Analysis
-
max time kernel
110s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
30-06-2022 23:33
Static task
static1
Behavioral task
behavioral1
Sample
92ec9a0eaccf10c69c6ecb89398669105ec4fa4c8b7172579381ba586746ec20.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
92ec9a0eaccf10c69c6ecb89398669105ec4fa4c8b7172579381ba586746ec20.exe
Resource
win10v2004-20220414-en
General
-
Target
92ec9a0eaccf10c69c6ecb89398669105ec4fa4c8b7172579381ba586746ec20.exe
-
Size
2.0MB
-
MD5
cbd089fed817ad11f6ad3d2f9731e872
-
SHA1
138eeed3bbce9d86353e125f0022903ea419fe1a
-
SHA256
92ec9a0eaccf10c69c6ecb89398669105ec4fa4c8b7172579381ba586746ec20
-
SHA512
c979db0c2332c6c5e9474cc658194fe5a0726a6b310541bb053c72af32882e2acfa44c5609633b5e8008cef51a8a48ea69cf25570e2fb850f6602319dfed5b50
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
92ec9a0eaccf10c69c6ecb89398669105ec4fa4c8b7172579381ba586746ec20.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Local\\Temp\\92ec9a0eaccf10c69c6ecb89398669105ec4fa4c8b7172579381ba586746ec20.exe\"" 92ec9a0eaccf10c69c6ecb89398669105ec4fa4c8b7172579381ba586746ec20.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
Processes:
92ec9a0eaccf10c69c6ecb89398669105ec4fa4c8b7172579381ba586746ec20.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Oracle\VirtualBox Guest Additions 92ec9a0eaccf10c69c6ecb89398669105ec4fa4c8b7172579381ba586746ec20.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
Processes:
92ec9a0eaccf10c69c6ecb89398669105ec4fa4c8b7172579381ba586746ec20.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools 92ec9a0eaccf10c69c6ecb89398669105ec4fa4c8b7172579381ba586746ec20.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
92ec9a0eaccf10c69c6ecb89398669105ec4fa4c8b7172579381ba586746ec20.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 92ec9a0eaccf10c69c6ecb89398669105ec4fa4c8b7172579381ba586746ec20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 92ec9a0eaccf10c69c6ecb89398669105ec4fa4c8b7172579381ba586746ec20.exe -
Drops startup file 2 IoCs
Processes:
92ec9a0eaccf10c69c6ecb89398669105ec4fa4c8b7172579381ba586746ec20.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\92ec9a0eaccf10c69c6ecb89398669105ec4fa4c8b7172579381ba586746ec20.exe 92ec9a0eaccf10c69c6ecb89398669105ec4fa4c8b7172579381ba586746ec20.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\92ec9a0eaccf10c69c6ecb89398669105ec4fa4c8b7172579381ba586746ec20.exe 92ec9a0eaccf10c69c6ecb89398669105ec4fa4c8b7172579381ba586746ec20.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
92ec9a0eaccf10c69c6ecb89398669105ec4fa4c8b7172579381ba586746ec20.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\92ec9a0eaccf10c69c6ecb89398669105ec4fa4c8b7172579381ba586746ec20.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\92ec9a0eaccf10c69c6ecb89398669105ec4fa4c8b7172579381ba586746ec20.exe" 92ec9a0eaccf10c69c6ecb89398669105ec4fa4c8b7172579381ba586746ec20.exe Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\<Unknown> = "C:\\Users\\Admin\\AppData\\Local\\Temp\\92ec9a0eaccf10c69c6ecb89398669105ec4fa4c8b7172579381ba586746ec20.exe" 92ec9a0eaccf10c69c6ecb89398669105ec4fa4c8b7172579381ba586746ec20.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
92ec9a0eaccf10c69c6ecb89398669105ec4fa4c8b7172579381ba586746ec20.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 92ec9a0eaccf10c69c6ecb89398669105ec4fa4c8b7172579381ba586746ec20.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 92ec9a0eaccf10c69c6ecb89398669105ec4fa4c8b7172579381ba586746ec20.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
92ec9a0eaccf10c69c6ecb89398669105ec4fa4c8b7172579381ba586746ec20.exedescription pid process target process PID 4480 set thread context of 3964 4480 92ec9a0eaccf10c69c6ecb89398669105ec4fa4c8b7172579381ba586746ec20.exe 92ec9a0eaccf10c69c6ecb89398669105ec4fa4c8b7172579381ba586746ec20.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
Processes:
92ec9a0eaccf10c69c6ecb89398669105ec4fa4c8b7172579381ba586746ec20.exeOpenWith.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000_Classes\Local Settings 92ec9a0eaccf10c69c6ecb89398669105ec4fa4c8b7172579381ba586746ec20.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
OpenWith.exepid process 2576 OpenWith.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
92ec9a0eaccf10c69c6ecb89398669105ec4fa4c8b7172579381ba586746ec20.exedescription pid process target process PID 4480 wrote to memory of 3964 4480 92ec9a0eaccf10c69c6ecb89398669105ec4fa4c8b7172579381ba586746ec20.exe 92ec9a0eaccf10c69c6ecb89398669105ec4fa4c8b7172579381ba586746ec20.exe PID 4480 wrote to memory of 3964 4480 92ec9a0eaccf10c69c6ecb89398669105ec4fa4c8b7172579381ba586746ec20.exe 92ec9a0eaccf10c69c6ecb89398669105ec4fa4c8b7172579381ba586746ec20.exe PID 4480 wrote to memory of 3964 4480 92ec9a0eaccf10c69c6ecb89398669105ec4fa4c8b7172579381ba586746ec20.exe 92ec9a0eaccf10c69c6ecb89398669105ec4fa4c8b7172579381ba586746ec20.exe PID 4480 wrote to memory of 3964 4480 92ec9a0eaccf10c69c6ecb89398669105ec4fa4c8b7172579381ba586746ec20.exe 92ec9a0eaccf10c69c6ecb89398669105ec4fa4c8b7172579381ba586746ec20.exe PID 4480 wrote to memory of 3964 4480 92ec9a0eaccf10c69c6ecb89398669105ec4fa4c8b7172579381ba586746ec20.exe 92ec9a0eaccf10c69c6ecb89398669105ec4fa4c8b7172579381ba586746ec20.exe PID 4480 wrote to memory of 3964 4480 92ec9a0eaccf10c69c6ecb89398669105ec4fa4c8b7172579381ba586746ec20.exe 92ec9a0eaccf10c69c6ecb89398669105ec4fa4c8b7172579381ba586746ec20.exe PID 4480 wrote to memory of 3964 4480 92ec9a0eaccf10c69c6ecb89398669105ec4fa4c8b7172579381ba586746ec20.exe 92ec9a0eaccf10c69c6ecb89398669105ec4fa4c8b7172579381ba586746ec20.exe PID 4480 wrote to memory of 3964 4480 92ec9a0eaccf10c69c6ecb89398669105ec4fa4c8b7172579381ba586746ec20.exe 92ec9a0eaccf10c69c6ecb89398669105ec4fa4c8b7172579381ba586746ec20.exe PID 4480 wrote to memory of 3964 4480 92ec9a0eaccf10c69c6ecb89398669105ec4fa4c8b7172579381ba586746ec20.exe 92ec9a0eaccf10c69c6ecb89398669105ec4fa4c8b7172579381ba586746ec20.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\92ec9a0eaccf10c69c6ecb89398669105ec4fa4c8b7172579381ba586746ec20.exe"C:\Users\Admin\AppData\Local\Temp\92ec9a0eaccf10c69c6ecb89398669105ec4fa4c8b7172579381ba586746ec20.exe"1⤵
- Modifies WinLogon for persistence
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Drops startup file
- Adds Run key to start application
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\92ec9a0eaccf10c69c6ecb89398669105ec4fa4c8b7172579381ba586746ec20.exe"C:\Users\Admin\AppData\Local\Temp\92ec9a0eaccf10c69c6ecb89398669105ec4fa4c8b7172579381ba586746ec20.exe"2⤵
- Modifies registry class
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\92ec9a0eaccf10c69c6ecb89398669105ec4fa4c8b7172579381ba586746ec20.exe.logFilesize
1KB
MD578de7805f6690cabfbd1de459db6d114
SHA1e2065ffecf5377d717440fd592c3d1d8320b1d4d
SHA256f008a1bbc9a8ab34149baf444cb8bf55875459f51cb7fe48dc525c232ffca22f
SHA5128e70d184275521518c61e293d1b71ab298c193aad9e4e486846e202b8f0cd54879f3c3252da11119fc60e5b3069906c6f446af662a3918cbd6d602f9aed759a2
-
memory/3964-161-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/3964-414-0x0000000005280000-0x0000000005312000-memory.dmpFilesize
584KB
-
memory/3964-165-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/3964-134-0x0000000000000000-mapping.dmp
-
memory/3964-135-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/3964-137-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/3964-139-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/3964-141-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/3964-163-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/3964-145-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/3964-147-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/3964-149-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/3964-151-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/3964-153-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/3964-155-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/3964-157-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/3964-159-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/3964-197-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/3964-143-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/3964-195-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/3964-177-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/3964-169-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/3964-171-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/3964-173-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/3964-175-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/3964-167-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/3964-179-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/3964-181-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/3964-183-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/3964-185-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/3964-187-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/3964-189-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/3964-191-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/3964-193-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/4480-132-0x0000000005E30000-0x00000000063D4000-memory.dmpFilesize
5.6MB
-
memory/4480-130-0x0000000000C70000-0x0000000000E70000-memory.dmpFilesize
2.0MB
-
memory/4480-133-0x00000000058F0000-0x0000000005956000-memory.dmpFilesize
408KB
-
memory/4480-131-0x0000000005680000-0x000000000571C000-memory.dmpFilesize
624KB