Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 19:16
Behavioral task
behavioral1
Sample
37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe
-
Size
690KB
-
MD5
4f2ac7edd1bda1c4e4d629b42ce590ef
-
SHA1
8eb7ad9073f82112d2327b85dc47813666dda5a6
-
SHA256
37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f
-
SHA512
f22625988d8d284a5212e458a2593950c3e3f8a6667bee246e4be281e2a057d9b642085ad9afb7f9cd647eb4360c214b4de71fc09e6821ab4985a10888e12d55
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 3 IoCs
Processes:
37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile 37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" 37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe -
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation 37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exepid process 888 37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
Processes:
37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exedescription pid process Token: SeIncreaseQuotaPrivilege 888 37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe Token: SeSecurityPrivilege 888 37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe Token: SeTakeOwnershipPrivilege 888 37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe Token: SeLoadDriverPrivilege 888 37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe Token: SeSystemProfilePrivilege 888 37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe Token: SeSystemtimePrivilege 888 37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe Token: SeProfSingleProcessPrivilege 888 37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe Token: SeIncBasePriorityPrivilege 888 37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe Token: SeCreatePagefilePrivilege 888 37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe Token: SeBackupPrivilege 888 37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe Token: SeRestorePrivilege 888 37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe Token: SeShutdownPrivilege 888 37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe Token: SeDebugPrivilege 888 37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe Token: SeSystemEnvironmentPrivilege 888 37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe Token: SeChangeNotifyPrivilege 888 37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe Token: SeRemoteShutdownPrivilege 888 37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe Token: SeUndockPrivilege 888 37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe Token: SeManageVolumePrivilege 888 37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe Token: SeImpersonatePrivilege 888 37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe Token: SeCreateGlobalPrivilege 888 37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe Token: 33 888 37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe Token: 34 888 37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe Token: 35 888 37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe Token: 36 888 37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exepid process 888 37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe -
Suspicious use of WriteProcessMemory 39 IoCs
Processes:
37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.execmd.execmd.exedescription pid process target process PID 888 wrote to memory of 1736 888 37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe cmd.exe PID 888 wrote to memory of 1736 888 37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe cmd.exe PID 888 wrote to memory of 1736 888 37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe cmd.exe PID 888 wrote to memory of 2924 888 37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe cmd.exe PID 888 wrote to memory of 2924 888 37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe cmd.exe PID 888 wrote to memory of 2924 888 37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe cmd.exe PID 888 wrote to memory of 3304 888 37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe iexplore.exe PID 888 wrote to memory of 3304 888 37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe iexplore.exe PID 888 wrote to memory of 3304 888 37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe iexplore.exe PID 888 wrote to memory of 3600 888 37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe explorer.exe PID 888 wrote to memory of 3600 888 37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe explorer.exe PID 888 wrote to memory of 4288 888 37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe notepad.exe PID 888 wrote to memory of 4288 888 37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe notepad.exe PID 888 wrote to memory of 4288 888 37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe notepad.exe PID 1736 wrote to memory of 4760 1736 cmd.exe attrib.exe PID 1736 wrote to memory of 4760 1736 cmd.exe attrib.exe PID 1736 wrote to memory of 4760 1736 cmd.exe attrib.exe PID 888 wrote to memory of 4288 888 37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe notepad.exe PID 888 wrote to memory of 4288 888 37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe notepad.exe PID 888 wrote to memory of 4288 888 37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe notepad.exe PID 888 wrote to memory of 4288 888 37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe notepad.exe PID 888 wrote to memory of 4288 888 37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe notepad.exe PID 888 wrote to memory of 4288 888 37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe notepad.exe PID 888 wrote to memory of 4288 888 37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe notepad.exe PID 888 wrote to memory of 4288 888 37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe notepad.exe PID 888 wrote to memory of 4288 888 37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe notepad.exe PID 888 wrote to memory of 4288 888 37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe notepad.exe PID 888 wrote to memory of 4288 888 37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe notepad.exe PID 888 wrote to memory of 4288 888 37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe notepad.exe PID 888 wrote to memory of 4288 888 37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe notepad.exe PID 888 wrote to memory of 4288 888 37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe notepad.exe PID 888 wrote to memory of 4288 888 37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe notepad.exe PID 888 wrote to memory of 4288 888 37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe notepad.exe PID 888 wrote to memory of 4288 888 37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe notepad.exe PID 888 wrote to memory of 4288 888 37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe notepad.exe PID 888 wrote to memory of 4288 888 37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe notepad.exe PID 2924 wrote to memory of 3292 2924 cmd.exe attrib.exe PID 2924 wrote to memory of 3292 2924 cmd.exe attrib.exe PID 2924 wrote to memory of 3292 2924 cmd.exe attrib.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid process 3292 attrib.exe 4760 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe"C:\Users\Admin\AppData\Local\Temp\37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe"1⤵
- Modifies firewall policy service
- Checks computer location settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe" +s +h2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\37e0c72ff5d602968aa7c84e60d0690111f99c30cea4aa36381a990ac870c29f.exe" +s +h3⤵
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp" +s +h3⤵
- Views/modifies file attributes
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"2⤵
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"2⤵
-
C:\Windows\SysWOW64\notepad.exenotepad2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1736-130-0x0000000000000000-mapping.dmp
-
memory/2924-131-0x0000000000000000-mapping.dmp
-
memory/3292-135-0x0000000000000000-mapping.dmp
-
memory/3600-132-0x0000000000000000-mapping.dmp
-
memory/4288-133-0x0000000000000000-mapping.dmp
-
memory/4760-134-0x0000000000000000-mapping.dmp