Analysis
-
max time kernel
152s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
01-07-2022 04:59
Static task
static1
Behavioral task
behavioral1
Sample
b73fb41a78d5f93cc9baca9da7528f7e31772810832a1e062ac65da09ca44474.exe
Resource
win7-20220414-en
General
-
Target
b73fb41a78d5f93cc9baca9da7528f7e31772810832a1e062ac65da09ca44474.exe
-
Size
159KB
-
MD5
e2a7be7788bbe77180c5ca2a6c308530
-
SHA1
f682ac9bbb49e8e5e3b50bcdda276f7d219f3126
-
SHA256
b73fb41a78d5f93cc9baca9da7528f7e31772810832a1e062ac65da09ca44474
-
SHA512
f43325201ffced9e18132b92df6a22b70516355aa49c6e7ee4b1826ed17dc4e0bd47d5b49b253fed7bdd71a90ea1b8744ffc2dd5e7f455ac2a45e93e28d60308
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
svchostlime.exesvchostlime.exepid process 4528 svchostlime.exe 1252 svchostlime.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
b73fb41a78d5f93cc9baca9da7528f7e31772810832a1e062ac65da09ca44474.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation b73fb41a78d5f93cc9baca9da7528f7e31772810832a1e062ac65da09ca44474.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 1728 schtasks.exe 1220 schtasks.exe 1460 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
Processes:
svchostlime.exedescription pid process Token: SeDebugPrivilege 4528 svchostlime.exe Token: 33 4528 svchostlime.exe Token: SeIncBasePriorityPrivilege 4528 svchostlime.exe Token: 33 4528 svchostlime.exe Token: SeIncBasePriorityPrivilege 4528 svchostlime.exe Token: 33 4528 svchostlime.exe Token: SeIncBasePriorityPrivilege 4528 svchostlime.exe Token: 33 4528 svchostlime.exe Token: SeIncBasePriorityPrivilege 4528 svchostlime.exe Token: 33 4528 svchostlime.exe Token: SeIncBasePriorityPrivilege 4528 svchostlime.exe Token: 33 4528 svchostlime.exe Token: SeIncBasePriorityPrivilege 4528 svchostlime.exe Token: 33 4528 svchostlime.exe Token: SeIncBasePriorityPrivilege 4528 svchostlime.exe Token: 33 4528 svchostlime.exe Token: SeIncBasePriorityPrivilege 4528 svchostlime.exe Token: 33 4528 svchostlime.exe Token: SeIncBasePriorityPrivilege 4528 svchostlime.exe Token: 33 4528 svchostlime.exe Token: SeIncBasePriorityPrivilege 4528 svchostlime.exe Token: 33 4528 svchostlime.exe Token: SeIncBasePriorityPrivilege 4528 svchostlime.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
b73fb41a78d5f93cc9baca9da7528f7e31772810832a1e062ac65da09ca44474.exesvchostlime.exesvchostlime.exedescription pid process target process PID 3492 wrote to memory of 2020 3492 b73fb41a78d5f93cc9baca9da7528f7e31772810832a1e062ac65da09ca44474.exe schtasks.exe PID 3492 wrote to memory of 2020 3492 b73fb41a78d5f93cc9baca9da7528f7e31772810832a1e062ac65da09ca44474.exe schtasks.exe PID 3492 wrote to memory of 2020 3492 b73fb41a78d5f93cc9baca9da7528f7e31772810832a1e062ac65da09ca44474.exe schtasks.exe PID 3492 wrote to memory of 1728 3492 b73fb41a78d5f93cc9baca9da7528f7e31772810832a1e062ac65da09ca44474.exe schtasks.exe PID 3492 wrote to memory of 1728 3492 b73fb41a78d5f93cc9baca9da7528f7e31772810832a1e062ac65da09ca44474.exe schtasks.exe PID 3492 wrote to memory of 1728 3492 b73fb41a78d5f93cc9baca9da7528f7e31772810832a1e062ac65da09ca44474.exe schtasks.exe PID 3492 wrote to memory of 4528 3492 b73fb41a78d5f93cc9baca9da7528f7e31772810832a1e062ac65da09ca44474.exe svchostlime.exe PID 3492 wrote to memory of 4528 3492 b73fb41a78d5f93cc9baca9da7528f7e31772810832a1e062ac65da09ca44474.exe svchostlime.exe PID 3492 wrote to memory of 4528 3492 b73fb41a78d5f93cc9baca9da7528f7e31772810832a1e062ac65da09ca44474.exe svchostlime.exe PID 4528 wrote to memory of 1060 4528 svchostlime.exe schtasks.exe PID 4528 wrote to memory of 1060 4528 svchostlime.exe schtasks.exe PID 4528 wrote to memory of 1060 4528 svchostlime.exe schtasks.exe PID 4528 wrote to memory of 1220 4528 svchostlime.exe schtasks.exe PID 4528 wrote to memory of 1220 4528 svchostlime.exe schtasks.exe PID 4528 wrote to memory of 1220 4528 svchostlime.exe schtasks.exe PID 1252 wrote to memory of 1164 1252 svchostlime.exe schtasks.exe PID 1252 wrote to memory of 1164 1252 svchostlime.exe schtasks.exe PID 1252 wrote to memory of 1164 1252 svchostlime.exe schtasks.exe PID 1252 wrote to memory of 1460 1252 svchostlime.exe schtasks.exe PID 1252 wrote to memory of 1460 1252 svchostlime.exe schtasks.exe PID 1252 wrote to memory of 1460 1252 svchostlime.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b73fb41a78d5f93cc9baca9da7528f7e31772810832a1e062ac65da09ca44474.exe"C:\Users\Admin\AppData\Local\Temp\b73fb41a78d5f93cc9baca9da7528f7e31772810832a1e062ac65da09ca44474.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /tn NYAN /F2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NYAN /tr "C:\Users\Admin\AppData\Local\Temp\b73fb41a78d5f93cc9baca9da7528f7e31772810832a1e062ac65da09ca44474.exe" /sc minute /mo 12⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\svchostlime.exe"C:\Users\Admin\AppData\Roaming\svchostlime.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /tn NYAN /F3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NYAN /tr "C:\Users\Admin\AppData\Roaming\svchostlime.exe" /sc minute /mo 13⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\svchostlime.exeC:\Users\Admin\AppData\Roaming\svchostlime.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /tn NYAN /F2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NYAN /tr "C:\Users\Admin\AppData\Roaming\svchostlime.exe" /sc minute /mo 12⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\svchostlime.exeFilesize
159KB
MD5e2a7be7788bbe77180c5ca2a6c308530
SHA1f682ac9bbb49e8e5e3b50bcdda276f7d219f3126
SHA256b73fb41a78d5f93cc9baca9da7528f7e31772810832a1e062ac65da09ca44474
SHA512f43325201ffced9e18132b92df6a22b70516355aa49c6e7ee4b1826ed17dc4e0bd47d5b49b253fed7bdd71a90ea1b8744ffc2dd5e7f455ac2a45e93e28d60308
-
C:\Users\Admin\AppData\Roaming\svchostlime.exeFilesize
159KB
MD5e2a7be7788bbe77180c5ca2a6c308530
SHA1f682ac9bbb49e8e5e3b50bcdda276f7d219f3126
SHA256b73fb41a78d5f93cc9baca9da7528f7e31772810832a1e062ac65da09ca44474
SHA512f43325201ffced9e18132b92df6a22b70516355aa49c6e7ee4b1826ed17dc4e0bd47d5b49b253fed7bdd71a90ea1b8744ffc2dd5e7f455ac2a45e93e28d60308
-
C:\Users\Admin\AppData\Roaming\svchostlime.exeFilesize
159KB
MD5e2a7be7788bbe77180c5ca2a6c308530
SHA1f682ac9bbb49e8e5e3b50bcdda276f7d219f3126
SHA256b73fb41a78d5f93cc9baca9da7528f7e31772810832a1e062ac65da09ca44474
SHA512f43325201ffced9e18132b92df6a22b70516355aa49c6e7ee4b1826ed17dc4e0bd47d5b49b253fed7bdd71a90ea1b8744ffc2dd5e7f455ac2a45e93e28d60308
-
memory/1060-139-0x0000000000000000-mapping.dmp
-
memory/1164-144-0x0000000000000000-mapping.dmp
-
memory/1220-140-0x0000000000000000-mapping.dmp
-
memory/1252-143-0x0000000075470000-0x0000000075A21000-memory.dmpFilesize
5.7MB
-
memory/1252-146-0x0000000075470000-0x0000000075A21000-memory.dmpFilesize
5.7MB
-
memory/1460-145-0x0000000000000000-mapping.dmp
-
memory/1728-133-0x0000000000000000-mapping.dmp
-
memory/2020-132-0x0000000000000000-mapping.dmp
-
memory/3492-131-0x0000000075470000-0x0000000075A21000-memory.dmpFilesize
5.7MB
-
memory/3492-130-0x0000000075470000-0x0000000075A21000-memory.dmpFilesize
5.7MB
-
memory/3492-137-0x0000000075470000-0x0000000075A21000-memory.dmpFilesize
5.7MB
-
memory/4528-141-0x0000000075470000-0x0000000075A21000-memory.dmpFilesize
5.7MB
-
memory/4528-138-0x0000000075470000-0x0000000075A21000-memory.dmpFilesize
5.7MB
-
memory/4528-134-0x0000000000000000-mapping.dmp