Analysis

  • max time kernel
    143s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2022, 19:38

General

  • Target

    a1e20688649e1b1d49068b21f48f1211f52dbd9dd7521448007e987fd0a00cd5.exe

  • Size

    139KB

  • MD5

    3610a5bda1252fe9c903ee7f7ee22186

  • SHA1

    74a0f46196105eb83d18e2114feaddf92bc6db3b

  • SHA256

    a1e20688649e1b1d49068b21f48f1211f52dbd9dd7521448007e987fd0a00cd5

  • SHA512

    5d0d2207b5cfadc7e7015f433902e18f996814d8e7d4e897c484d30364ca65d448e2da7ec1a1d2915a0fc8cb79da2f31948c5e19a682f50cecbd95f81ee1ed28

  • SSDEEP

    3072:77gWthcA+lmZUvX2O95Rs3Tdliod1/4MBb2YYiZqTkBqP9l:7MKuAtZUvX20i3Tdl7n/4MF2YLcT8qPv

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Modifies WinLogon 2 TTPs 13 IoCs
  • Drops file in System32 directory 5 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a1e20688649e1b1d49068b21f48f1211f52dbd9dd7521448007e987fd0a00cd5.exe
    "C:\Users\Admin\AppData\Local\Temp\a1e20688649e1b1d49068b21f48f1211f52dbd9dd7521448007e987fd0a00cd5.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Modifies WinLogon
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3140
    • C:\Windows\SysWOW64\win1ogon.exe
      "C:\Windows\system32\win1ogon.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      PID:4632

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\win1ogon.exe

    Filesize

    75KB

    MD5

    ddf15a0f75e1b0d4e85c1c446e55a0da

    SHA1

    a8201abaf41be7688e44ff93ab9a5928deffc112

    SHA256

    9c66aaa68ef8738a0cf1f5022f9cfadef248ca52c03e07927132848987e3ce61

    SHA512

    0b33e4b308e92cb581b739ceeea761477bb034cd52e4b41bd8aba43812ea76c1a142778f3b3b1f4c5aca8b7af62c73181e1f98e125a63fe12a3f1fd58087f878

  • C:\Windows\SysWOW64\win1ogon.exe

    Filesize

    75KB

    MD5

    ddf15a0f75e1b0d4e85c1c446e55a0da

    SHA1

    a8201abaf41be7688e44ff93ab9a5928deffc112

    SHA256

    9c66aaa68ef8738a0cf1f5022f9cfadef248ca52c03e07927132848987e3ce61

    SHA512

    0b33e4b308e92cb581b739ceeea761477bb034cd52e4b41bd8aba43812ea76c1a142778f3b3b1f4c5aca8b7af62c73181e1f98e125a63fe12a3f1fd58087f878