Analysis
-
max time kernel
152s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
04/06/2022, 10:46
Static task
static1
Behavioral task
behavioral1
Sample
10ee8d9d713d0da6e4d024533ec9d5c82a55c729e7583a2c07e53d297de10d44.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
10ee8d9d713d0da6e4d024533ec9d5c82a55c729e7583a2c07e53d297de10d44.exe
Resource
win10v2004-20220414-en
General
-
Target
10ee8d9d713d0da6e4d024533ec9d5c82a55c729e7583a2c07e53d297de10d44.exe
-
Size
437KB
-
MD5
de92204ac5537f2cce8db7eede59f216
-
SHA1
9532139cd65bff2be0d5fd6cacd6509b6401065e
-
SHA256
10ee8d9d713d0da6e4d024533ec9d5c82a55c729e7583a2c07e53d297de10d44
-
SHA512
c7882d4dac1015caac7b6a69a896172736be119cacc106a9afc6fc77fdb16da4138c10b9b39107bdaddad2c91fd36bc7a7b5ae7095434112a9724931a988cf01
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
pid Process 4596 cmd.exe 4544 cmd.exe 1412 cmd.exe 5052 cmd.exe 4032 cmd.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation 10ee8d9d713d0da6e4d024533ec9d5c82a55c729e7583a2c07e53d297de10d44.exe Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsoftNT.exe = "C:\\Users\\Admin\\AppData\\Roaming\\ProgramData\\microsoftNT.exe" cmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsoftNT.exe = "\\ProgramData\\microsoftNT.exe" cmd.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\Windows\assembly\Desktop.ini cmd.exe File created C:\Windows\assembly\Desktop.ini cmd.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini cmd.exe File opened for modification C:\Windows\assembly\Desktop.ini cmd.exe File opened for modification C:\Windows\assembly cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5052 cmd.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1628 10ee8d9d713d0da6e4d024533ec9d5c82a55c729e7583a2c07e53d297de10d44.exe Token: SeDebugPrivilege 4596 cmd.exe Token: SeDebugPrivilege 1412 cmd.exe Token: SeDebugPrivilege 5052 cmd.exe Token: 33 5052 cmd.exe Token: SeIncBasePriorityPrivilege 5052 cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5052 cmd.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1628 wrote to memory of 4596 1628 10ee8d9d713d0da6e4d024533ec9d5c82a55c729e7583a2c07e53d297de10d44.exe 83 PID 1628 wrote to memory of 4596 1628 10ee8d9d713d0da6e4d024533ec9d5c82a55c729e7583a2c07e53d297de10d44.exe 83 PID 1628 wrote to memory of 4596 1628 10ee8d9d713d0da6e4d024533ec9d5c82a55c729e7583a2c07e53d297de10d44.exe 83 PID 4596 wrote to memory of 4544 4596 cmd.exe 85 PID 4596 wrote to memory of 4544 4596 cmd.exe 85 PID 4596 wrote to memory of 4544 4596 cmd.exe 85 PID 4596 wrote to memory of 1412 4596 cmd.exe 86 PID 4596 wrote to memory of 1412 4596 cmd.exe 86 PID 4596 wrote to memory of 1412 4596 cmd.exe 86 PID 1412 wrote to memory of 5052 1412 cmd.exe 91 PID 1412 wrote to memory of 5052 1412 cmd.exe 91 PID 1412 wrote to memory of 5052 1412 cmd.exe 91 PID 1412 wrote to memory of 4032 1412 cmd.exe 90 PID 1412 wrote to memory of 4032 1412 cmd.exe 90 PID 1412 wrote to memory of 4032 1412 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\10ee8d9d713d0da6e4d024533ec9d5c82a55c729e7583a2c07e53d297de10d44.exe"C:\Users\Admin\AppData\Local\Temp\10ee8d9d713d0da6e4d024533ec9d5c82a55c729e7583a2c07e53d297de10d44.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\cmd.exe"C:\Users\Admin\AppData\Local\Temp\cmd.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Users\Admin\AppData\Local\Temp\cmd\cmd.exe"C:\Users\Admin\AppData\Local\Temp\cmd\cmd.exe"3⤵
- Executes dropped EXE
PID:4544
-
-
C:\Users\Admin\AppData\Local\Temp\cmd.exe"C:\Users\Admin\AppData\Local\Temp\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\cmd.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\cmd.exe"C:\Users\Admin\AppData\Local\Temp\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\cmd.exe"4⤵
- Executes dropped EXE
PID:4032
-
-
C:\Users\Admin\AppData\Local\Temp\cmd\cmd.exe"C:\Users\Admin\AppData\Local\Temp\cmd\cmd.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5052
-
-
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:2056
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
771B
MD536c85b51fe803ac6009874a8f4a4879a
SHA1b33dfa5c3cb416db33a167edad92d1e678fd6c5f
SHA256b3d71b4a609a9b0e117b5b2acdfbb9b59d71aae2f27b5f9bc3f03796949dfb03
SHA512e9efd16b585cbe747d46da115474a957e969b067c478628cae47bd84f13575a8d737f6256dd65907e05c3556e668a0deaf6a0393382815d799c3959233ec38eb
-
Filesize
322KB
MD5365b0d3f075e51533a54a3c7724c9222
SHA11d67b38f16116cb59caa4113c76a577d73a50715
SHA256a204c9105cb5287ebcfe46a59eb25fdf8b498871f898f95128353320fc8b2ac0
SHA512e06d85fdc1b7fdecdcb07efd0d644dae49e20ecddbbae429780719f282ca9db227577a30a7a26550117e863ac3a9e5140240f80b8e679c2d1624a57c137bc059
-
Filesize
322KB
MD5365b0d3f075e51533a54a3c7724c9222
SHA11d67b38f16116cb59caa4113c76a577d73a50715
SHA256a204c9105cb5287ebcfe46a59eb25fdf8b498871f898f95128353320fc8b2ac0
SHA512e06d85fdc1b7fdecdcb07efd0d644dae49e20ecddbbae429780719f282ca9db227577a30a7a26550117e863ac3a9e5140240f80b8e679c2d1624a57c137bc059
-
Filesize
322KB
MD5365b0d3f075e51533a54a3c7724c9222
SHA11d67b38f16116cb59caa4113c76a577d73a50715
SHA256a204c9105cb5287ebcfe46a59eb25fdf8b498871f898f95128353320fc8b2ac0
SHA512e06d85fdc1b7fdecdcb07efd0d644dae49e20ecddbbae429780719f282ca9db227577a30a7a26550117e863ac3a9e5140240f80b8e679c2d1624a57c137bc059
-
Filesize
322KB
MD5365b0d3f075e51533a54a3c7724c9222
SHA11d67b38f16116cb59caa4113c76a577d73a50715
SHA256a204c9105cb5287ebcfe46a59eb25fdf8b498871f898f95128353320fc8b2ac0
SHA512e06d85fdc1b7fdecdcb07efd0d644dae49e20ecddbbae429780719f282ca9db227577a30a7a26550117e863ac3a9e5140240f80b8e679c2d1624a57c137bc059
-
Filesize
322KB
MD5365b0d3f075e51533a54a3c7724c9222
SHA11d67b38f16116cb59caa4113c76a577d73a50715
SHA256a204c9105cb5287ebcfe46a59eb25fdf8b498871f898f95128353320fc8b2ac0
SHA512e06d85fdc1b7fdecdcb07efd0d644dae49e20ecddbbae429780719f282ca9db227577a30a7a26550117e863ac3a9e5140240f80b8e679c2d1624a57c137bc059
-
Filesize
322KB
MD5365b0d3f075e51533a54a3c7724c9222
SHA11d67b38f16116cb59caa4113c76a577d73a50715
SHA256a204c9105cb5287ebcfe46a59eb25fdf8b498871f898f95128353320fc8b2ac0
SHA512e06d85fdc1b7fdecdcb07efd0d644dae49e20ecddbbae429780719f282ca9db227577a30a7a26550117e863ac3a9e5140240f80b8e679c2d1624a57c137bc059
-
Filesize
322KB
MD5365b0d3f075e51533a54a3c7724c9222
SHA11d67b38f16116cb59caa4113c76a577d73a50715
SHA256a204c9105cb5287ebcfe46a59eb25fdf8b498871f898f95128353320fc8b2ac0
SHA512e06d85fdc1b7fdecdcb07efd0d644dae49e20ecddbbae429780719f282ca9db227577a30a7a26550117e863ac3a9e5140240f80b8e679c2d1624a57c137bc059
-
Filesize
322KB
MD5365b0d3f075e51533a54a3c7724c9222
SHA11d67b38f16116cb59caa4113c76a577d73a50715
SHA256a204c9105cb5287ebcfe46a59eb25fdf8b498871f898f95128353320fc8b2ac0
SHA512e06d85fdc1b7fdecdcb07efd0d644dae49e20ecddbbae429780719f282ca9db227577a30a7a26550117e863ac3a9e5140240f80b8e679c2d1624a57c137bc059