Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2022 10:28
Static task
static1
Behavioral task
behavioral1
Sample
23c0dc2bc05fea98d53a8abcece52f88d95273e068e733dc5a38cce47a8a4c1e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
23c0dc2bc05fea98d53a8abcece52f88d95273e068e733dc5a38cce47a8a4c1e.exe
Resource
win10v2004-20220812-en
General
-
Target
23c0dc2bc05fea98d53a8abcece52f88d95273e068e733dc5a38cce47a8a4c1e.exe
-
Size
212KB
-
MD5
4c378acf5c11a25c7c3377ada09fb2ac
-
SHA1
842ab9bf9337e45a626e89674ee35602f7c063a1
-
SHA256
23c0dc2bc05fea98d53a8abcece52f88d95273e068e733dc5a38cce47a8a4c1e
-
SHA512
c65b7eeb0c318e73ec0af83bfee6fb7be4c9115b739230417aec55e4a1cd4bd4dccb24790e8e6bfe4dda0de05d3235387380fdde71ddc1a8137370938a538f34
-
SSDEEP
1536:wodH3UyOEGYf+u2wW4cd9Lv2PElgW7NoN274B/K51UtaHElfTczpqVar1/AgAIS:jUxS+Dzp+GNoN2I0jASrB
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 23c0dc2bc05fea98d53a8abcece52f88d95273e068e733dc5a38cce47a8a4c1e.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" pimam.exe -
Executes dropped EXE 1 IoCs
pid Process 2328 pimam.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 23c0dc2bc05fea98d53a8abcece52f88d95273e068e733dc5a38cce47a8a4c1e.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimam = "C:\\Users\\Admin\\pimam.exe /m" pimam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimam = "C:\\Users\\Admin\\pimam.exe /l" pimam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimam = "C:\\Users\\Admin\\pimam.exe /a" pimam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimam = "C:\\Users\\Admin\\pimam.exe /p" pimam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimam = "C:\\Users\\Admin\\pimam.exe /u" pimam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimam = "C:\\Users\\Admin\\pimam.exe /b" pimam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimam = "C:\\Users\\Admin\\pimam.exe /e" pimam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimam = "C:\\Users\\Admin\\pimam.exe /i" pimam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimam = "C:\\Users\\Admin\\pimam.exe /h" pimam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimam = "C:\\Users\\Admin\\pimam.exe /q" 23c0dc2bc05fea98d53a8abcece52f88d95273e068e733dc5a38cce47a8a4c1e.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimam = "C:\\Users\\Admin\\pimam.exe /c" pimam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimam = "C:\\Users\\Admin\\pimam.exe /s" pimam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimam = "C:\\Users\\Admin\\pimam.exe /g" pimam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimam = "C:\\Users\\Admin\\pimam.exe /z" pimam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimam = "C:\\Users\\Admin\\pimam.exe /x" pimam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimam = "C:\\Users\\Admin\\pimam.exe /q" pimam.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 23c0dc2bc05fea98d53a8abcece52f88d95273e068e733dc5a38cce47a8a4c1e.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimam = "C:\\Users\\Admin\\pimam.exe /y" pimam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimam = "C:\\Users\\Admin\\pimam.exe /k" pimam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimam = "C:\\Users\\Admin\\pimam.exe /t" pimam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimam = "C:\\Users\\Admin\\pimam.exe /d" pimam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimam = "C:\\Users\\Admin\\pimam.exe /w" pimam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimam = "C:\\Users\\Admin\\pimam.exe /j" pimam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimam = "C:\\Users\\Admin\\pimam.exe /r" pimam.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ pimam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimam = "C:\\Users\\Admin\\pimam.exe /n" pimam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimam = "C:\\Users\\Admin\\pimam.exe /v" pimam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimam = "C:\\Users\\Admin\\pimam.exe /f" pimam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pimam = "C:\\Users\\Admin\\pimam.exe /o" pimam.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2164 23c0dc2bc05fea98d53a8abcece52f88d95273e068e733dc5a38cce47a8a4c1e.exe 2164 23c0dc2bc05fea98d53a8abcece52f88d95273e068e733dc5a38cce47a8a4c1e.exe 2328 pimam.exe 2328 pimam.exe 2328 pimam.exe 2328 pimam.exe 2328 pimam.exe 2328 pimam.exe 2328 pimam.exe 2328 pimam.exe 2328 pimam.exe 2328 pimam.exe 2328 pimam.exe 2328 pimam.exe 2328 pimam.exe 2328 pimam.exe 2328 pimam.exe 2328 pimam.exe 2328 pimam.exe 2328 pimam.exe 2328 pimam.exe 2328 pimam.exe 2328 pimam.exe 2328 pimam.exe 2328 pimam.exe 2328 pimam.exe 2328 pimam.exe 2328 pimam.exe 2328 pimam.exe 2328 pimam.exe 2328 pimam.exe 2328 pimam.exe 2328 pimam.exe 2328 pimam.exe 2328 pimam.exe 2328 pimam.exe 2328 pimam.exe 2328 pimam.exe 2328 pimam.exe 2328 pimam.exe 2328 pimam.exe 2328 pimam.exe 2328 pimam.exe 2328 pimam.exe 2328 pimam.exe 2328 pimam.exe 2328 pimam.exe 2328 pimam.exe 2328 pimam.exe 2328 pimam.exe 2328 pimam.exe 2328 pimam.exe 2328 pimam.exe 2328 pimam.exe 2328 pimam.exe 2328 pimam.exe 2328 pimam.exe 2328 pimam.exe 2328 pimam.exe 2328 pimam.exe 2328 pimam.exe 2328 pimam.exe 2328 pimam.exe 2328 pimam.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2164 23c0dc2bc05fea98d53a8abcece52f88d95273e068e733dc5a38cce47a8a4c1e.exe 2328 pimam.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2328 2164 23c0dc2bc05fea98d53a8abcece52f88d95273e068e733dc5a38cce47a8a4c1e.exe 80 PID 2164 wrote to memory of 2328 2164 23c0dc2bc05fea98d53a8abcece52f88d95273e068e733dc5a38cce47a8a4c1e.exe 80 PID 2164 wrote to memory of 2328 2164 23c0dc2bc05fea98d53a8abcece52f88d95273e068e733dc5a38cce47a8a4c1e.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\23c0dc2bc05fea98d53a8abcece52f88d95273e068e733dc5a38cce47a8a4c1e.exe"C:\Users\Admin\AppData\Local\Temp\23c0dc2bc05fea98d53a8abcece52f88d95273e068e733dc5a38cce47a8a4c1e.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Users\Admin\pimam.exe"C:\Users\Admin\pimam.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2328
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212KB
MD56192f001ee27060f694e62517ebfb06a
SHA15b60f5d13a10bbc235caa7d6827b90f3afefd92e
SHA256798157b394c843264734db628cd8e775d8aaab7704746b9777059ffa92dcce6e
SHA51261a5af54838f63752829f0af34aaf48d5dec95dc3af40a3d1aa7961b3cd2f4f5f1383f524418804f1034b9ddf1ba8c8fee48ce2ade21e6afce3d1e1f24fca718
-
Filesize
212KB
MD56192f001ee27060f694e62517ebfb06a
SHA15b60f5d13a10bbc235caa7d6827b90f3afefd92e
SHA256798157b394c843264734db628cd8e775d8aaab7704746b9777059ffa92dcce6e
SHA51261a5af54838f63752829f0af34aaf48d5dec95dc3af40a3d1aa7961b3cd2f4f5f1383f524418804f1034b9ddf1ba8c8fee48ce2ade21e6afce3d1e1f24fca718