Analysis
-
max time kernel
178s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2022 23:07
Static task
static1
Behavioral task
behavioral1
Sample
017e5cc2f5d277a9949bfd5fd33cf859036f1de49c965b75b4761ba50a2b85dc.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
017e5cc2f5d277a9949bfd5fd33cf859036f1de49c965b75b4761ba50a2b85dc.exe
Resource
win10v2004-20220812-en
General
-
Target
017e5cc2f5d277a9949bfd5fd33cf859036f1de49c965b75b4761ba50a2b85dc.exe
-
Size
56KB
-
MD5
03537c8c6a2fe409887fae7425232540
-
SHA1
608a1243f9f0ae11a3107f44321cd05da9a38f61
-
SHA256
017e5cc2f5d277a9949bfd5fd33cf859036f1de49c965b75b4761ba50a2b85dc
-
SHA512
48671da9c4de610864fc6a6f3f81ae8eae183da449dc6a44d79e99a82f17e10d9fb08454cb3d947ebb85e0e531c03319d27a8b8d54ee2587e62f86b09d721105
-
SSDEEP
768:jjIAHrJH5MTDUb0rc2O1Dmnag0xc1ChTsDoCoJOe2atoLQzJ4:Qyp6Dlrc2omN061ChTsDXe2aEQz
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5028 scrss.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 4524 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 017e5cc2f5d277a9949bfd5fd33cf859036f1de49c965b75b4761ba50a2b85dc.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8c0a103b3db203be4aa4019bc5c6f51b.exe scrss.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8c0a103b3db203be4aa4019bc5c6f51b.exe scrss.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\8c0a103b3db203be4aa4019bc5c6f51b = "\"C:\\Users\\Admin\\scrss.exe\" .." scrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\8c0a103b3db203be4aa4019bc5c6f51b = "\"C:\\Users\\Admin\\scrss.exe\" .." scrss.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 5028 scrss.exe 5028 scrss.exe 5028 scrss.exe 5028 scrss.exe 5028 scrss.exe 5028 scrss.exe 5028 scrss.exe 5028 scrss.exe 5028 scrss.exe 5028 scrss.exe 5028 scrss.exe 5028 scrss.exe 5028 scrss.exe 5028 scrss.exe 5028 scrss.exe 5028 scrss.exe 5028 scrss.exe 5028 scrss.exe 5028 scrss.exe 5028 scrss.exe 5028 scrss.exe 5028 scrss.exe 5028 scrss.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5028 scrss.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4224 wrote to memory of 5028 4224 017e5cc2f5d277a9949bfd5fd33cf859036f1de49c965b75b4761ba50a2b85dc.exe 81 PID 4224 wrote to memory of 5028 4224 017e5cc2f5d277a9949bfd5fd33cf859036f1de49c965b75b4761ba50a2b85dc.exe 81 PID 4224 wrote to memory of 5028 4224 017e5cc2f5d277a9949bfd5fd33cf859036f1de49c965b75b4761ba50a2b85dc.exe 81 PID 5028 wrote to memory of 4524 5028 scrss.exe 82 PID 5028 wrote to memory of 4524 5028 scrss.exe 82 PID 5028 wrote to memory of 4524 5028 scrss.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\017e5cc2f5d277a9949bfd5fd33cf859036f1de49c965b75b4761ba50a2b85dc.exe"C:\Users\Admin\AppData\Local\Temp\017e5cc2f5d277a9949bfd5fd33cf859036f1de49c965b75b4761ba50a2b85dc.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Users\Admin\scrss.exe"C:\Users\Admin\scrss.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\scrss.exe" "scrss.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:4524
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD503537c8c6a2fe409887fae7425232540
SHA1608a1243f9f0ae11a3107f44321cd05da9a38f61
SHA256017e5cc2f5d277a9949bfd5fd33cf859036f1de49c965b75b4761ba50a2b85dc
SHA51248671da9c4de610864fc6a6f3f81ae8eae183da449dc6a44d79e99a82f17e10d9fb08454cb3d947ebb85e0e531c03319d27a8b8d54ee2587e62f86b09d721105
-
Filesize
56KB
MD503537c8c6a2fe409887fae7425232540
SHA1608a1243f9f0ae11a3107f44321cd05da9a38f61
SHA256017e5cc2f5d277a9949bfd5fd33cf859036f1de49c965b75b4761ba50a2b85dc
SHA51248671da9c4de610864fc6a6f3f81ae8eae183da449dc6a44d79e99a82f17e10d9fb08454cb3d947ebb85e0e531c03319d27a8b8d54ee2587e62f86b09d721105