Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
12/06/2022, 18:25
Static task
static1
Behavioral task
behavioral1
Sample
1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9.exe
Resource
win10v2004-20220414-en
General
-
Target
1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9.exe
-
Size
808KB
-
MD5
295336d2300f36222053ac4e75883764
-
SHA1
d1a8b339d466b0b827cf607fd8fdeb7ed1b85295
-
SHA256
1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9
-
SHA512
eceb31db79c3c8cec7aef2492f9dcc24ec9a0b6711dea807ac3e30671b26ef2266e8b9e2ffb47c1a4977fb764328ab7571d51e5e218471bb63e1ab337e8a8cdd
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3184 1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9.exe 4816 1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation 1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Service = "\\Service\\Service.exe" 1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9.exe Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Service = "C:\\Users\\Admin\\AppData\\Roaming\\Service\\Service.exe" 1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini 1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9.exe File opened for modification C:\Windows\assembly\Desktop.ini 1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4144 set thread context of 1524 4144 1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9.exe 81 PID 3184 set thread context of 4816 3184 1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9.exe 86 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly\Desktop.ini 1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9.exe File opened for modification C:\Windows\assembly 1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9.exe File created C:\Windows\assembly\Desktop.ini 1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 5048 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4144 1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9.exe 3184 1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4816 1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 4144 1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9.exe Token: SeDebugPrivilege 1524 1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9.exe Token: SeDebugPrivilege 3184 1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9.exe Token: SeDebugPrivilege 4816 1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9.exe Token: SeDebugPrivilege 4816 1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9.exe Token: 33 4816 1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9.exe Token: SeIncBasePriorityPrivilege 4816 1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4816 1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 4144 wrote to memory of 1524 4144 1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9.exe 81 PID 4144 wrote to memory of 1524 4144 1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9.exe 81 PID 4144 wrote to memory of 1524 4144 1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9.exe 81 PID 4144 wrote to memory of 1524 4144 1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9.exe 81 PID 4144 wrote to memory of 1524 4144 1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9.exe 81 PID 4144 wrote to memory of 1524 4144 1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9.exe 81 PID 4144 wrote to memory of 1524 4144 1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9.exe 81 PID 4144 wrote to memory of 1524 4144 1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9.exe 81 PID 1524 wrote to memory of 3184 1524 1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9.exe 82 PID 1524 wrote to memory of 3184 1524 1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9.exe 82 PID 1524 wrote to memory of 3184 1524 1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9.exe 82 PID 1524 wrote to memory of 4316 1524 1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9.exe 83 PID 1524 wrote to memory of 4316 1524 1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9.exe 83 PID 1524 wrote to memory of 4316 1524 1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9.exe 83 PID 4316 wrote to memory of 5048 4316 cmd.exe 85 PID 4316 wrote to memory of 5048 4316 cmd.exe 85 PID 4316 wrote to memory of 5048 4316 cmd.exe 85 PID 3184 wrote to memory of 4816 3184 1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9.exe 86 PID 3184 wrote to memory of 4816 3184 1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9.exe 86 PID 3184 wrote to memory of 4816 3184 1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9.exe 86 PID 3184 wrote to memory of 4816 3184 1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9.exe 86 PID 3184 wrote to memory of 4816 3184 1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9.exe 86 PID 3184 wrote to memory of 4816 3184 1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9.exe 86 PID 3184 wrote to memory of 4816 3184 1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9.exe 86 PID 3184 wrote to memory of 4816 3184 1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9.exe"C:\Users\Admin\AppData\Local\Temp\1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Users\Admin\AppData\Local\Temp\1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9.exe"C:\Users\Admin\AppData\Local\Temp\1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9.exe" C:\Users\Admin\AppData\Local\Temp\1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9.exe2⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9\1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9.exe"C:\Users\Admin\AppData\Local\Temp\1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9\1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Users\Admin\AppData\Local\Temp\1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9\1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9.exe"C:\Users\Admin\AppData\Local\Temp\1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9\1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9.exe" C:\Users\Admin\AppData\Local\Temp\1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9\1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4816
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 10004⤵
- Runs ping.exe
PID:5048
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9.exe.log
Filesize594B
MD551ac875eb708e015bc50f2bee1062ca7
SHA1c3a32f66deb3272dc6f26443813294c6d156ecf9
SHA25644eb523a35bf63adcf05fd6a67981adf0d427c80d04fe76ce164805d1f4b7518
SHA512e394c11bffdfe0ef256a5fa72205a91fd12341ad61b12d1c9858d0702cb7f627e4af888b8c7cfaaceb7356731f101e04c02f7e9d36b2c47a826321cfef953f19
-
C:\Users\Admin\AppData\Local\Temp\1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9\1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9.exe
Filesize808KB
MD5295336d2300f36222053ac4e75883764
SHA1d1a8b339d466b0b827cf607fd8fdeb7ed1b85295
SHA2561f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9
SHA512eceb31db79c3c8cec7aef2492f9dcc24ec9a0b6711dea807ac3e30671b26ef2266e8b9e2ffb47c1a4977fb764328ab7571d51e5e218471bb63e1ab337e8a8cdd
-
C:\Users\Admin\AppData\Local\Temp\1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9\1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9.exe
Filesize808KB
MD5295336d2300f36222053ac4e75883764
SHA1d1a8b339d466b0b827cf607fd8fdeb7ed1b85295
SHA2561f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9
SHA512eceb31db79c3c8cec7aef2492f9dcc24ec9a0b6711dea807ac3e30671b26ef2266e8b9e2ffb47c1a4977fb764328ab7571d51e5e218471bb63e1ab337e8a8cdd
-
C:\Users\Admin\AppData\Local\Temp\1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9\1f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9.exe
Filesize808KB
MD5295336d2300f36222053ac4e75883764
SHA1d1a8b339d466b0b827cf607fd8fdeb7ed1b85295
SHA2561f4a1144ad086e49a22f267346509461c503ad815a1bcc1210b7803282ddbdb9
SHA512eceb31db79c3c8cec7aef2492f9dcc24ec9a0b6711dea807ac3e30671b26ef2266e8b9e2ffb47c1a4977fb764328ab7571d51e5e218471bb63e1ab337e8a8cdd