Analysis
-
max time kernel
176s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-05-2022 18:08
Static task
static1
Behavioral task
behavioral1
Sample
1e0fc6cf4d0b655fc2495aeb3890f382e00ec9060ab23fa0a035a5042cda6daa.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
1e0fc6cf4d0b655fc2495aeb3890f382e00ec9060ab23fa0a035a5042cda6daa.exe
Resource
win10v2004-20220414-en
General
-
Target
1e0fc6cf4d0b655fc2495aeb3890f382e00ec9060ab23fa0a035a5042cda6daa.exe
-
Size
368KB
-
MD5
345c37943c7a7e1fd0098aab07fe3c86
-
SHA1
ff8d484c90feab90b94502fbcaff84b16eb9a280
-
SHA256
1e0fc6cf4d0b655fc2495aeb3890f382e00ec9060ab23fa0a035a5042cda6daa
-
SHA512
888e8d2f20ccf440107971e8268d06b34aa8c7e5c476f55544321780f30af52c731ada5cca83f015b607f3b61dc5be276199a9dd3cc50fd70ed47c38ca5495cd
Malware Config
Extracted
buer
https://162.244.81.87/
http://162.244.81.87:8080/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\21a99581b3da5db5e76f\\gennt.exe\"" gennt.exe -
resource yara_rule behavioral2/memory/3836-130-0x00000000023D0000-0x00000000023DC000-memory.dmp buer behavioral2/memory/3836-134-0x00000000023C0000-0x00000000023CA000-memory.dmp buer behavioral2/memory/4968-138-0x00000000021A0000-0x00000000021AC000-memory.dmp buer -
Executes dropped EXE 1 IoCs
pid Process 4968 gennt.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation gennt.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: gennt.exe File opened (read-only) \??\W: gennt.exe File opened (read-only) \??\X: gennt.exe File opened (read-only) \??\Y: gennt.exe File opened (read-only) \??\H: gennt.exe File opened (read-only) \??\O: gennt.exe File opened (read-only) \??\E: gennt.exe File opened (read-only) \??\F: gennt.exe File opened (read-only) \??\N: gennt.exe File opened (read-only) \??\Q: gennt.exe File opened (read-only) \??\R: gennt.exe File opened (read-only) \??\S: gennt.exe File opened (read-only) \??\A: gennt.exe File opened (read-only) \??\B: gennt.exe File opened (read-only) \??\T: gennt.exe File opened (read-only) \??\U: gennt.exe File opened (read-only) \??\L: gennt.exe File opened (read-only) \??\M: gennt.exe File opened (read-only) \??\P: gennt.exe File opened (read-only) \??\G: gennt.exe File opened (read-only) \??\I: gennt.exe File opened (read-only) \??\Z: gennt.exe File opened (read-only) \??\J: gennt.exe File opened (read-only) \??\K: gennt.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 5112 4548 WerFault.exe 86 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4968 gennt.exe 4968 gennt.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3836 1e0fc6cf4d0b655fc2495aeb3890f382e00ec9060ab23fa0a035a5042cda6daa.exe 3836 1e0fc6cf4d0b655fc2495aeb3890f382e00ec9060ab23fa0a035a5042cda6daa.exe 4968 gennt.exe 4968 gennt.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3836 wrote to memory of 4968 3836 1e0fc6cf4d0b655fc2495aeb3890f382e00ec9060ab23fa0a035a5042cda6daa.exe 85 PID 3836 wrote to memory of 4968 3836 1e0fc6cf4d0b655fc2495aeb3890f382e00ec9060ab23fa0a035a5042cda6daa.exe 85 PID 3836 wrote to memory of 4968 3836 1e0fc6cf4d0b655fc2495aeb3890f382e00ec9060ab23fa0a035a5042cda6daa.exe 85 PID 4968 wrote to memory of 4548 4968 gennt.exe 86 PID 4968 wrote to memory of 4548 4968 gennt.exe 86 PID 4968 wrote to memory of 4548 4968 gennt.exe 86 PID 4968 wrote to memory of 4548 4968 gennt.exe 86 PID 4968 wrote to memory of 4548 4968 gennt.exe 86 PID 4968 wrote to memory of 4548 4968 gennt.exe 86 PID 4968 wrote to memory of 4548 4968 gennt.exe 86 PID 4968 wrote to memory of 4548 4968 gennt.exe 86 PID 4968 wrote to memory of 4548 4968 gennt.exe 86 PID 4968 wrote to memory of 4548 4968 gennt.exe 86 PID 4968 wrote to memory of 1540 4968 gennt.exe 90 PID 4968 wrote to memory of 1540 4968 gennt.exe 90 PID 4968 wrote to memory of 1540 4968 gennt.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e0fc6cf4d0b655fc2495aeb3890f382e00ec9060ab23fa0a035a5042cda6daa.exe"C:\Users\Admin\AppData\Local\Temp\1e0fc6cf4d0b655fc2495aeb3890f382e00ec9060ab23fa0a035a5042cda6daa.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\ProgramData\21a99581b3da5db5e76f\gennt.exeC:\ProgramData\21a99581b3da5db5e76f\gennt.exe "C:\Users\Admin\AppData\Local\Temp\1e0fc6cf4d0b655fc2495aeb3890f382e00ec9060ab23fa0a035a5042cda6daa.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Checks computer location settings
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\21a99581b3da5db5e76f\gennt.exe3⤵PID:4548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4548 -s 4884⤵
- Program crash
PID:5112
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" powershell.exe -Command "& {Add-MpPreference -ExclusionPath C:\ProgramData\21a99581b3da5db5e76f}"3⤵PID:1540
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4548 -ip 45481⤵PID:3880
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
368KB
MD5345c37943c7a7e1fd0098aab07fe3c86
SHA1ff8d484c90feab90b94502fbcaff84b16eb9a280
SHA2561e0fc6cf4d0b655fc2495aeb3890f382e00ec9060ab23fa0a035a5042cda6daa
SHA512888e8d2f20ccf440107971e8268d06b34aa8c7e5c476f55544321780f30af52c731ada5cca83f015b607f3b61dc5be276199a9dd3cc50fd70ed47c38ca5495cd
-
Filesize
368KB
MD5345c37943c7a7e1fd0098aab07fe3c86
SHA1ff8d484c90feab90b94502fbcaff84b16eb9a280
SHA2561e0fc6cf4d0b655fc2495aeb3890f382e00ec9060ab23fa0a035a5042cda6daa
SHA512888e8d2f20ccf440107971e8268d06b34aa8c7e5c476f55544321780f30af52c731ada5cca83f015b607f3b61dc5be276199a9dd3cc50fd70ed47c38ca5495cd