Overview
overview
10Static
static
0374bb627e...71.dll
windows7_x64
100374bb627e...71.dll
windows10-2004_x64
100ba117fd39...35.exe
windows7_x64
100ba117fd39...35.exe
windows10-2004_x64
10196c17a866...fe.exe
windows7_x64
10196c17a866...fe.exe
windows10-2004_x64
101e0215f67f...53.exe
windows7_x64
101e0215f67f...53.exe
windows10-2004_x64
1025d04d6314...de.exe
windows7_x64
1025d04d6314...de.exe
windows10-2004_x64
10428ff553b6...50.exe
windows7_x64
10428ff553b6...50.exe
windows10-2004_x64
10455d08a5e2...ce.exe
windows7_x64
10455d08a5e2...ce.exe
windows10-2004_x64
104dbd0cd1e0...59.dll
windows7_x64
104dbd0cd1e0...59.dll
windows10-2004_x64
104febaf5c3e...92.exe
windows7_x64
104febaf5c3e...92.exe
windows10-2004_x64
105282f373b4...ff.exe
windows7_x64
95282f373b4...ff.exe
windows10-2004_x64
96c2e494f16...47.exe
windows7_x64
106c2e494f16...47.exe
windows10-2004_x64
106c95be6a53...65.exe
windows7_x64
106c95be6a53...65.exe
windows10-2004_x64
1075a5b0e0e9...1a.exe
windows7_x64
1075a5b0e0e9...1a.exe
windows10-2004_x64
107dd89cf8a1...d2.exe
windows7_x64
107dd89cf8a1...d2.exe
windows10-2004_x64
1081fa8a3bdc...77.exe
windows7_x64
1081fa8a3bdc...77.exe
windows10-2004_x64
109268e1f0af...b0.dll
windows7_x64
109268e1f0af...b0.dll
windows10-2004_x64
10Analysis
-
max time kernel
75s -
max time network
317s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-06-2022 13:51
Static task
static1
Behavioral task
behavioral1
Sample
0374bb627e51aa5fa5df0640a5468939cf190a1a1bc0c8a0f3df4bc9b3e92171.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
0374bb627e51aa5fa5df0640a5468939cf190a1a1bc0c8a0f3df4bc9b3e92171.dll
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
0ba117fd394120dbe7fef45f244ab20d476e595fd900ce56c4fced0941e8a635.exe
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
0ba117fd394120dbe7fef45f244ab20d476e595fd900ce56c4fced0941e8a635.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral5
Sample
196c17a866c395520e3440779c11fa79063127efb81cfb5d44f9c664f6a790fe.exe
Resource
win7-20220414-en
Behavioral task
behavioral6
Sample
196c17a866c395520e3440779c11fa79063127efb81cfb5d44f9c664f6a790fe.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral7
Sample
1e0215f67fb7b02bc44f33bf6a5b884c3061cbeb38e0150b559635458951fa53.exe
Resource
win7-20220414-en
Behavioral task
behavioral8
Sample
1e0215f67fb7b02bc44f33bf6a5b884c3061cbeb38e0150b559635458951fa53.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral9
Sample
25d04d6314390db9f02656b70f9d0da208b7d3e4dd47ece7cb907854a2c07dde.exe
Resource
win7-20220414-en
Behavioral task
behavioral10
Sample
25d04d6314390db9f02656b70f9d0da208b7d3e4dd47ece7cb907854a2c07dde.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral11
Sample
428ff553b67cd782e6d0227ae09c83ba8074fa11cf4bfd91703b2043aa5f6c50.exe
Resource
win7-20220414-en
Behavioral task
behavioral12
Sample
428ff553b67cd782e6d0227ae09c83ba8074fa11cf4bfd91703b2043aa5f6c50.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral13
Sample
455d08a5e2a10427eb1aec8f9ee931a5ae10b41acb9cf0e9090f87722a96b9ce.exe
Resource
win7-20220414-en
Behavioral task
behavioral14
Sample
455d08a5e2a10427eb1aec8f9ee931a5ae10b41acb9cf0e9090f87722a96b9ce.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral15
Sample
4dbd0cd1e0f85d16cb65f376880ca9ba247bd1f81542f135610f951349909959.dll
Resource
win7-20220414-en
Behavioral task
behavioral16
Sample
4dbd0cd1e0f85d16cb65f376880ca9ba247bd1f81542f135610f951349909959.dll
Resource
win10v2004-20220414-en
Behavioral task
behavioral17
Sample
4febaf5c3eb1938f657200df1141457d1bb34b9b67222f2e889c9785dd99e492.exe
Resource
win7-20220414-en
Behavioral task
behavioral18
Sample
4febaf5c3eb1938f657200df1141457d1bb34b9b67222f2e889c9785dd99e492.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral19
Sample
5282f373b4dbab1b939b625d05d45442e8c008eeb6fa5d3c1f587cf80afa21ff.exe
Resource
win7-20220414-en
Behavioral task
behavioral20
Sample
5282f373b4dbab1b939b625d05d45442e8c008eeb6fa5d3c1f587cf80afa21ff.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral21
Sample
6c2e494f16262d6e4b2eaa552971b562a2bb87ac71a73a8be8638aefb47f1a47.exe
Resource
win7-20220414-en
Behavioral task
behavioral22
Sample
6c2e494f16262d6e4b2eaa552971b562a2bb87ac71a73a8be8638aefb47f1a47.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral23
Sample
6c95be6a536264db1dcb3c13b03b6f67d04b75a49cb9411fa294352590df2e65.exe
Resource
win7-20220414-en
Behavioral task
behavioral24
Sample
6c95be6a536264db1dcb3c13b03b6f67d04b75a49cb9411fa294352590df2e65.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral25
Sample
75a5b0e0e96691e1aacf99aba23f9b2a53ef8c349a8822494b7b82c400b5a61a.exe
Resource
win7-20220414-en
Behavioral task
behavioral26
Sample
75a5b0e0e96691e1aacf99aba23f9b2a53ef8c349a8822494b7b82c400b5a61a.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral27
Sample
7dd89cf8a1fd81909f2dd9b75cffa1f7ed98ae94c381a6c92ffd0a0dee7707d2.exe
Resource
win7-20220414-en
Behavioral task
behavioral28
Sample
7dd89cf8a1fd81909f2dd9b75cffa1f7ed98ae94c381a6c92ffd0a0dee7707d2.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral29
Sample
81fa8a3bdc452dd2b279b61fed92fe83d65e650e06bca9ee4dfcf991a4a59e77.exe
Resource
win7-20220414-en
Behavioral task
behavioral30
Sample
81fa8a3bdc452dd2b279b61fed92fe83d65e650e06bca9ee4dfcf991a4a59e77.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral31
Sample
9268e1f0af209ecb3d16ddbb4b5f294194c62b54812b02aba7efc7b1306c0fb0.dll
Resource
win7-20220414-en
General
-
Target
5282f373b4dbab1b939b625d05d45442e8c008eeb6fa5d3c1f587cf80afa21ff.exe
-
Size
92KB
-
MD5
fd8050fe993e55914b1608dd1828f540
-
SHA1
8d8de88ec4baaeb504b4cdf959fd0d76fd346818
-
SHA256
5282f373b4dbab1b939b625d05d45442e8c008eeb6fa5d3c1f587cf80afa21ff
-
SHA512
ac73a5a33b2c9549b678ccf7dd48242f7563eb15b1cc75f3d28e170b72d09f6a4424e75f20c049f603b04c2536f03aa96fae50a6c3f12dbb5f7075ef9dd9e60d
Malware Config
Signatures
-
Modifies boot configuration data using bcdedit 1 TTPs 1 IoCs
pid Process 2632 bcdedit.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation 5282f373b4dbab1b939b625d05d45442e8c008eeb6fa5d3c1f587cf80afa21ff.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\app-fix = "schtasks /run /tn cmd_b" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\*ddf-fix = "C:\\fixes\\ddefender\\fix.cmd" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 8 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4848 schtasks.exe 4524 schtasks.exe 4784 schtasks.exe 2148 schtasks.exe 2060 schtasks.exe 1064 schtasks.exe 3392 schtasks.exe 4100 schtasks.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "33" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 3628 shutdown.exe Token: SeRemoteShutdownPrivilege 3628 shutdown.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4872 LogonUI.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 1804 wrote to memory of 1760 1804 5282f373b4dbab1b939b625d05d45442e8c008eeb6fa5d3c1f587cf80afa21ff.exe 83 PID 1804 wrote to memory of 1760 1804 5282f373b4dbab1b939b625d05d45442e8c008eeb6fa5d3c1f587cf80afa21ff.exe 83 PID 1804 wrote to memory of 1760 1804 5282f373b4dbab1b939b625d05d45442e8c008eeb6fa5d3c1f587cf80afa21ff.exe 83 PID 1760 wrote to memory of 4784 1760 cmd.exe 85 PID 1760 wrote to memory of 4784 1760 cmd.exe 85 PID 1760 wrote to memory of 4784 1760 cmd.exe 85 PID 1760 wrote to memory of 2148 1760 cmd.exe 86 PID 1760 wrote to memory of 2148 1760 cmd.exe 86 PID 1760 wrote to memory of 2148 1760 cmd.exe 86 PID 1760 wrote to memory of 2060 1760 cmd.exe 87 PID 1760 wrote to memory of 2060 1760 cmd.exe 87 PID 1760 wrote to memory of 2060 1760 cmd.exe 87 PID 1760 wrote to memory of 1064 1760 cmd.exe 88 PID 1760 wrote to memory of 1064 1760 cmd.exe 88 PID 1760 wrote to memory of 1064 1760 cmd.exe 88 PID 1760 wrote to memory of 3392 1760 cmd.exe 89 PID 1760 wrote to memory of 3392 1760 cmd.exe 89 PID 1760 wrote to memory of 3392 1760 cmd.exe 89 PID 1760 wrote to memory of 4100 1760 cmd.exe 90 PID 1760 wrote to memory of 4100 1760 cmd.exe 90 PID 1760 wrote to memory of 4100 1760 cmd.exe 90 PID 1760 wrote to memory of 4848 1760 cmd.exe 91 PID 1760 wrote to memory of 4848 1760 cmd.exe 91 PID 1760 wrote to memory of 4848 1760 cmd.exe 91 PID 1760 wrote to memory of 4524 1760 cmd.exe 92 PID 1760 wrote to memory of 4524 1760 cmd.exe 92 PID 1760 wrote to memory of 4524 1760 cmd.exe 92 PID 1760 wrote to memory of 4456 1760 cmd.exe 93 PID 1760 wrote to memory of 4456 1760 cmd.exe 93 PID 1760 wrote to memory of 4456 1760 cmd.exe 93 PID 1760 wrote to memory of 4500 1760 cmd.exe 94 PID 1760 wrote to memory of 4500 1760 cmd.exe 94 PID 1760 wrote to memory of 4500 1760 cmd.exe 94 PID 4724 wrote to memory of 4572 4724 cmd.exe 97 PID 4724 wrote to memory of 4572 4724 cmd.exe 97 PID 4724 wrote to memory of 2632 4724 cmd.exe 98 PID 4724 wrote to memory of 2632 4724 cmd.exe 98 PID 4724 wrote to memory of 3628 4724 cmd.exe 99 PID 4724 wrote to memory of 3628 4724 cmd.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\5282f373b4dbab1b939b625d05d45442e8c008eeb6fa5d3c1f587cf80afa21ff.exe"C:\Users\Admin\AppData\Local\Temp\5282f373b4dbab1b939b625d05d45442e8c008eeb6fa5d3c1f587cf80afa21ff.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c %SYSTEMDRIVE%\fixes\tsk.cmd2⤵
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc once /tn cmd_a /tr C:\fixes\ddefender\run.cmd /rl highest /st 00:003⤵
- Creates scheduled task(s)
PID:4784
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc once /tn cmd_b /tr C:\fixes\base\run.cmd /rl highest /st 00:003⤵
- Creates scheduled task(s)
PID:2148
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc once /tn cmd_c /tr "reg delete \"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\InstallService\" /f" /ru SYSTEM /st 00:003⤵
- Creates scheduled task(s)
PID:2060
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc once /tn cmd_d /tr "reg delete \"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\WaaSMedic\" /f" /ru SYSTEM /st 00:003⤵
- Creates scheduled task(s)
PID:1064
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc once /tn cmd_e /tr "reg delete \"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\" /f" /ru SYSTEM /st 00:003⤵
- Creates scheduled task(s)
PID:3392
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc once /tn cmd_f /tr "reg add \"HKLM\SYSTEM\CurrentControlSet\Services\WinDefend" /v Start /t REG_DWORD /d 4 /f" /ru SYSTEM /st 00:003⤵
- Creates scheduled task(s)
PID:4100
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc once /tn cmd_g /tr "reg add \"HKLM\SYSTEM\CurrentControlSet\Services\WdNisSvc" /v Start /t REG_DWORD /d 4 /f" /ru SYSTEM /st 00:003⤵
- Creates scheduled task(s)
PID:4848
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc once /tn cmd_h /tr "reg add \"HKLM\SYSTEM\CurrentControlSet\Services\Sense" /v Start /t REG_DWORD /d 4 /f" /ru SYSTEM /st 00:003⤵
- Creates scheduled task(s)
PID:4524
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "app-fix" /t REG_SZ /d "schtasks /run /tn cmd_b" /f3⤵
- Adds Run key to start application
PID:4456
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /tn cmd_a3⤵PID:4500
-
-
-
C:\Windows\SYSTEM32\cmd.exeC:\Windows\SYSTEM32\cmd.exe /c "C:\fixes\ddefender\run.cmd"1⤵
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "*ddf-fix" /t REG_SZ /d "C:\fixes\ddefender\fix.cmd" /f2⤵
- Adds Run key to start application
PID:4572
-
-
C:\Windows\system32\bcdedit.exebcdedit /set {current} safeboot minimal2⤵
- Modifies boot configuration data using bcdedit
PID:2632
-
-
C:\Windows\system32\shutdown.exeshutdown -f -r -t 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:3628
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3a13855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:4872
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
229B
MD538a528fbb40d3bc0fae336303e71d0be
SHA1300c605491419966f209a81557e957fe7b860d73
SHA256857b07248e7bc3c573d4c3342b6dcfc92403bcf8a09db6fe0d86b13deae254ec
SHA51201c842503aae63e8cfbff53758137813a50c7ff0c8d6a3e2da81b2e46ea41b5be866086da54b9b1928d6411d0000780f491aa2f3a794b87ef042782e8496aee0
-
Filesize
1KB
MD55719ce24c0d7577a2b23bfbf9267bc2c
SHA15ea8756d8b80563502809a3200b508474c7285d5
SHA256e6a7502f80a1519ef1dde70104ac6a24e2d257f6634e3ff1eb71a9bfde8fdf2a
SHA512fc970ecb526e57b67e277ad5a520925fa49a65565c9824011d8de425722623945cdd21de35826bbbb7187b24eaa16e8303391b42ce7fbb37777e38b315e2d132