Analysis
-
max time kernel
150s -
max time network
113s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
11-05-2021 10:11
Static task
static1
Behavioral task
behavioral1
Sample
d39259e59a10e184c02d9d68f3c1ccbad570ac018ded8d9aa74a60e8f8bdc150.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
d39259e59a10e184c02d9d68f3c1ccbad570ac018ded8d9aa74a60e8f8bdc150.exe
Resource
win10v20210408
General
-
Target
d39259e59a10e184c02d9d68f3c1ccbad570ac018ded8d9aa74a60e8f8bdc150.exe
-
Size
751KB
-
MD5
fccc8b790688733655648d094067c973
-
SHA1
d1ad3d12450727afe24777ca23dcb27b7292978a
-
SHA256
d39259e59a10e184c02d9d68f3c1ccbad570ac018ded8d9aa74a60e8f8bdc150
-
SHA512
21b782e50caae4dee02e70f64651adc788bfdf9dedc12468b45d4509597da53e05c6be660bcd41ea10f135c3967cc58b733c84b8592d8e445184b920bb92fddb
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
d39259e59a10e184c02d9d68f3c1ccbad570ac018ded8d9aa74a60e8f8bdc150.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\HiwwgEgQ\\UGEAQMoI.exe," d39259e59a10e184c02d9d68f3c1ccbad570ac018ded8d9aa74a60e8f8bdc150.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\ProgramData\\HiwwgEgQ\\UGEAQMoI.exe," d39259e59a10e184c02d9d68f3c1ccbad570ac018ded8d9aa74a60e8f8bdc150.exe -
Modifies visibility of file extensions in Explorer 2 TTPs
-
Executes dropped EXE 4 IoCs
Processes:
JwcUUYQg.exeUGEAQMoI.exeUkEkIQQQ.exechocolatey.exepid process 988 JwcUUYQg.exe 4088 UGEAQMoI.exe 796 UkEkIQQQ.exe 3544 chocolatey.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
JwcUUYQg.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Control Panel\International\Geo\Nation JwcUUYQg.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
d39259e59a10e184c02d9d68f3c1ccbad570ac018ded8d9aa74a60e8f8bdc150.exeJwcUUYQg.exeUGEAQMoI.exeUkEkIQQQ.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\JwcUUYQg.exe = "C:\\Users\\Admin\\VyQssggo\\JwcUUYQg.exe" d39259e59a10e184c02d9d68f3c1ccbad570ac018ded8d9aa74a60e8f8bdc150.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\UGEAQMoI.exe = "C:\\ProgramData\\HiwwgEgQ\\UGEAQMoI.exe" d39259e59a10e184c02d9d68f3c1ccbad570ac018ded8d9aa74a60e8f8bdc150.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\JwcUUYQg.exe = "C:\\Users\\Admin\\VyQssggo\\JwcUUYQg.exe" JwcUUYQg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\UGEAQMoI.exe = "C:\\ProgramData\\HiwwgEgQ\\UGEAQMoI.exe" UGEAQMoI.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\UGEAQMoI.exe = "C:\\ProgramData\\HiwwgEgQ\\UGEAQMoI.exe" UkEkIQQQ.exe -
Drops file in System32 directory 5 IoCs
Processes:
JwcUUYQg.exeUkEkIQQQ.exedescription ioc process File created C:\Windows\SysWOW64\shell32.dll.exe JwcUUYQg.exe File opened for modification C:\Windows\SysWOW64\sheRestoreShow.xlsb JwcUUYQg.exe File opened for modification C:\Windows\SysWOW64\sheWatchGrant.gif JwcUUYQg.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\VyQssggo UkEkIQQQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\VyQssggo\JwcUUYQg UkEkIQQQ.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 3 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
d39259e59a10e184c02d9d68f3c1ccbad570ac018ded8d9aa74a60e8f8bdc150.exeJwcUUYQg.exepid process 488 d39259e59a10e184c02d9d68f3c1ccbad570ac018ded8d9aa74a60e8f8bdc150.exe 488 d39259e59a10e184c02d9d68f3c1ccbad570ac018ded8d9aa74a60e8f8bdc150.exe 488 d39259e59a10e184c02d9d68f3c1ccbad570ac018ded8d9aa74a60e8f8bdc150.exe 488 d39259e59a10e184c02d9d68f3c1ccbad570ac018ded8d9aa74a60e8f8bdc150.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
JwcUUYQg.exepid process 988 JwcUUYQg.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
JwcUUYQg.exepid process 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe 988 JwcUUYQg.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
d39259e59a10e184c02d9d68f3c1ccbad570ac018ded8d9aa74a60e8f8bdc150.execmd.exedescription pid process target process PID 488 wrote to memory of 988 488 d39259e59a10e184c02d9d68f3c1ccbad570ac018ded8d9aa74a60e8f8bdc150.exe JwcUUYQg.exe PID 488 wrote to memory of 988 488 d39259e59a10e184c02d9d68f3c1ccbad570ac018ded8d9aa74a60e8f8bdc150.exe JwcUUYQg.exe PID 488 wrote to memory of 988 488 d39259e59a10e184c02d9d68f3c1ccbad570ac018ded8d9aa74a60e8f8bdc150.exe JwcUUYQg.exe PID 488 wrote to memory of 4088 488 d39259e59a10e184c02d9d68f3c1ccbad570ac018ded8d9aa74a60e8f8bdc150.exe UGEAQMoI.exe PID 488 wrote to memory of 4088 488 d39259e59a10e184c02d9d68f3c1ccbad570ac018ded8d9aa74a60e8f8bdc150.exe UGEAQMoI.exe PID 488 wrote to memory of 4088 488 d39259e59a10e184c02d9d68f3c1ccbad570ac018ded8d9aa74a60e8f8bdc150.exe UGEAQMoI.exe PID 488 wrote to memory of 3748 488 d39259e59a10e184c02d9d68f3c1ccbad570ac018ded8d9aa74a60e8f8bdc150.exe cmd.exe PID 488 wrote to memory of 3748 488 d39259e59a10e184c02d9d68f3c1ccbad570ac018ded8d9aa74a60e8f8bdc150.exe cmd.exe PID 488 wrote to memory of 3748 488 d39259e59a10e184c02d9d68f3c1ccbad570ac018ded8d9aa74a60e8f8bdc150.exe cmd.exe PID 488 wrote to memory of 184 488 d39259e59a10e184c02d9d68f3c1ccbad570ac018ded8d9aa74a60e8f8bdc150.exe reg.exe PID 488 wrote to memory of 184 488 d39259e59a10e184c02d9d68f3c1ccbad570ac018ded8d9aa74a60e8f8bdc150.exe reg.exe PID 488 wrote to memory of 184 488 d39259e59a10e184c02d9d68f3c1ccbad570ac018ded8d9aa74a60e8f8bdc150.exe reg.exe PID 488 wrote to memory of 2160 488 d39259e59a10e184c02d9d68f3c1ccbad570ac018ded8d9aa74a60e8f8bdc150.exe reg.exe PID 488 wrote to memory of 2160 488 d39259e59a10e184c02d9d68f3c1ccbad570ac018ded8d9aa74a60e8f8bdc150.exe reg.exe PID 488 wrote to memory of 2160 488 d39259e59a10e184c02d9d68f3c1ccbad570ac018ded8d9aa74a60e8f8bdc150.exe reg.exe PID 488 wrote to memory of 1508 488 d39259e59a10e184c02d9d68f3c1ccbad570ac018ded8d9aa74a60e8f8bdc150.exe reg.exe PID 488 wrote to memory of 1508 488 d39259e59a10e184c02d9d68f3c1ccbad570ac018ded8d9aa74a60e8f8bdc150.exe reg.exe PID 488 wrote to memory of 1508 488 d39259e59a10e184c02d9d68f3c1ccbad570ac018ded8d9aa74a60e8f8bdc150.exe reg.exe PID 3748 wrote to memory of 3544 3748 cmd.exe chocolatey.exe PID 3748 wrote to memory of 3544 3748 cmd.exe chocolatey.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d39259e59a10e184c02d9d68f3c1ccbad570ac018ded8d9aa74a60e8f8bdc150.exe"C:\Users\Admin\AppData\Local\Temp\d39259e59a10e184c02d9d68f3c1ccbad570ac018ded8d9aa74a60e8f8bdc150.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\VyQssggo\JwcUUYQg.exe"C:\Users\Admin\VyQssggo\JwcUUYQg.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
-
C:\ProgramData\HiwwgEgQ\UGEAQMoI.exe"C:\ProgramData\HiwwgEgQ\UGEAQMoI.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\chocolatey.exe2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\chocolatey.exeC:\Users\Admin\AppData\Local\Temp\chocolatey.exe3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- Modifies registry key
-
C:\ProgramData\wsIAssok\UkEkIQQQ.exeC:\ProgramData\wsIAssok\UkEkIQQQ.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\HiwwgEgQ\UGEAQMoI.exeMD5
d11edbc414363c72924a8f47f6f5b02a
SHA1d8dc6bd8124513555b035408c5770eedfca7ec7c
SHA25602fc0d438b0389f74977152b647886f53052bd45bbdbe98b45d292d0a44915d3
SHA51294368ac0fb049a5ba74b2966aadf5a08dc9693aece98610e92376e32a38220b639e474338ae8fae4008a9b11e047d88b8b1742e2976b38251323cc0f7172c79a
-
C:\ProgramData\HiwwgEgQ\UGEAQMoI.exeMD5
d11edbc414363c72924a8f47f6f5b02a
SHA1d8dc6bd8124513555b035408c5770eedfca7ec7c
SHA25602fc0d438b0389f74977152b647886f53052bd45bbdbe98b45d292d0a44915d3
SHA51294368ac0fb049a5ba74b2966aadf5a08dc9693aece98610e92376e32a38220b639e474338ae8fae4008a9b11e047d88b8b1742e2976b38251323cc0f7172c79a
-
C:\ProgramData\wsIAssok\UkEkIQQQ.exeMD5
8c7fe89e382f0f65c1568b4148b8af79
SHA1df3fd481614f6288050076d1d29777183a3367d8
SHA256da7b4a497d2328defcc8ad70306885a0d3381c5417f37b612a91e5c04994845a
SHA512b1516bb1da09b96204f8a58f3e5edc5e5e710590798318bc621633825f4982be368870eab55df4506784121247b3759a4882952ead4ee46d5a9f895e5634266d
-
C:\ProgramData\wsIAssok\UkEkIQQQ.exeMD5
8c7fe89e382f0f65c1568b4148b8af79
SHA1df3fd481614f6288050076d1d29777183a3367d8
SHA256da7b4a497d2328defcc8ad70306885a0d3381c5417f37b612a91e5c04994845a
SHA512b1516bb1da09b96204f8a58f3e5edc5e5e710590798318bc621633825f4982be368870eab55df4506784121247b3759a4882952ead4ee46d5a9f895e5634266d
-
C:\Users\Admin\AppData\Local\Temp\chocolatey.exeMD5
d6bc92571edfc2863fff72b240e571a1
SHA1b4227284cde5d9c00c42a043c1c16766b4c6460c
SHA256422cfcc02baaff218e47cc6463efc5eaafb33ad4d0a920db3432de1f8963c4f8
SHA51231cdfef64c809d1c1da3fc5dca2aec2fb03b911f3d2e3d010328606479d414363795d6386cc9426f3d494aeb14fb2b75889cdbbddbbeb8f0d8b09020e8404d1d
-
C:\Users\Admin\AppData\Local\Temp\chocolatey.exeMD5
d6bc92571edfc2863fff72b240e571a1
SHA1b4227284cde5d9c00c42a043c1c16766b4c6460c
SHA256422cfcc02baaff218e47cc6463efc5eaafb33ad4d0a920db3432de1f8963c4f8
SHA51231cdfef64c809d1c1da3fc5dca2aec2fb03b911f3d2e3d010328606479d414363795d6386cc9426f3d494aeb14fb2b75889cdbbddbbeb8f0d8b09020e8404d1d
-
C:\Users\Admin\VyQssggo\JwcUUYQg.exeMD5
362954d33e723a98c135de1f9a9fff87
SHA11179617dc0db69459c4cc1092d2186e2441eac1e
SHA25666442b4fc5f0d3edfd87f12df3fa4f89b292cf1c19f413f389bb1e5e2aaaf4ef
SHA512979eef571c2b723b7d904cb0fcb557d1cc12a8c459b32bf0c53fa6efa4180cca2980bc71ae581239a212296390a328a6e0d1f1b3cc58bcc3efbf7f7ef3251b33
-
C:\Users\Admin\VyQssggo\JwcUUYQg.exeMD5
362954d33e723a98c135de1f9a9fff87
SHA11179617dc0db69459c4cc1092d2186e2441eac1e
SHA25666442b4fc5f0d3edfd87f12df3fa4f89b292cf1c19f413f389bb1e5e2aaaf4ef
SHA512979eef571c2b723b7d904cb0fcb557d1cc12a8c459b32bf0c53fa6efa4180cca2980bc71ae581239a212296390a328a6e0d1f1b3cc58bcc3efbf7f7ef3251b33
-
memory/184-123-0x0000000000000000-mapping.dmp
-
memory/988-114-0x0000000000000000-mapping.dmp
-
memory/1508-125-0x0000000000000000-mapping.dmp
-
memory/2160-124-0x0000000000000000-mapping.dmp
-
memory/3544-126-0x0000000000000000-mapping.dmp
-
memory/3544-129-0x0000000000310000-0x0000000000311000-memory.dmpFilesize
4KB
-
memory/3544-131-0x000000001AFB0000-0x000000001AFB2000-memory.dmpFilesize
8KB
-
memory/3748-122-0x0000000000000000-mapping.dmp
-
memory/4088-117-0x0000000000000000-mapping.dmp