Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
12-07-2022 05:04
Static task
static1
Behavioral task
behavioral1
Sample
8abebde631005ae15aba91eb8f36fbe7.exe
Resource
win7-20220414-en
General
-
Target
8abebde631005ae15aba91eb8f36fbe7.exe
-
Size
983KB
-
MD5
8abebde631005ae15aba91eb8f36fbe7
-
SHA1
d4ac00d9aee072b6d1499e730cf9bcb27ad957ad
-
SHA256
2e66e23d1ae80b56efc2c38bf5adbb31dab91b811eaadce68f544e06323d52ef
-
SHA512
7091584d35154b0711e4a8b6c788cc5db5ad0e6444e5cda5a16ad41a00cf333413fc8ac5b93e84b9b2e5e9350ca89837c6f69b5838ade967b403bd24322ab3fc
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation 8abebde631005ae15aba91eb8f36fbe7.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation 8abebde631005ae15aba91eb8f36fbe7.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2208 set thread context of 1724 2208 8abebde631005ae15aba91eb8f36fbe7.exe 84 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A Taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName Taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 Taskmgr.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1604 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 34 IoCs
pid Process 2548 powershell.exe 1724 8abebde631005ae15aba91eb8f36fbe7.exe 1724 8abebde631005ae15aba91eb8f36fbe7.exe 2548 powershell.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 1724 8abebde631005ae15aba91eb8f36fbe7.exe 1724 8abebde631005ae15aba91eb8f36fbe7.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1724 8abebde631005ae15aba91eb8f36fbe7.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2548 powershell.exe Token: SeDebugPrivilege 1724 8abebde631005ae15aba91eb8f36fbe7.exe Token: SeDebugPrivilege 3840 Taskmgr.exe Token: SeSystemProfilePrivilege 3840 Taskmgr.exe Token: SeCreateGlobalPrivilege 3840 Taskmgr.exe -
Suspicious use of FindShellTrayWindow 38 IoCs
pid Process 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe -
Suspicious use of SendNotifyMessage 38 IoCs
pid Process 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe 3840 Taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1724 8abebde631005ae15aba91eb8f36fbe7.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2548 2208 8abebde631005ae15aba91eb8f36fbe7.exe 80 PID 2208 wrote to memory of 2548 2208 8abebde631005ae15aba91eb8f36fbe7.exe 80 PID 2208 wrote to memory of 2548 2208 8abebde631005ae15aba91eb8f36fbe7.exe 80 PID 2208 wrote to memory of 1604 2208 8abebde631005ae15aba91eb8f36fbe7.exe 82 PID 2208 wrote to memory of 1604 2208 8abebde631005ae15aba91eb8f36fbe7.exe 82 PID 2208 wrote to memory of 1604 2208 8abebde631005ae15aba91eb8f36fbe7.exe 82 PID 2208 wrote to memory of 1724 2208 8abebde631005ae15aba91eb8f36fbe7.exe 84 PID 2208 wrote to memory of 1724 2208 8abebde631005ae15aba91eb8f36fbe7.exe 84 PID 2208 wrote to memory of 1724 2208 8abebde631005ae15aba91eb8f36fbe7.exe 84 PID 2208 wrote to memory of 1724 2208 8abebde631005ae15aba91eb8f36fbe7.exe 84 PID 2208 wrote to memory of 1724 2208 8abebde631005ae15aba91eb8f36fbe7.exe 84 PID 2208 wrote to memory of 1724 2208 8abebde631005ae15aba91eb8f36fbe7.exe 84 PID 2208 wrote to memory of 1724 2208 8abebde631005ae15aba91eb8f36fbe7.exe 84 PID 2208 wrote to memory of 1724 2208 8abebde631005ae15aba91eb8f36fbe7.exe 84 PID 1724 wrote to memory of 3840 1724 8abebde631005ae15aba91eb8f36fbe7.exe 85 PID 1724 wrote to memory of 3840 1724 8abebde631005ae15aba91eb8f36fbe7.exe 85 PID 1724 wrote to memory of 3840 1724 8abebde631005ae15aba91eb8f36fbe7.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\8abebde631005ae15aba91eb8f36fbe7.exe"C:\Users\Admin\AppData\Local\Temp\8abebde631005ae15aba91eb8f36fbe7.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\uppEqmN.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2548
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\uppEqmN" /XML "C:\Users\Admin\AppData\Local\Temp\tmpBEAC.tmp"2⤵
- Creates scheduled task(s)
PID:1604
-
-
C:\Users\Admin\AppData\Local\Temp\8abebde631005ae15aba91eb8f36fbe7.exe"C:\Users\Admin\AppData\Local\Temp\8abebde631005ae15aba91eb8f36fbe7.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\Taskmgr.exe"C:\Windows\System32\Taskmgr.exe"3⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3840
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c25830118ff75c9d5efaffb74ef52a68
SHA1015710f73062a3cb2c1932d95328ed2e837a2ebb
SHA256791d7c6b1322be2042511f007e05111f45be8a4079ea949acef14f9680bbfdbe
SHA5124c7d5d8aba21151ce0b49dc4fffbec6036886960dddecf4da681057c107d02e27581fef5bcf572a8fbfcc82e8ae786c8a5c94a0e0ba3fce8c4355d633ecc0a14