Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
30-06-2023 03:51
Static task
static1
Behavioral task
behavioral1
Sample
f019c781190cefb52a2ddde54379d29d.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
f019c781190cefb52a2ddde54379d29d.exe
Resource
win10v2004-20230621-en
General
-
Target
f019c781190cefb52a2ddde54379d29d.exe
-
Size
110KB
-
MD5
f019c781190cefb52a2ddde54379d29d
-
SHA1
db345587033eb8a26fd0edd6ee8492faac76ac40
-
SHA256
93465cd89175bd96c5200942aace1cf2acc9384ff1f028f1e845757ade82361b
-
SHA512
fd3335a31f5133274039fd5bff4bd89f0bd19c787de79ffc97a7c0f07985f783fd625a5404206b344b3f0ce0656ca6a71e8633e608832fb8dac424cf01075b99
-
SSDEEP
1536:J5C4c7H718iZJmhKhdoaIkcXTLjfWidbGPECG+1+2PwuLJWj9a53HMGvEXg4:q//18iZMhKhI+ubNLmLq9KHMzg4
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 4908 netsh.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4025927695-1301755775-2607443251-1000\Control Panel\International\Geo\Nation APIWrapper.exe Key value queried \REGISTRY\USER\S-1-5-21-4025927695-1301755775-2607443251-1000\Control Panel\International\Geo\Nation f019c781190cefb52a2ddde54379d29d.exe -
Executes dropped EXE 1 IoCs
pid Process 3460 APIWrapper.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4025927695-1301755775-2607443251-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ASB = "C:\\Users\\Admin\\AppData\\Local\\Temp\\APIWrapper.exe" APIWrapper.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4025927695-1301755775-2607443251-1000_Classes\Local Settings f019c781190cefb52a2ddde54379d29d.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 1868 NOTEPAD.EXE -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3460 APIWrapper.exe 3460 APIWrapper.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3460 APIWrapper.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4244 wrote to memory of 1868 4244 f019c781190cefb52a2ddde54379d29d.exe 83 PID 4244 wrote to memory of 1868 4244 f019c781190cefb52a2ddde54379d29d.exe 83 PID 4244 wrote to memory of 1868 4244 f019c781190cefb52a2ddde54379d29d.exe 83 PID 4244 wrote to memory of 3460 4244 f019c781190cefb52a2ddde54379d29d.exe 86 PID 4244 wrote to memory of 3460 4244 f019c781190cefb52a2ddde54379d29d.exe 86 PID 4244 wrote to memory of 3460 4244 f019c781190cefb52a2ddde54379d29d.exe 86 PID 3460 wrote to memory of 4908 3460 APIWrapper.exe 89 PID 3460 wrote to memory of 4908 3460 APIWrapper.exe 89 PID 3460 wrote to memory of 4908 3460 APIWrapper.exe 89 PID 3460 wrote to memory of 944 3460 APIWrapper.exe 91 PID 3460 wrote to memory of 944 3460 APIWrapper.exe 91 PID 3460 wrote to memory of 944 3460 APIWrapper.exe 91 PID 944 wrote to memory of 4508 944 net.exe 93 PID 944 wrote to memory of 4508 944 net.exe 93 PID 944 wrote to memory of 4508 944 net.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\f019c781190cefb52a2ddde54379d29d.exe"C:\Users\Admin\AppData\Local\Temp\f019c781190cefb52a2ddde54379d29d.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\NTT_Customer_Notification.txt2⤵
- Opens file in notepad (likely ransom note)
PID:1868
-
-
C:\Users\Admin\AppData\Local\Temp\APIWrapper.exe"C:\Users\Admin\AppData\Local\Temp\APIWrapper.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
PID:4908
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop wuauserv3⤵
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵PID:4508
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD5137fe32ac41f7b73d21219051e037185
SHA1b1fed2c1257823f4cfbe9c0fdd6207177330a7e3
SHA2561a8149494ae9f8e0e827080c8c38774eac995de4fd12ae4204448c28c17b2e96
SHA512db930108bb13c82d0059bc3a086d8f14100475f76644ad292bf37c2f7a42e74a9a7ffea9e7a183211c04114b470eebff88249a0efe862944998efd686bad48be
-
Filesize
34KB
MD5137fe32ac41f7b73d21219051e037185
SHA1b1fed2c1257823f4cfbe9c0fdd6207177330a7e3
SHA2561a8149494ae9f8e0e827080c8c38774eac995de4fd12ae4204448c28c17b2e96
SHA512db930108bb13c82d0059bc3a086d8f14100475f76644ad292bf37c2f7a42e74a9a7ffea9e7a183211c04114b470eebff88249a0efe862944998efd686bad48be
-
Filesize
34KB
MD5137fe32ac41f7b73d21219051e037185
SHA1b1fed2c1257823f4cfbe9c0fdd6207177330a7e3
SHA2561a8149494ae9f8e0e827080c8c38774eac995de4fd12ae4204448c28c17b2e96
SHA512db930108bb13c82d0059bc3a086d8f14100475f76644ad292bf37c2f7a42e74a9a7ffea9e7a183211c04114b470eebff88249a0efe862944998efd686bad48be
-
Filesize
919B
MD5a245be3b944db50a32f5fd7b0073872f
SHA1b97cf469bbbba82e8e691c36acf20f4fd2765ec3
SHA256d22ccc3b5bf14f94cfc77e4c7a9aac648452ee0e80f903bf02d1b6e59faacbed
SHA5122908486e66e574cc05825288dd382dc3e4627c885c889b1e779bebed8d218f5d6488223db9cacfdc7bbb4a094c3c9cab4f7be8cd9bbdce4d5fb18fce210cb345