Analysis
-
max time kernel
44s -
max time network
23s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2022 00:51
Static task
static1
Behavioral task
behavioral1
Sample
59039905536ca8187e52bf5af1513f6ab2e9d81d6a4cbd79cacbbf66df8b8ec4.exe
Resource
win10v2004-20220812-en
General
-
Target
59039905536ca8187e52bf5af1513f6ab2e9d81d6a4cbd79cacbbf66df8b8ec4.exe
-
Size
713KB
-
MD5
54348d676b3cab51ce480e17352d400b
-
SHA1
517b4bb2c0c1e0b27c6b4d44d0f498f41413a0b1
-
SHA256
59039905536ca8187e52bf5af1513f6ab2e9d81d6a4cbd79cacbbf66df8b8ec4
-
SHA512
c3a47105a1e8cc5d6ebf77586a85b27573196e4365166cc58f8e4836085fa7d691868eac6895c0abfaac9edcf44f505a01fe0d0705f3bfe5fe436b9339a1b073
-
SSDEEP
12288:TMz2iNP4pXB2KyVzKuFlHk/mzlMIXPu+vTUjxEdyD+L:k1WpXByPk+zaIfuKH
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 59039905536ca8187e52bf5af1513f6ab2e9d81d6a4cbd79cacbbf66df8b8ec4.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 59039905536ca8187e52bf5af1513f6ab2e9d81d6a4cbd79cacbbf66df8b8ec4.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Security Health Start = "\"C:\\Windows\\Windows Secure Start\\Microsoft Security Start.exe\"" 59039905536ca8187e52bf5af1513f6ab2e9d81d6a4cbd79cacbbf66df8b8ec4.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4516 set thread context of 3080 4516 59039905536ca8187e52bf5af1513f6ab2e9d81d6a4cbd79cacbbf66df8b8ec4.exe 88 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Windows Secure Start\Microsoft Security Start.exe 59039905536ca8187e52bf5af1513f6ab2e9d81d6a4cbd79cacbbf66df8b8ec4.exe File opened for modification C:\Windows\Windows Secure Start\Microsoft Security Start.exe 59039905536ca8187e52bf5af1513f6ab2e9d81d6a4cbd79cacbbf66df8b8ec4.exe File opened for modification C:\Windows\Windows Secure Start 59039905536ca8187e52bf5af1513f6ab2e9d81d6a4cbd79cacbbf66df8b8ec4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 1 IoCs
pid Process 3516 reg.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2108 PING.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4516 wrote to memory of 3080 4516 59039905536ca8187e52bf5af1513f6ab2e9d81d6a4cbd79cacbbf66df8b8ec4.exe 88 PID 4516 wrote to memory of 3080 4516 59039905536ca8187e52bf5af1513f6ab2e9d81d6a4cbd79cacbbf66df8b8ec4.exe 88 PID 4516 wrote to memory of 3080 4516 59039905536ca8187e52bf5af1513f6ab2e9d81d6a4cbd79cacbbf66df8b8ec4.exe 88 PID 4516 wrote to memory of 3080 4516 59039905536ca8187e52bf5af1513f6ab2e9d81d6a4cbd79cacbbf66df8b8ec4.exe 88 PID 4516 wrote to memory of 3080 4516 59039905536ca8187e52bf5af1513f6ab2e9d81d6a4cbd79cacbbf66df8b8ec4.exe 88 PID 4516 wrote to memory of 3080 4516 59039905536ca8187e52bf5af1513f6ab2e9d81d6a4cbd79cacbbf66df8b8ec4.exe 88 PID 4516 wrote to memory of 3080 4516 59039905536ca8187e52bf5af1513f6ab2e9d81d6a4cbd79cacbbf66df8b8ec4.exe 88 PID 4516 wrote to memory of 3080 4516 59039905536ca8187e52bf5af1513f6ab2e9d81d6a4cbd79cacbbf66df8b8ec4.exe 88 PID 4516 wrote to memory of 3080 4516 59039905536ca8187e52bf5af1513f6ab2e9d81d6a4cbd79cacbbf66df8b8ec4.exe 88 PID 3080 wrote to memory of 3620 3080 59039905536ca8187e52bf5af1513f6ab2e9d81d6a4cbd79cacbbf66df8b8ec4.exe 91 PID 3080 wrote to memory of 3620 3080 59039905536ca8187e52bf5af1513f6ab2e9d81d6a4cbd79cacbbf66df8b8ec4.exe 91 PID 3080 wrote to memory of 3620 3080 59039905536ca8187e52bf5af1513f6ab2e9d81d6a4cbd79cacbbf66df8b8ec4.exe 91 PID 3620 wrote to memory of 3516 3620 cmd.exe 90 PID 3620 wrote to memory of 3516 3620 cmd.exe 90 PID 3620 wrote to memory of 3516 3620 cmd.exe 90 PID 3080 wrote to memory of 3476 3080 59039905536ca8187e52bf5af1513f6ab2e9d81d6a4cbd79cacbbf66df8b8ec4.exe 94 PID 3080 wrote to memory of 3476 3080 59039905536ca8187e52bf5af1513f6ab2e9d81d6a4cbd79cacbbf66df8b8ec4.exe 94 PID 3080 wrote to memory of 3476 3080 59039905536ca8187e52bf5af1513f6ab2e9d81d6a4cbd79cacbbf66df8b8ec4.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\59039905536ca8187e52bf5af1513f6ab2e9d81d6a4cbd79cacbbf66df8b8ec4.exe"C:\Users\Admin\AppData\Local\Temp\59039905536ca8187e52bf5af1513f6ab2e9d81d6a4cbd79cacbbf66df8b8ec4.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\59039905536ca8187e52bf5af1513f6ab2e9d81d6a4cbd79cacbbf66df8b8ec4.exe"C:\Users\Admin\AppData\Local\Temp\59039905536ca8187e52bf5af1513f6ab2e9d81d6a4cbd79cacbbf66df8b8ec4.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- Suspicious use of WriteProcessMemory
PID:3620
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\install.bat" "3⤵PID:3476
-
C:\Windows\Windows Secure Start\Microsoft Security Start.exe"C:\Windows\Windows Secure Start\Microsoft Security Start.exe"4⤵PID:4700
-
-
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f1⤵
- UAC bypass
- Modifies registry key
PID:3516
-
C:\Windows\SysWOW64\PING.EXEPING 127.0.0.1 -n 21⤵
- Runs ping.exe
PID:2108