Analysis
-
max time kernel
78s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
24-03-2023 01:31
Static task
static1
Behavioral task
behavioral1
Sample
bbd550a356ad847fbec4080976e7f7d72b3d431d923df772b65880b7a5cc7254.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
bbd550a356ad847fbec4080976e7f7d72b3d431d923df772b65880b7a5cc7254.exe
Resource
win10v2004-20230221-en
General
-
Target
bbd550a356ad847fbec4080976e7f7d72b3d431d923df772b65880b7a5cc7254.exe
-
Size
880KB
-
MD5
50793b3b016fe3d7042a286e70c8c2db
-
SHA1
636db5add1b385fdbe8f01a097a39aa64591fc8e
-
SHA256
bbd550a356ad847fbec4080976e7f7d72b3d431d923df772b65880b7a5cc7254
-
SHA512
b2035b2fcd0eb4b3874b2a0cf14ce25b17509129fe88924f1884a70e78b51a78922d6299e728b113754cbb1b21f02565c4367644d99712f93f052134a9ac91b3
-
SSDEEP
6144:LQuiA1RTz/cYja2ieb5YbF5R+Jn8xH97r7FU1d43wUmDm:nz/9ja2ieFYp5R+I7uY
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rundll32.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 380 3416 rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
bbd550a356ad847fbec4080976e7f7d72b3d431d923df772b65880b7a5cc7254.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation bbd550a356ad847fbec4080976e7f7d72b3d431d923df772b65880b7a5cc7254.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 1324 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1112 1324 WerFault.exe rundll32.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 14 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
bbd550a356ad847fbec4080976e7f7d72b3d431d923df772b65880b7a5cc7254.exebbd550a356ad847fbec4080976e7f7d72b3d431d923df772b65880b7a5cc7254.exepid process 4824 bbd550a356ad847fbec4080976e7f7d72b3d431d923df772b65880b7a5cc7254.exe 4824 bbd550a356ad847fbec4080976e7f7d72b3d431d923df772b65880b7a5cc7254.exe 2076 bbd550a356ad847fbec4080976e7f7d72b3d431d923df772b65880b7a5cc7254.exe 2076 bbd550a356ad847fbec4080976e7f7d72b3d431d923df772b65880b7a5cc7254.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
bbd550a356ad847fbec4080976e7f7d72b3d431d923df772b65880b7a5cc7254.exerundll32.exedescription pid process target process PID 4824 wrote to memory of 2076 4824 bbd550a356ad847fbec4080976e7f7d72b3d431d923df772b65880b7a5cc7254.exe bbd550a356ad847fbec4080976e7f7d72b3d431d923df772b65880b7a5cc7254.exe PID 4824 wrote to memory of 2076 4824 bbd550a356ad847fbec4080976e7f7d72b3d431d923df772b65880b7a5cc7254.exe bbd550a356ad847fbec4080976e7f7d72b3d431d923df772b65880b7a5cc7254.exe PID 4824 wrote to memory of 2076 4824 bbd550a356ad847fbec4080976e7f7d72b3d431d923df772b65880b7a5cc7254.exe bbd550a356ad847fbec4080976e7f7d72b3d431d923df772b65880b7a5cc7254.exe PID 380 wrote to memory of 1324 380 rundll32.exe rundll32.exe PID 380 wrote to memory of 1324 380 rundll32.exe rundll32.exe PID 380 wrote to memory of 1324 380 rundll32.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bbd550a356ad847fbec4080976e7f7d72b3d431d923df772b65880b7a5cc7254.exe"C:\Users\Admin\AppData\Local\Temp\bbd550a356ad847fbec4080976e7f7d72b3d431d923df772b65880b7a5cc7254.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\bbd550a356ad847fbec4080976e7f7d72b3d431d923df772b65880b7a5cc7254.exe"C:\Users\Admin\AppData\Local\Temp\bbd550a356ad847fbec4080976e7f7d72b3d431d923df772b65880b7a5cc7254.exe" -h2⤵
- Suspicious use of SetWindowsHookEx
PID:2076
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",open1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",open2⤵
- Loads dropped DLL
PID:1324 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1324 -s 6003⤵
- Program crash
PID:1112
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 1324 -ip 13241⤵PID:1160
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
557KB
MD512a2ea9884738cc71cd622a9c86bc041
SHA1e0dbb25a0c54b69c2b35e05ba58f40b053463f4b
SHA2561181ed73b4f90cb0fc4c787d4791adf14ac25bbb02460a78ab0959bd2dbf5aaf
SHA512d0abf082376c90bdaff759b7e7502c0791de17ca554e695141506e6f6f0fe29aac9d71e817d4a601e2b2db47c88e03203d54f59cdd29c0f7b1e161c5a063c15b
-
Filesize
52KB
MD51b20e998d058e813dfc515867d31124f
SHA1c9dc9c42a748af18ae1a8c882b90a2b9e3313e6f
SHA25624a53033a2e89acf65f6a5e60d35cb223585817032635e81bf31264eb7dabd00
SHA51279849fbdb9a9e7f7684b570d14662448b093b8aa2b23dfd95856db3a78faf75a95d95c51b8aa8506c4fbecffebcc57cd153dda38c830c05b8cd38629fae673c6
-
Filesize
52KB
MD51b20e998d058e813dfc515867d31124f
SHA1c9dc9c42a748af18ae1a8c882b90a2b9e3313e6f
SHA25624a53033a2e89acf65f6a5e60d35cb223585817032635e81bf31264eb7dabd00
SHA51279849fbdb9a9e7f7684b570d14662448b093b8aa2b23dfd95856db3a78faf75a95d95c51b8aa8506c4fbecffebcc57cd153dda38c830c05b8cd38629fae673c6