Analysis
-
max time kernel
82s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2022 13:14
Static task
static1
Behavioral task
behavioral1
Sample
5654babea8cf2c856f3a9d80df0d870f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5654babea8cf2c856f3a9d80df0d870f.exe
Resource
win10v2004-20220812-en
General
-
Target
5654babea8cf2c856f3a9d80df0d870f.exe
-
Size
7KB
-
MD5
5654babea8cf2c856f3a9d80df0d870f
-
SHA1
d1616e178c28047cda740ed548fef1ea32b706ca
-
SHA256
ae97f685de90bcfe19c397b32d12d1bca259d7465f3870083a914474efb58e34
-
SHA512
03377da27ebad86d77b546af9775bba51d170b7f0b9533b54ecac68c053e6790f15e276a15c4491fc8f162ac2275e633bf8f471244226e40a5dd523304cab863
-
SSDEEP
96:J6Zf7h++B3Evve6LYX48IhlPVsfVRu+JqojYVhqTzNt:esG6LYX45hMf6+U5Vo1
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
5654babea8cf2c856f3a9d80df0d870f.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 5654babea8cf2c856f3a9d80df0d870f.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
5654babea8cf2c856f3a9d80df0d870f.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Jgwwt = "\"C:\\Users\\Admin\\AppData\\Roaming\\Matsaiv\\Jgwwt.exe\"" 5654babea8cf2c856f3a9d80df0d870f.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
5654babea8cf2c856f3a9d80df0d870f.exedescription pid process target process PID 3516 set thread context of 1856 3516 5654babea8cf2c856f3a9d80df0d870f.exe 5654babea8cf2c856f3a9d80df0d870f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
powershell.exe5654babea8cf2c856f3a9d80df0d870f.exepid process 4100 powershell.exe 4100 powershell.exe 3516 5654babea8cf2c856f3a9d80df0d870f.exe 3516 5654babea8cf2c856f3a9d80df0d870f.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
5654babea8cf2c856f3a9d80df0d870f.exepowershell.exe5654babea8cf2c856f3a9d80df0d870f.exedescription pid process Token: SeDebugPrivilege 3516 5654babea8cf2c856f3a9d80df0d870f.exe Token: SeDebugPrivilege 4100 powershell.exe Token: SeDebugPrivilege 1856 5654babea8cf2c856f3a9d80df0d870f.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
5654babea8cf2c856f3a9d80df0d870f.exedescription pid process target process PID 3516 wrote to memory of 4100 3516 5654babea8cf2c856f3a9d80df0d870f.exe powershell.exe PID 3516 wrote to memory of 4100 3516 5654babea8cf2c856f3a9d80df0d870f.exe powershell.exe PID 3516 wrote to memory of 4100 3516 5654babea8cf2c856f3a9d80df0d870f.exe powershell.exe PID 3516 wrote to memory of 1928 3516 5654babea8cf2c856f3a9d80df0d870f.exe 5654babea8cf2c856f3a9d80df0d870f.exe PID 3516 wrote to memory of 1928 3516 5654babea8cf2c856f3a9d80df0d870f.exe 5654babea8cf2c856f3a9d80df0d870f.exe PID 3516 wrote to memory of 1928 3516 5654babea8cf2c856f3a9d80df0d870f.exe 5654babea8cf2c856f3a9d80df0d870f.exe PID 3516 wrote to memory of 1856 3516 5654babea8cf2c856f3a9d80df0d870f.exe 5654babea8cf2c856f3a9d80df0d870f.exe PID 3516 wrote to memory of 1856 3516 5654babea8cf2c856f3a9d80df0d870f.exe 5654babea8cf2c856f3a9d80df0d870f.exe PID 3516 wrote to memory of 1856 3516 5654babea8cf2c856f3a9d80df0d870f.exe 5654babea8cf2c856f3a9d80df0d870f.exe PID 3516 wrote to memory of 1856 3516 5654babea8cf2c856f3a9d80df0d870f.exe 5654babea8cf2c856f3a9d80df0d870f.exe PID 3516 wrote to memory of 1856 3516 5654babea8cf2c856f3a9d80df0d870f.exe 5654babea8cf2c856f3a9d80df0d870f.exe PID 3516 wrote to memory of 1856 3516 5654babea8cf2c856f3a9d80df0d870f.exe 5654babea8cf2c856f3a9d80df0d870f.exe PID 3516 wrote to memory of 1856 3516 5654babea8cf2c856f3a9d80df0d870f.exe 5654babea8cf2c856f3a9d80df0d870f.exe PID 3516 wrote to memory of 1856 3516 5654babea8cf2c856f3a9d80df0d870f.exe 5654babea8cf2c856f3a9d80df0d870f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5654babea8cf2c856f3a9d80df0d870f.exe"C:\Users\Admin\AppData\Local\Temp\5654babea8cf2c856f3a9d80df0d870f.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANQAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4100 -
C:\Users\Admin\AppData\Local\Temp\5654babea8cf2c856f3a9d80df0d870f.exeC:\Users\Admin\AppData\Local\Temp\5654babea8cf2c856f3a9d80df0d870f.exe2⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\5654babea8cf2c856f3a9d80df0d870f.exeC:\Users\Admin\AppData\Local\Temp\5654babea8cf2c856f3a9d80df0d870f.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1856
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\5654babea8cf2c856f3a9d80df0d870f.exe.log
Filesize1KB
MD5e87e48b105757e1c7563d1c719059733
SHA128a3f2b2e0672da2b531f4757d2b20b53032dafc
SHA2560aaf22dc84cc3fcfe53de7ccfed8e662247dfb7f1a9967032c88790d0c663461
SHA512bf19c5743143aee914a453c41189c722c9b90a5b8bf299cecf3e1f97656d32cd209ecb74da8aebc89bb41c27d189f73aaaabbc64fe383410c95dc76ad4218968