Analysis
-
max time kernel
144s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
17-03-2023 07:07
Static task
static1
Behavioral task
behavioral1
Sample
6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10.exe
Resource
win10v2004-20230220-en
General
-
Target
6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10.exe
-
Size
328KB
-
MD5
0b39012e51e6d52ddc49dd9676ba9920
-
SHA1
7e329120d82c58a5f2ccae98eb78d749f1095ff4
-
SHA256
6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10
-
SHA512
8d13528c02f727d6c15257050657f702622fdbc7836f0b01eda8f48edbe2aa2bb4f8dceb3652f9adead9774f3387a6bba20f95b988dd9fee642ddba5bd457a0c
-
SSDEEP
6144:evSBanJK/5kPas8N0HEAAf1vbViarAWbd33uEPT:evjas8uHEAAtvBpkLEPT
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4528 3120 rundll32.exe 84 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation 6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10.exe -
Loads dropped DLL 1 IoCs
pid Process 3596 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3808 3596 WerFault.exe 96 -
Modifies registry class 44 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4}\LocalServer32 6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4}\ProgID 6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B4BD8AC7-1474-45B9-87B4-845611FD1CAD}\1.0\FLAGS 6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6BE54215-DFC6-4D78-BF1A-E1F869104825}\ = "Isqltest" 6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6BE54215-DFC6-4D78-BF1A-E1F869104825}\TypeLib 6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6BE54215-DFC6-4D78-BF1A-E1F869104825}\ProxyStubClsid32 6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sqltest.Application\CLSID 6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4}\InprocHandler32\ = "ole32.dll" 6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4} 6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B4BD8AC7-1474-45B9-87B4-845611FD1CAD}\1.0 6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B4BD8AC7-1474-45B9-87B4-845611FD1CAD}\1.0\HELPDIR\ 6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6BE54215-DFC6-4D78-BF1A-E1F869104825}\TypeLib 6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6BE54215-DFC6-4D78-BF1A-E1F869104825}\TypeLib\ = "{B4BD8AC7-1474-45B9-87B4-845611FD1CAD}" 6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4}\InprocHandler32 6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sqltest.Application 6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4}\ProgID\ = "sqltest.Application" 6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sqltest.Application\CLSID 6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B4BD8AC7-1474-45B9-87B4-845611FD1CAD}\1.0\0 6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B4BD8AC7-1474-45B9-87B4-845611FD1CAD}\1.0\0\win32 6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6BE54215-DFC6-4D78-BF1A-E1F869104825}\TypeLib\Version = "1.0" 6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\sqltest.Application\CLSID\ = "{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4}" 6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\6AEA18~1.EXE" 6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\sqltest.Application\ = "sqltest.Application" 6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B4BD8AC7-1474-45B9-87B4-845611FD1CAD} 6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B4BD8AC7-1474-45B9-87B4-845611FD1CAD}\1.0\HELPDIR 6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6BE54215-DFC6-4D78-BF1A-E1F869104825}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" 6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6BE54215-DFC6-4D78-BF1A-E1F869104825}\TypeLib\ = "{B4BD8AC7-1474-45B9-87B4-845611FD1CAD}" 6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6BE54215-DFC6-4D78-BF1A-E1F869104825} 6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4}\ = "sqltest.Application" 6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\sqltest.Application\CLSID\ = "{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4}" 6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4}\LocalServer32 6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B4BD8AC7-1474-45B9-87B4-845611FD1CAD}\1.0\ = "sqltest" 6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6BE54215-DFC6-4D78-BF1A-E1F869104825} 6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6BE54215-DFC6-4D78-BF1A-E1F869104825}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" 6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4}\ProgID 6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4}\InprocHandler32 6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4}\InprocHandler32\ = "ole32.dll" 6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\6AEA18~1.EXE" 6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B4BD8AC7-1474-45B9-87B4-845611FD1CAD}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10.exe" 6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6BE54215-DFC6-4D78-BF1A-E1F869104825}\ProxyStubClsid32 6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6BE54215-DFC6-4D78-BF1A-E1F869104825}\ = "Isqltest" 6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6BE54215-DFC6-4D78-BF1A-E1F869104825}\TypeLib\Version = "1.0" 6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069D06BB-F6A9-428D-9070-FCFF8F5BC5F4}\ProgID\ = "sqltest.Application" 6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B4BD8AC7-1474-45B9-87B4-845611FD1CAD}\1.0\FLAGS\ = "0" 6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 45 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1240 6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10.exe 1240 6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10.exe 916 6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10.exe 916 6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1240 wrote to memory of 916 1240 6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10.exe 86 PID 1240 wrote to memory of 916 1240 6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10.exe 86 PID 1240 wrote to memory of 916 1240 6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10.exe 86 PID 4528 wrote to memory of 3596 4528 rundll32.exe 96 PID 4528 wrote to memory of 3596 4528 rundll32.exe 96 PID 4528 wrote to memory of 3596 4528 rundll32.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10.exe"C:\Users\Admin\AppData\Local\Temp\6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10.exe"C:\Users\Admin\AppData\Local\Temp\6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10.exe" -h2⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:916
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",open1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",open2⤵
- Loads dropped DLL
PID:3596 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3596 -s 6003⤵
- Program crash
PID:3808
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3596 -ip 35961⤵PID:1020
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
557KB
MD5b15c9612f747a2c7d6c429275c853b23
SHA146b5013dcc6677feabafb3c35d8aec6e79e1e6d3
SHA25607b7dbc6e80247cee12695bc386079435ec90d0228f799ff884330b9f4e3c2d5
SHA5122f70c8c18434e7a7e1475acda04ba2d3e13fd20c73ee14ff28eda50394898333e8c7067bea69cca28cff1226cdf050db55df2bcd629fb82b9f0535a505d07305
-
Filesize
52KB
MD51b20e998d058e813dfc515867d31124f
SHA1c9dc9c42a748af18ae1a8c882b90a2b9e3313e6f
SHA25624a53033a2e89acf65f6a5e60d35cb223585817032635e81bf31264eb7dabd00
SHA51279849fbdb9a9e7f7684b570d14662448b093b8aa2b23dfd95856db3a78faf75a95d95c51b8aa8506c4fbecffebcc57cd153dda38c830c05b8cd38629fae673c6
-
Filesize
52KB
MD51b20e998d058e813dfc515867d31124f
SHA1c9dc9c42a748af18ae1a8c882b90a2b9e3313e6f
SHA25624a53033a2e89acf65f6a5e60d35cb223585817032635e81bf31264eb7dabd00
SHA51279849fbdb9a9e7f7684b570d14662448b093b8aa2b23dfd95856db3a78faf75a95d95c51b8aa8506c4fbecffebcc57cd153dda38c830c05b8cd38629fae673c6