Analysis
-
max time kernel
150s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 18:51
Static task
static1
Behavioral task
behavioral1
Sample
24f4e039e68850682ba0a2b92b9f5940b241e4c23ca99fc75e1a830310a1135a.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
24f4e039e68850682ba0a2b92b9f5940b241e4c23ca99fc75e1a830310a1135a.exe
Resource
win10v2004-20220414-en
General
-
Target
24f4e039e68850682ba0a2b92b9f5940b241e4c23ca99fc75e1a830310a1135a.exe
-
Size
715KB
-
MD5
223f0d5a662cd55903180e94f7e1b8f9
-
SHA1
2496bfa1a88b2096501e3ce4fe3cda590d7a7cd2
-
SHA256
24f4e039e68850682ba0a2b92b9f5940b241e4c23ca99fc75e1a830310a1135a
-
SHA512
a20f6f472a1b9bc8878aee80a36f33990cc574cf32a025373d99c9b6eb22a89af80c6b60211d08accbc7643bbd60abfbd551e144acb0c0c9e29fe26be695843d
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
Windows logoff sound.exeWindows logoff sound.exepid process 1552 Windows logoff sound.exe 3764 Windows logoff sound.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
24f4e039e68850682ba0a2b92b9f5940b241e4c23ca99fc75e1a830310a1135a.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation 24f4e039e68850682ba0a2b92b9f5940b241e4c23ca99fc75e1a830310a1135a.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
24f4e039e68850682ba0a2b92b9f5940b241e4c23ca99fc75e1a830310a1135a.exeWindows logoff sound.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 24f4e039e68850682ba0a2b92b9f5940b241e4c23ca99fc75e1a830310a1135a.exe Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Audio = "\"C:\\Windows\\Windows Audio\\Windows logoff sound.exe\"" 24f4e039e68850682ba0a2b92b9f5940b241e4c23ca99fc75e1a830310a1135a.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Windows\CurrentVersion\Run\ Windows logoff sound.exe Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Audio = "\"C:\\Windows\\Windows Audio\\Windows logoff sound.exe\"" Windows logoff sound.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1204 2588 WerFault.exe iexplore.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
24f4e039e68850682ba0a2b92b9f5940b241e4c23ca99fc75e1a830310a1135a.exeWindows logoff sound.exeWindows logoff sound.exeiexplore.exedescription pid process target process PID 2204 set thread context of 984 2204 24f4e039e68850682ba0a2b92b9f5940b241e4c23ca99fc75e1a830310a1135a.exe 24f4e039e68850682ba0a2b92b9f5940b241e4c23ca99fc75e1a830310a1135a.exe PID 1552 set thread context of 3764 1552 Windows logoff sound.exe Windows logoff sound.exe PID 3764 set thread context of 4536 3764 Windows logoff sound.exe iexplore.exe PID 4536 set thread context of 2588 4536 iexplore.exe iexplore.exe -
Drops file in Windows directory 3 IoCs
Processes:
24f4e039e68850682ba0a2b92b9f5940b241e4c23ca99fc75e1a830310a1135a.exedescription ioc process File created C:\Windows\Windows Audio\Windows logoff sound.exe 24f4e039e68850682ba0a2b92b9f5940b241e4c23ca99fc75e1a830310a1135a.exe File opened for modification C:\Windows\Windows Audio\Windows logoff sound.exe 24f4e039e68850682ba0a2b92b9f5940b241e4c23ca99fc75e1a830310a1135a.exe File opened for modification C:\Windows\Windows Audio 24f4e039e68850682ba0a2b92b9f5940b241e4c23ca99fc75e1a830310a1135a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 2 IoCs
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
24f4e039e68850682ba0a2b92b9f5940b241e4c23ca99fc75e1a830310a1135a.exeWindows logoff sound.exeiexplore.exepid process 2204 24f4e039e68850682ba0a2b92b9f5940b241e4c23ca99fc75e1a830310a1135a.exe 2204 24f4e039e68850682ba0a2b92b9f5940b241e4c23ca99fc75e1a830310a1135a.exe 1552 Windows logoff sound.exe 1552 Windows logoff sound.exe 4536 iexplore.exe 4536 iexplore.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
24f4e039e68850682ba0a2b92b9f5940b241e4c23ca99fc75e1a830310a1135a.exeWindows logoff sound.exeiexplore.exepid process 2204 24f4e039e68850682ba0a2b92b9f5940b241e4c23ca99fc75e1a830310a1135a.exe 2204 24f4e039e68850682ba0a2b92b9f5940b241e4c23ca99fc75e1a830310a1135a.exe 1552 Windows logoff sound.exe 1552 Windows logoff sound.exe 4536 iexplore.exe 4536 iexplore.exe -
Suspicious use of WriteProcessMemory 43 IoCs
Processes:
24f4e039e68850682ba0a2b92b9f5940b241e4c23ca99fc75e1a830310a1135a.exe24f4e039e68850682ba0a2b92b9f5940b241e4c23ca99fc75e1a830310a1135a.execmd.execmd.exeWindows logoff sound.exeWindows logoff sound.execmd.exeiexplore.exedescription pid process target process PID 2204 wrote to memory of 984 2204 24f4e039e68850682ba0a2b92b9f5940b241e4c23ca99fc75e1a830310a1135a.exe 24f4e039e68850682ba0a2b92b9f5940b241e4c23ca99fc75e1a830310a1135a.exe PID 2204 wrote to memory of 984 2204 24f4e039e68850682ba0a2b92b9f5940b241e4c23ca99fc75e1a830310a1135a.exe 24f4e039e68850682ba0a2b92b9f5940b241e4c23ca99fc75e1a830310a1135a.exe PID 2204 wrote to memory of 984 2204 24f4e039e68850682ba0a2b92b9f5940b241e4c23ca99fc75e1a830310a1135a.exe 24f4e039e68850682ba0a2b92b9f5940b241e4c23ca99fc75e1a830310a1135a.exe PID 984 wrote to memory of 4616 984 24f4e039e68850682ba0a2b92b9f5940b241e4c23ca99fc75e1a830310a1135a.exe cmd.exe PID 984 wrote to memory of 4616 984 24f4e039e68850682ba0a2b92b9f5940b241e4c23ca99fc75e1a830310a1135a.exe cmd.exe PID 984 wrote to memory of 4616 984 24f4e039e68850682ba0a2b92b9f5940b241e4c23ca99fc75e1a830310a1135a.exe cmd.exe PID 4616 wrote to memory of 1276 4616 cmd.exe reg.exe PID 4616 wrote to memory of 1276 4616 cmd.exe reg.exe PID 4616 wrote to memory of 1276 4616 cmd.exe reg.exe PID 984 wrote to memory of 3116 984 24f4e039e68850682ba0a2b92b9f5940b241e4c23ca99fc75e1a830310a1135a.exe cmd.exe PID 984 wrote to memory of 3116 984 24f4e039e68850682ba0a2b92b9f5940b241e4c23ca99fc75e1a830310a1135a.exe cmd.exe PID 984 wrote to memory of 3116 984 24f4e039e68850682ba0a2b92b9f5940b241e4c23ca99fc75e1a830310a1135a.exe cmd.exe PID 3116 wrote to memory of 3440 3116 cmd.exe PING.EXE PID 3116 wrote to memory of 3440 3116 cmd.exe PING.EXE PID 3116 wrote to memory of 3440 3116 cmd.exe PING.EXE PID 3116 wrote to memory of 1552 3116 cmd.exe Windows logoff sound.exe PID 3116 wrote to memory of 1552 3116 cmd.exe Windows logoff sound.exe PID 3116 wrote to memory of 1552 3116 cmd.exe Windows logoff sound.exe PID 1552 wrote to memory of 3764 1552 Windows logoff sound.exe Windows logoff sound.exe PID 1552 wrote to memory of 3764 1552 Windows logoff sound.exe Windows logoff sound.exe PID 1552 wrote to memory of 3764 1552 Windows logoff sound.exe Windows logoff sound.exe PID 3764 wrote to memory of 1448 3764 Windows logoff sound.exe cmd.exe PID 3764 wrote to memory of 1448 3764 Windows logoff sound.exe cmd.exe PID 3764 wrote to memory of 1448 3764 Windows logoff sound.exe cmd.exe PID 3764 wrote to memory of 4536 3764 Windows logoff sound.exe iexplore.exe PID 3764 wrote to memory of 4536 3764 Windows logoff sound.exe iexplore.exe PID 3764 wrote to memory of 4536 3764 Windows logoff sound.exe iexplore.exe PID 3764 wrote to memory of 4536 3764 Windows logoff sound.exe iexplore.exe PID 3764 wrote to memory of 4536 3764 Windows logoff sound.exe iexplore.exe PID 3764 wrote to memory of 4536 3764 Windows logoff sound.exe iexplore.exe PID 3764 wrote to memory of 4536 3764 Windows logoff sound.exe iexplore.exe PID 3764 wrote to memory of 4536 3764 Windows logoff sound.exe iexplore.exe PID 3764 wrote to memory of 4536 3764 Windows logoff sound.exe iexplore.exe PID 3764 wrote to memory of 4536 3764 Windows logoff sound.exe iexplore.exe PID 3764 wrote to memory of 4536 3764 Windows logoff sound.exe iexplore.exe PID 3764 wrote to memory of 4536 3764 Windows logoff sound.exe iexplore.exe PID 3764 wrote to memory of 4536 3764 Windows logoff sound.exe iexplore.exe PID 1448 wrote to memory of 4104 1448 cmd.exe reg.exe PID 1448 wrote to memory of 4104 1448 cmd.exe reg.exe PID 1448 wrote to memory of 4104 1448 cmd.exe reg.exe PID 4536 wrote to memory of 2588 4536 iexplore.exe iexplore.exe PID 4536 wrote to memory of 2588 4536 iexplore.exe iexplore.exe PID 4536 wrote to memory of 2588 4536 iexplore.exe iexplore.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\24f4e039e68850682ba0a2b92b9f5940b241e4c23ca99fc75e1a830310a1135a.exe"C:\Users\Admin\AppData\Local\Temp\24f4e039e68850682ba0a2b92b9f5940b241e4c23ca99fc75e1a830310a1135a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\24f4e039e68850682ba0a2b92b9f5940b241e4c23ca99fc75e1a830310a1135a.exe"C:\Users\Admin\AppData\Local\Temp\24f4e039e68850682ba0a2b92b9f5940b241e4c23ca99fc75e1a830310a1135a.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\install.bat" "3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEPING 127.0.0.1 -n 24⤵
- Runs ping.exe
-
C:\Windows\Windows Audio\Windows logoff sound.exe"C:\Windows\Windows Audio\Windows logoff sound.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\Windows Audio\Windows logoff sound.exe"C:\Windows\Windows Audio\Windows logoff sound.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f6⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f7⤵
- Modifies registry key
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"6⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"7⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 4008⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2588 -ip 25881⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\install.batFilesize
100B
MD51f8013f295aea797be61c6a0656122ae
SHA15016720c74dc755b31cdea47c3fb0de12795d37b
SHA256c713cfcb4c627b06cda7c8987c992f487f3f080667dc3ef18c2d7b377ae5b55f
SHA5124cf78d4061b632d2650e7ed5d583866e61c94573bc63c9e114fb4c2a4bc12ce17f1309c892a49dcf7cd4a58ee5e306fa25eed5f30007e1a40634ae564d7e5ab0
-
C:\Windows\Windows Audio\Windows logoff sound.exeFilesize
715KB
MD5223f0d5a662cd55903180e94f7e1b8f9
SHA12496bfa1a88b2096501e3ce4fe3cda590d7a7cd2
SHA25624f4e039e68850682ba0a2b92b9f5940b241e4c23ca99fc75e1a830310a1135a
SHA512a20f6f472a1b9bc8878aee80a36f33990cc574cf32a025373d99c9b6eb22a89af80c6b60211d08accbc7643bbd60abfbd551e144acb0c0c9e29fe26be695843d
-
C:\Windows\Windows Audio\Windows logoff sound.exeFilesize
715KB
MD5223f0d5a662cd55903180e94f7e1b8f9
SHA12496bfa1a88b2096501e3ce4fe3cda590d7a7cd2
SHA25624f4e039e68850682ba0a2b92b9f5940b241e4c23ca99fc75e1a830310a1135a
SHA512a20f6f472a1b9bc8878aee80a36f33990cc574cf32a025373d99c9b6eb22a89af80c6b60211d08accbc7643bbd60abfbd551e144acb0c0c9e29fe26be695843d
-
C:\Windows\Windows Audio\Windows logoff sound.exeFilesize
715KB
MD5223f0d5a662cd55903180e94f7e1b8f9
SHA12496bfa1a88b2096501e3ce4fe3cda590d7a7cd2
SHA25624f4e039e68850682ba0a2b92b9f5940b241e4c23ca99fc75e1a830310a1135a
SHA512a20f6f472a1b9bc8878aee80a36f33990cc574cf32a025373d99c9b6eb22a89af80c6b60211d08accbc7643bbd60abfbd551e144acb0c0c9e29fe26be695843d
-
memory/984-133-0x0000000000000000-mapping.dmp
-
memory/1276-136-0x0000000000000000-mapping.dmp
-
memory/1448-146-0x0000000000000000-mapping.dmp
-
memory/1552-140-0x0000000000000000-mapping.dmp
-
memory/1552-143-0x0000000000400000-0x00000000004B9000-memory.dmpFilesize
740KB
-
memory/2204-134-0x0000000000400000-0x00000000004B9000-memory.dmpFilesize
740KB
-
memory/3116-137-0x0000000000000000-mapping.dmp
-
memory/3440-139-0x0000000000000000-mapping.dmp
-
memory/3764-144-0x0000000000000000-mapping.dmp
-
memory/4104-147-0x0000000000000000-mapping.dmp
-
memory/4616-135-0x0000000000000000-mapping.dmp