Analysis
-
max time kernel
153s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
09/06/2022, 13:15
Static task
static1
Behavioral task
behavioral1
Sample
fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84.exe
Resource
win10v2004-20220414-en
General
-
Target
fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84.exe
-
Size
732KB
-
MD5
a3f0468657e66c72f67b7867b4c03b0f
-
SHA1
1d7355e2f8020131bca18c4b8e071e4df620c02a
-
SHA256
fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84
-
SHA512
f57bc731e3db8c5192384fc4190b4695f1e62df21db593a5e57c20b6b812ea034d330940cc6f7aa050ac0520108bf044dfd59e9401bb78b245f7c83101f33b54
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4080 fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84.exe 4944 fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winstartcdb = "\\defenderstcdb\\winlogimdecdb.exe" fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84.exe Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winstartcdb = "C:\\Users\\Admin\\AppData\\Roaming\\defenderstcdb\\winlogimdecdb.exe" fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2272 set thread context of 4456 2272 fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84.exe 86 PID 4080 set thread context of 4944 4080 fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84.exe 92 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3120 PING.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4944 fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2272 fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84.exe Token: SeDebugPrivilege 4456 fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84.exe Token: SeDebugPrivilege 4080 fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84.exe Token: SeDebugPrivilege 4944 fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84.exe Token: 33 4944 fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84.exe Token: SeIncBasePriorityPrivilege 4944 fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4944 fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2272 wrote to memory of 4456 2272 fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84.exe 86 PID 2272 wrote to memory of 4456 2272 fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84.exe 86 PID 2272 wrote to memory of 4456 2272 fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84.exe 86 PID 2272 wrote to memory of 4456 2272 fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84.exe 86 PID 2272 wrote to memory of 4456 2272 fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84.exe 86 PID 2272 wrote to memory of 4456 2272 fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84.exe 86 PID 2272 wrote to memory of 4456 2272 fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84.exe 86 PID 2272 wrote to memory of 4456 2272 fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84.exe 86 PID 4456 wrote to memory of 4080 4456 fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84.exe 88 PID 4456 wrote to memory of 4080 4456 fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84.exe 88 PID 4456 wrote to memory of 4080 4456 fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84.exe 88 PID 4456 wrote to memory of 4196 4456 fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84.exe 89 PID 4456 wrote to memory of 4196 4456 fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84.exe 89 PID 4456 wrote to memory of 4196 4456 fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84.exe 89 PID 4196 wrote to memory of 3120 4196 cmd.exe 91 PID 4196 wrote to memory of 3120 4196 cmd.exe 91 PID 4196 wrote to memory of 3120 4196 cmd.exe 91 PID 4080 wrote to memory of 4944 4080 fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84.exe 92 PID 4080 wrote to memory of 4944 4080 fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84.exe 92 PID 4080 wrote to memory of 4944 4080 fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84.exe 92 PID 4080 wrote to memory of 4944 4080 fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84.exe 92 PID 4080 wrote to memory of 4944 4080 fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84.exe 92 PID 4080 wrote to memory of 4944 4080 fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84.exe 92 PID 4080 wrote to memory of 4944 4080 fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84.exe 92 PID 4080 wrote to memory of 4944 4080 fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84.exe"C:\Users\Admin\AppData\Local\Temp\fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84.exe"C:\Users\Admin\AppData\Local\Temp\fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84.exe"2⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84\fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84.exe"C:\Users\Admin\AppData\Local\Temp\fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84\fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Users\Admin\AppData\Local\Temp\fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84\fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84.exe"C:\Users\Admin\AppData\Local\Temp\fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84\fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4944
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 10004⤵
- Runs ping.exe
PID:3120
-
-
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:3772
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84.exe.log
Filesize706B
MD52ef5ef69dadb8865b3d5b58c956077b8
SHA1af2d869bac00685c745652bbd8b3fe82829a8998
SHA256363502eb2a4e53ba02d2d85412b901fcf8e06de221736bdffa949799ef3d21e3
SHA51266d4db5dd17d88e1d54ea0df3a7211a503dc4355de701259cefccc9f2e4e3ced9534b700099ffbb089a5a3acb082011c80b61801aa14aff76b379ce8f90d4fd3
-
C:\Users\Admin\AppData\Local\Temp\fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84\fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84.exe
Filesize732KB
MD5a3f0468657e66c72f67b7867b4c03b0f
SHA11d7355e2f8020131bca18c4b8e071e4df620c02a
SHA256fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84
SHA512f57bc731e3db8c5192384fc4190b4695f1e62df21db593a5e57c20b6b812ea034d330940cc6f7aa050ac0520108bf044dfd59e9401bb78b245f7c83101f33b54
-
C:\Users\Admin\AppData\Local\Temp\fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84\fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84.exe
Filesize732KB
MD5a3f0468657e66c72f67b7867b4c03b0f
SHA11d7355e2f8020131bca18c4b8e071e4df620c02a
SHA256fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84
SHA512f57bc731e3db8c5192384fc4190b4695f1e62df21db593a5e57c20b6b812ea034d330940cc6f7aa050ac0520108bf044dfd59e9401bb78b245f7c83101f33b54
-
C:\Users\Admin\AppData\Local\Temp\fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84\fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84.exe
Filesize732KB
MD5a3f0468657e66c72f67b7867b4c03b0f
SHA11d7355e2f8020131bca18c4b8e071e4df620c02a
SHA256fc1125999eec3147ac164d2d5fe082f877e139c27728f81fea25dcb596718d84
SHA512f57bc731e3db8c5192384fc4190b4695f1e62df21db593a5e57c20b6b812ea034d330940cc6f7aa050ac0520108bf044dfd59e9401bb78b245f7c83101f33b54