Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-05-2022 21:19
Behavioral task
behavioral1
Sample
73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe
Resource
win7-20220414-en
General
-
Target
73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe
-
Size
692KB
-
MD5
24f7cb12617bb15d9281a4f4039fc052
-
SHA1
4200a8f021356e664fc60db4815ce2284c2b8b1e
-
SHA256
73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c
-
SHA512
fad9ae0246904771f4b07e581f6003d9ca54d1409dd3a3dd028283f13740a9305495822c09dc0a693871253b578dc918b3010d25303cca33eedbd7fecc0412d7
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 3 IoCs
Processes:
73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe -
Modifies security service 2 TTPs 1 IoCs
Processes:
73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe -
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe -
Processes:
73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exepid process 2992 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
Processes:
73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exedescription pid process Token: SeIncreaseQuotaPrivilege 2992 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe Token: SeSecurityPrivilege 2992 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe Token: SeTakeOwnershipPrivilege 2992 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe Token: SeLoadDriverPrivilege 2992 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe Token: SeSystemProfilePrivilege 2992 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe Token: SeSystemtimePrivilege 2992 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe Token: SeProfSingleProcessPrivilege 2992 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe Token: SeIncBasePriorityPrivilege 2992 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe Token: SeCreatePagefilePrivilege 2992 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe Token: SeBackupPrivilege 2992 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe Token: SeRestorePrivilege 2992 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe Token: SeShutdownPrivilege 2992 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe Token: SeDebugPrivilege 2992 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe Token: SeSystemEnvironmentPrivilege 2992 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe Token: SeChangeNotifyPrivilege 2992 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe Token: SeRemoteShutdownPrivilege 2992 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe Token: SeUndockPrivilege 2992 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe Token: SeManageVolumePrivilege 2992 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe Token: SeImpersonatePrivilege 2992 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe Token: SeCreateGlobalPrivilege 2992 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe Token: 33 2992 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe Token: 34 2992 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe Token: 35 2992 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe Token: 36 2992 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exepid process 2992 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe -
Suspicious use of WriteProcessMemory 34 IoCs
Processes:
73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.execmd.execmd.exedescription pid process target process PID 2992 wrote to memory of 3664 2992 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe cmd.exe PID 2992 wrote to memory of 3664 2992 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe cmd.exe PID 2992 wrote to memory of 3664 2992 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe cmd.exe PID 2992 wrote to memory of 920 2992 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe cmd.exe PID 2992 wrote to memory of 920 2992 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe cmd.exe PID 2992 wrote to memory of 920 2992 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe cmd.exe PID 2992 wrote to memory of 3628 2992 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe notepad.exe PID 2992 wrote to memory of 3628 2992 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe notepad.exe PID 2992 wrote to memory of 3628 2992 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe notepad.exe PID 2992 wrote to memory of 3628 2992 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe notepad.exe PID 2992 wrote to memory of 3628 2992 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe notepad.exe PID 2992 wrote to memory of 3628 2992 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe notepad.exe PID 2992 wrote to memory of 3628 2992 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe notepad.exe PID 2992 wrote to memory of 3628 2992 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe notepad.exe PID 2992 wrote to memory of 3628 2992 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe notepad.exe PID 2992 wrote to memory of 3628 2992 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe notepad.exe PID 2992 wrote to memory of 3628 2992 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe notepad.exe PID 2992 wrote to memory of 3628 2992 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe notepad.exe PID 2992 wrote to memory of 3628 2992 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe notepad.exe PID 2992 wrote to memory of 3628 2992 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe notepad.exe PID 2992 wrote to memory of 3628 2992 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe notepad.exe PID 2992 wrote to memory of 3628 2992 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe notepad.exe PID 2992 wrote to memory of 3628 2992 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe notepad.exe PID 2992 wrote to memory of 3628 2992 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe notepad.exe PID 2992 wrote to memory of 3628 2992 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe notepad.exe PID 2992 wrote to memory of 3628 2992 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe notepad.exe PID 2992 wrote to memory of 3628 2992 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe notepad.exe PID 2992 wrote to memory of 3628 2992 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe notepad.exe PID 3664 wrote to memory of 3188 3664 cmd.exe attrib.exe PID 3664 wrote to memory of 3188 3664 cmd.exe attrib.exe PID 3664 wrote to memory of 3188 3664 cmd.exe attrib.exe PID 920 wrote to memory of 2796 920 cmd.exe attrib.exe PID 920 wrote to memory of 2796 920 cmd.exe attrib.exe PID 920 wrote to memory of 2796 920 cmd.exe attrib.exe -
System policy modification 1 TTPs 3 IoCs
Processes:
73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern\NoControlPanel = "1" 73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid process 3188 attrib.exe 2796 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe"C:\Users\Admin\AppData\Local\Temp\73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe"1⤵
- Modifies firewall policy service
- Modifies security service
- Checks computer location settings
- Windows security modification
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2992 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe" +s +h2⤵
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\73f9c2b4e1fe637eabd8c9fae291e570faea874d5edf060d955372de42d4fd0c.exe" +s +h3⤵
- Views/modifies file attributes
PID:3188 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h2⤵
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp" +s +h3⤵
- Views/modifies file attributes
PID:2796 -
C:\Windows\SysWOW64\notepad.exenotepad2⤵PID:3628