Analysis
-
max time kernel
153s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
04/06/2022, 11:15
Static task
static1
Behavioral task
behavioral1
Sample
10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe
Resource
win10v2004-20220414-en
General
-
Target
10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe
-
Size
1.2MB
-
MD5
d9408a9e65a5d2f1bdc1c6d9b6a4affe
-
SHA1
1c9241b8b202271bcbae2561f03899c49fe52507
-
SHA256
10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f
-
SHA512
3341485245170368a8f878b6c614f7f8bf8ceefa2ef8756c6f98db4dcbc4b8c6ba4ef7c7a3082c0ea07a05143dc2cd002a189bc15d0756d2f583aec223319a9b
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PkDaKdznB7.eu.url 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows\CurrentVersion\Run 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wgEsgSB = "C:\\Users\\Admin\\AppData\\Roaming\\Searchndexer.exe" 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\Windows\assembly\Desktop.ini RegAsm.exe File created C:\Windows\assembly\Desktop.ini RegAsm.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2736 set thread context of 1460 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 80 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly RegAsm.exe File created C:\Windows\assembly\Desktop.ini RegAsm.exe File opened for modification C:\Windows\assembly\Desktop.ini RegAsm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 1460 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1460 RegAsm.exe Token: 33 1460 RegAsm.exe Token: SeIncBasePriorityPrivilege 1460 RegAsm.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1460 RegAsm.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2736 wrote to memory of 1460 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 80 PID 2736 wrote to memory of 1460 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 80 PID 2736 wrote to memory of 1460 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 80 PID 2736 wrote to memory of 1460 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 80 PID 2736 wrote to memory of 1460 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 80 PID 2736 wrote to memory of 1460 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 80 PID 2736 wrote to memory of 1460 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 80 PID 2736 wrote to memory of 1460 2736 10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe"C:\Users\Admin\AppData\Local\Temp\10c941d4a5fb75ec6470d621ec59718143a242e1e88e2c44f6a4515049f7232f.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"2⤵
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1460
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:4864