39012e51e6d52ddc49dd9676ba9920.exe PID 2160 wrote to memory of 1360 2160 0b39012e51e6d52ddc49dd9676ba9920.exe 0b39012e51e6d52ddc49dd9676ba9920.exe PID 3416 wrote to memory of 2800 3416 rundll32.exe rundll32.exe PID 3416 wrote to memory of 2800 3416 rundll32.exe rundll32.exe PID 3416 wrote to memory of 2800 3416 rundll32.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b39012e51e6d52ddc49dd9676ba9920.exe"C:\Users\Admin\AppData\Local\Temp\0b39012e51e6d52ddc49dd9676ba9920.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\0b39012e51e6d52ddc49dd9676ba9920.exe"C:\Users\Admin\AppData\Local\Temp\0b39012e51e6d52ddc49dd9676ba9920.exe" -h2⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1360
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",open1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",open2⤵
- Loads dropped DLL
PID:2800 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2800 -s 6003⤵
- Program crash
PID:2232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2800 -ip 28001⤵PID:4764
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
557KB
MD5b15c9612f747a2c7d6c429275c853b23
SHA146b5013dcc6677feabafb3c35d8aec6e79e1e6d3
SHA25607b7dbc6e80247cee12695bc386079435ec90d0228f799ff884330b9f4e3c2d5
SHA5122f70c8c18434e7a7e1475acda04ba2d3e13fd20c73ee14ff28eda50394898333e8c7067bea69cca28cff1226cdf050db55df2bcd629fb82b9f0535a505d07305
-
Filesize
52KB
MD51b20e998d058e813dfc515867d31124f
SHA1c9dc9c42a748af18ae1a8c882b90a2b9e3313e6f
SHA25624a53033a2e89acf65f6a5e60d35cb223585817032635e81bf31264eb7dabd00
SHA51279849fbdb9a9e7f7684b570d14662448b093b8aa2b23dfd95856db3a78faf75a95d95c51b8aa8506c4fbecffebcc57cd153dda38c830c05b8cd38629fae673c6
-
Filesize
52KB
MD51b20e998d058e813dfc515867d31124f
SHA1c9dc9c42a748af18ae1a8c882b90a2b9e3313e6f
SHA25624a53033a2e89acf65f6a5e60d35cb223585817032635e81bf31264eb7dabd00
SHA51279849fbdb9a9e7f7684b570d14662448b093b8aa2b23dfd95856db3a78faf75a95d95c51b8aa8506c4fbecffebcc57cd153dda38c830c05b8cd38629fae673c6