Analysis
-
max time kernel
148s -
max time network
185s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2022, 04:00
Static task
static1
Behavioral task
behavioral1
Sample
5980a7857bf1148e922bf42a09bdc511584ed4a15416781269baf483ffc33096.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
5980a7857bf1148e922bf42a09bdc511584ed4a15416781269baf483ffc33096.exe
Resource
win10v2004-20220812-en
General
-
Target
5980a7857bf1148e922bf42a09bdc511584ed4a15416781269baf483ffc33096.exe
-
Size
286KB
-
MD5
9dadfc53bb6a731f4addecf7fe33897e
-
SHA1
cf05bc7ad0a13baf3890b19a9afbafc7cb0ac193
-
SHA256
5980a7857bf1148e922bf42a09bdc511584ed4a15416781269baf483ffc33096
-
SHA512
fffa823c000a2a0332981426b9978865aa41b3ebfa0902af971e935840297ef33a2a049b02f5234f564ca6d3a7ed9d6d6a419a309b8bd731ee5edc4163c45b28
-
SSDEEP
6144:XwaPq72adX5H9+nvDHzAV+VoT2de+QUAAL3cj539:Xwaa2epwvDHzOx4VB3YB9
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 728 Server_Setup.exe 1752 Hacker.com.cn.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 5980a7857bf1148e922bf42a09bdc511584ed4a15416781269baf483ffc33096.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\program files\common files\microsoft shared\msinfo\Server_Setup.jpg 5980a7857bf1148e922bf42a09bdc511584ed4a15416781269baf483ffc33096.exe File opened for modification C:\program files\common files\microsoft shared\msinfo\Server_Setup.exe Server_Setup.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\Hacker.com.cn.exe Server_Setup.exe File created C:\Windows\uninstal.bat Server_Setup.exe File created C:\Windows\Hacker.com.cn.exe Server_Setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 728 Server_Setup.exe Token: SeDebugPrivilege 1752 Hacker.com.cn.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1752 Hacker.com.cn.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4896 wrote to memory of 728 4896 5980a7857bf1148e922bf42a09bdc511584ed4a15416781269baf483ffc33096.exe 78 PID 4896 wrote to memory of 728 4896 5980a7857bf1148e922bf42a09bdc511584ed4a15416781269baf483ffc33096.exe 78 PID 4896 wrote to memory of 728 4896 5980a7857bf1148e922bf42a09bdc511584ed4a15416781269baf483ffc33096.exe 78 PID 1752 wrote to memory of 260 1752 Hacker.com.cn.exe 80 PID 1752 wrote to memory of 260 1752 Hacker.com.cn.exe 80 PID 728 wrote to memory of 4040 728 Server_Setup.exe 81 PID 728 wrote to memory of 4040 728 Server_Setup.exe 81 PID 728 wrote to memory of 4040 728 Server_Setup.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\5980a7857bf1148e922bf42a09bdc511584ed4a15416781269baf483ffc33096.exe"C:\Users\Admin\AppData\Local\Temp\5980a7857bf1148e922bf42a09bdc511584ed4a15416781269baf483ffc33096.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\program files\common files\microsoft shared\msinfo\Server_Setup.exe"C:\program files\common files\microsoft shared\msinfo\Server_Setup.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:728 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\uninstal.bat3⤵PID:4040
-
-
-
C:\Windows\Hacker.com.cn.exeC:\Windows\Hacker.com.cn.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:260
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
270KB
MD5282728e8cf879da1166c69804848fde4
SHA11106f1958cbf6ef9afa62490eb2ff27a774598a2
SHA2565cb27cad28849469ba50b8c62917c561f5dd5862e3aaef7cc1a23beb819b57db
SHA51268ca7afcbaae18a5af5a3e9b87b87eabe3c5f6ec97df427e048ea7b27117c3bc24d5b676d532616d0d046c705702f8776acb4118616598501fe452d70f1b29fa
-
Filesize
270KB
MD5282728e8cf879da1166c69804848fde4
SHA11106f1958cbf6ef9afa62490eb2ff27a774598a2
SHA2565cb27cad28849469ba50b8c62917c561f5dd5862e3aaef7cc1a23beb819b57db
SHA51268ca7afcbaae18a5af5a3e9b87b87eabe3c5f6ec97df427e048ea7b27117c3bc24d5b676d532616d0d046c705702f8776acb4118616598501fe452d70f1b29fa
-
Filesize
270KB
MD5282728e8cf879da1166c69804848fde4
SHA11106f1958cbf6ef9afa62490eb2ff27a774598a2
SHA2565cb27cad28849469ba50b8c62917c561f5dd5862e3aaef7cc1a23beb819b57db
SHA51268ca7afcbaae18a5af5a3e9b87b87eabe3c5f6ec97df427e048ea7b27117c3bc24d5b676d532616d0d046c705702f8776acb4118616598501fe452d70f1b29fa
-
Filesize
190B
MD5748359b8db32273bc6f3f4b050b8b86b
SHA1f30e73e970b4277fb39004b3b5833a79e6f4762d
SHA256bd92c1a1c66403d13d1da9143ce6d7db2a4dcbdee6bd58899174406407f7b803
SHA512e02ecbb038f1ff075201d551eddb74252b7fa4582b0c10cfdaedf3845e1997bf9e2cb8d2b8a55318fb9072d7b777cf53d9df348dec467160a9e8b7a794b4556d
-
Filesize
270KB
MD5282728e8cf879da1166c69804848fde4
SHA11106f1958cbf6ef9afa62490eb2ff27a774598a2
SHA2565cb27cad28849469ba50b8c62917c561f5dd5862e3aaef7cc1a23beb819b57db
SHA51268ca7afcbaae18a5af5a3e9b87b87eabe3c5f6ec97df427e048ea7b27117c3bc24d5b676d532616d0d046c705702f8776acb4118616598501fe452d70f1b29fa