Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2022, 02:48
Behavioral task
behavioral1
Sample
73f33614742a79bd70ec6b3bbf7a2def17b95ea7b88d399a1db31d95125e415f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
73f33614742a79bd70ec6b3bbf7a2def17b95ea7b88d399a1db31d95125e415f.exe
Resource
win10v2004-20220901-en
General
-
Target
73f33614742a79bd70ec6b3bbf7a2def17b95ea7b88d399a1db31d95125e415f.exe
-
Size
76KB
-
MD5
bd059ea6f22085065a58cfb82f355660
-
SHA1
3d841bf080f2c7d372095283149be6decbcbfed9
-
SHA256
73f33614742a79bd70ec6b3bbf7a2def17b95ea7b88d399a1db31d95125e415f
-
SHA512
83075c683c6bb2efbc683c0f47a53d1470446910636734d63d785c0e2460aab2e1a435c780cf621242041121562e8d21910fcbfe908715a3911e312506ba06c0
-
SSDEEP
1536:K6mQHHvp0FAHcbY2xJu/H8JEUim6mQaKB:vHHvpXc3U/H8JEdBB
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,c:\\windows\\system32\\RsTray.exe" 73f33614742a79bd70ec6b3bbf7a2def17b95ea7b88d399a1db31d95125e415f.exe -
Executes dropped EXE 1 IoCs
pid Process 3852 360Setup.exe -
resource yara_rule behavioral2/memory/1944-137-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/files/0x0003000000022de7-139.dat upx behavioral2/files/0x0003000000022de7-140.dat upx behavioral2/memory/1944-144-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/3852-146-0x0000000000400000-0x000000000040C000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 73f33614742a79bd70ec6b3bbf7a2def17b95ea7b88d399a1db31d95125e415f.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\360Setup.exe 73f33614742a79bd70ec6b3bbf7a2def17b95ea7b88d399a1db31d95125e415f.exe File opened for modification C:\Windows\SysWOW64\RsTray.exe 73f33614742a79bd70ec6b3bbf7a2def17b95ea7b88d399a1db31d95125e415f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 73f33614742a79bd70ec6b3bbf7a2def17b95ea7b88d399a1db31d95125e415f.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1944 73f33614742a79bd70ec6b3bbf7a2def17b95ea7b88d399a1db31d95125e415f.exe 3852 360Setup.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1944 wrote to memory of 3852 1944 73f33614742a79bd70ec6b3bbf7a2def17b95ea7b88d399a1db31d95125e415f.exe 84 PID 1944 wrote to memory of 3852 1944 73f33614742a79bd70ec6b3bbf7a2def17b95ea7b88d399a1db31d95125e415f.exe 84 PID 1944 wrote to memory of 3852 1944 73f33614742a79bd70ec6b3bbf7a2def17b95ea7b88d399a1db31d95125e415f.exe 84 PID 1944 wrote to memory of 3436 1944 73f33614742a79bd70ec6b3bbf7a2def17b95ea7b88d399a1db31d95125e415f.exe 85 PID 1944 wrote to memory of 3436 1944 73f33614742a79bd70ec6b3bbf7a2def17b95ea7b88d399a1db31d95125e415f.exe 85 PID 1944 wrote to memory of 3436 1944 73f33614742a79bd70ec6b3bbf7a2def17b95ea7b88d399a1db31d95125e415f.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\73f33614742a79bd70ec6b3bbf7a2def17b95ea7b88d399a1db31d95125e415f.exe"C:\Users\Admin\AppData\Local\Temp\73f33614742a79bd70ec6b3bbf7a2def17b95ea7b88d399a1db31d95125e415f.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\360Setup.exe"C:\Windows\system32\360Setup.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3852
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templateskill.bat""2⤵PID:3436
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254B
MD5e0586ac964c82e2bed78ca641339f48e
SHA1a3969150f8270bb0fa22ffb8e56b4225d19e94ea
SHA2563314560ce8d947691b7c8185fa47a2d92414f815b7111d5745ab7f589097ab8a
SHA512d79d02f14ecaf754cb70808a9913b7c43738e720949dc9387d7058b415c565c05fea6ef6de41dd74c03d71b27340470a39de303e80457e0594e901821fcdac0a
-
Filesize
10KB
MD5b344a226ff5984ab7b1cbbd6f2cf896c
SHA1b03fc74643a2a92b75a4245d80396909d4a7b97c
SHA256515ee5e36192a8b14af5c2c01226536e8e279de4b70c9ac73ef7827764336f5a
SHA51253ab74b1a0edc9d5b85a12e333f1e8d52a833e9af952804b48101ddeebc5e58bba3a62243bf9ef908104e3e35d69c86cf4e800fab6c1217ede1a75699697531c
-
Filesize
10KB
MD5b344a226ff5984ab7b1cbbd6f2cf896c
SHA1b03fc74643a2a92b75a4245d80396909d4a7b97c
SHA256515ee5e36192a8b14af5c2c01226536e8e279de4b70c9ac73ef7827764336f5a
SHA51253ab74b1a0edc9d5b85a12e333f1e8d52a833e9af952804b48101ddeebc5e58bba3a62243bf9ef908104e3e35d69c86cf4e800fab6c1217ede1a75699697531c