Analysis
-
max time kernel
143s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
21-03-2023 14:39
Static task
static1
Behavioral task
behavioral1
Sample
1d636ae88bab15613db7d92a33c0bd9d107270d68991faa01c6de1fa06364d92.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1d636ae88bab15613db7d92a33c0bd9d107270d68991faa01c6de1fa06364d92.exe
Resource
win10v2004-20230220-en
General
-
Target
1d636ae88bab15613db7d92a33c0bd9d107270d68991faa01c6de1fa06364d92.exe
-
Size
308KB
-
MD5
ae6df34a140bf74860ca3165d50d8705
-
SHA1
ca21f7b3086341f2927f07d7005cce7cf4585c6b
-
SHA256
1d636ae88bab15613db7d92a33c0bd9d107270d68991faa01c6de1fa06364d92
-
SHA512
28080dc00054e209739bdbfb64704dae6bd5c82376606ae1fd61c4e0bfc502019e687ceb26b11a066b27f6b9c14dbce382ae3d1097954bc604a40c8ecd2117d6
-
SSDEEP
6144:bOsY+HgEiTA14Xn0Ti8v1bbFgXIQdjrfzNt1AEP3:i814Xn0Ti8tbJyIQdjrfzmEP3
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3244 4600 rundll32.exe 25 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation 1d636ae88bab15613db7d92a33c0bd9d107270d68991faa01c6de1fa06364d92.exe -
Loads dropped DLL 1 IoCs
pid Process 4060 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 2336 4060 WerFault.exe 87 2456 4060 WerFault.exe 87 -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 16 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4628 1d636ae88bab15613db7d92a33c0bd9d107270d68991faa01c6de1fa06364d92.exe 4628 1d636ae88bab15613db7d92a33c0bd9d107270d68991faa01c6de1fa06364d92.exe 1344 1d636ae88bab15613db7d92a33c0bd9d107270d68991faa01c6de1fa06364d92.exe 1344 1d636ae88bab15613db7d92a33c0bd9d107270d68991faa01c6de1fa06364d92.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4628 wrote to memory of 1344 4628 1d636ae88bab15613db7d92a33c0bd9d107270d68991faa01c6de1fa06364d92.exe 84 PID 4628 wrote to memory of 1344 4628 1d636ae88bab15613db7d92a33c0bd9d107270d68991faa01c6de1fa06364d92.exe 84 PID 4628 wrote to memory of 1344 4628 1d636ae88bab15613db7d92a33c0bd9d107270d68991faa01c6de1fa06364d92.exe 84 PID 3244 wrote to memory of 4060 3244 rundll32.exe 87 PID 3244 wrote to memory of 4060 3244 rundll32.exe 87 PID 3244 wrote to memory of 4060 3244 rundll32.exe 87 PID 4060 wrote to memory of 2456 4060 rundll32.exe 91 PID 4060 wrote to memory of 2456 4060 rundll32.exe 91 PID 4060 wrote to memory of 2456 4060 rundll32.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d636ae88bab15613db7d92a33c0bd9d107270d68991faa01c6de1fa06364d92.exe"C:\Users\Admin\AppData\Local\Temp\1d636ae88bab15613db7d92a33c0bd9d107270d68991faa01c6de1fa06364d92.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Users\Admin\AppData\Local\Temp\1d636ae88bab15613db7d92a33c0bd9d107270d68991faa01c6de1fa06364d92.exe"C:\Users\Admin\AppData\Local\Temp\1d636ae88bab15613db7d92a33c0bd9d107270d68991faa01c6de1fa06364d92.exe" -h2⤵
- Suspicious use of SetWindowsHookEx
PID:1344
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",open1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",open2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4060 -s 6003⤵
- Program crash
PID:2336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4060 -s 6003⤵
- Program crash
PID:2456
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4060 -ip 40601⤵PID:4476
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
557KB
MD5b15c9612f747a2c7d6c429275c853b23
SHA146b5013dcc6677feabafb3c35d8aec6e79e1e6d3
SHA25607b7dbc6e80247cee12695bc386079435ec90d0228f799ff884330b9f4e3c2d5
SHA5122f70c8c18434e7a7e1475acda04ba2d3e13fd20c73ee14ff28eda50394898333e8c7067bea69cca28cff1226cdf050db55df2bcd629fb82b9f0535a505d07305
-
Filesize
52KB
MD51b20e998d058e813dfc515867d31124f
SHA1c9dc9c42a748af18ae1a8c882b90a2b9e3313e6f
SHA25624a53033a2e89acf65f6a5e60d35cb223585817032635e81bf31264eb7dabd00
SHA51279849fbdb9a9e7f7684b570d14662448b093b8aa2b23dfd95856db3a78faf75a95d95c51b8aa8506c4fbecffebcc57cd153dda38c830c05b8cd38629fae673c6
-
Filesize
52KB
MD51b20e998d058e813dfc515867d31124f
SHA1c9dc9c42a748af18ae1a8c882b90a2b9e3313e6f
SHA25624a53033a2e89acf65f6a5e60d35cb223585817032635e81bf31264eb7dabd00
SHA51279849fbdb9a9e7f7684b570d14662448b093b8aa2b23dfd95856db3a78faf75a95d95c51b8aa8506c4fbecffebcc57cd153dda38c830c05b8cd38629fae673c6