Analysis
-
max time kernel
164s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2022 10:14
Static task
static1
Behavioral task
behavioral1
Sample
e8158445103eee8f4fdbd5133ce1a59076f82ecb2f9fadc7a02c4cc958a205bc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e8158445103eee8f4fdbd5133ce1a59076f82ecb2f9fadc7a02c4cc958a205bc.exe
Resource
win10v2004-20220812-en
General
-
Target
e8158445103eee8f4fdbd5133ce1a59076f82ecb2f9fadc7a02c4cc958a205bc.exe
-
Size
17KB
-
MD5
70bc7465bca83546f84e42f9b6609fe0
-
SHA1
7d29645c17348a14c2b4367b375b61a29e25e52a
-
SHA256
e8158445103eee8f4fdbd5133ce1a59076f82ecb2f9fadc7a02c4cc958a205bc
-
SHA512
be34ef94796a2e1eef27ba48af40790f73d58aa999ed4a986f961ec7dad403593e25a31639e12b726b59bfdc100838e6cc73e7ca09972f9e3db0f8555e941213
-
SSDEEP
384:224bhc6Q1NFMJ70QHgZlOADKni0nhftDZnxRq4BUC2UVQu:llLF070Q8IniQlDRzq6UC2Vu
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\explorer\run ishost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\ishost.exe = "ishost.exe" ishost.exe -
Executes dropped EXE 2 IoCs
pid Process 3324 ishost.exe 5044 ismini.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation e8158445103eee8f4fdbd5133ce1a59076f82ecb2f9fadc7a02c4cc958a205bc.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\ishost.exe e8158445103eee8f4fdbd5133ce1a59076f82ecb2f9fadc7a02c4cc958a205bc.exe File opened for modification C:\Windows\SysWOW64\ishost.exe e8158445103eee8f4fdbd5133ce1a59076f82ecb2f9fadc7a02c4cc958a205bc.exe File created C:\Windows\SysWOW64\ismini.exe ishost.exe File created C:\Windows\SysWOW64\components\flx0.dll ishost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1968 e8158445103eee8f4fdbd5133ce1a59076f82ecb2f9fadc7a02c4cc958a205bc.exe 1968 e8158445103eee8f4fdbd5133ce1a59076f82ecb2f9fadc7a02c4cc958a205bc.exe 3324 ishost.exe 3324 ishost.exe 3324 ishost.exe 3324 ishost.exe 5044 ismini.exe 5044 ismini.exe 3324 ishost.exe 3324 ishost.exe 5044 ismini.exe 5044 ismini.exe 3324 ishost.exe 3324 ishost.exe 5044 ismini.exe 5044 ismini.exe 3324 ishost.exe 3324 ishost.exe 5044 ismini.exe 5044 ismini.exe 3324 ishost.exe 3324 ishost.exe 3324 ishost.exe 3324 ishost.exe 5044 ismini.exe 5044 ismini.exe 3324 ishost.exe 3324 ishost.exe 5044 ismini.exe 5044 ismini.exe 3324 ishost.exe 3324 ishost.exe 5044 ismini.exe 5044 ismini.exe 3324 ishost.exe 3324 ishost.exe 3324 ishost.exe 3324 ishost.exe 5044 ismini.exe 5044 ismini.exe 3324 ishost.exe 3324 ishost.exe 5044 ismini.exe 5044 ismini.exe 3324 ishost.exe 3324 ishost.exe 5044 ismini.exe 5044 ismini.exe 3324 ishost.exe 3324 ishost.exe 3324 ishost.exe 5044 ismini.exe 5044 ismini.exe 3324 ishost.exe 3324 ishost.exe 3324 ishost.exe 5044 ismini.exe 5044 ismini.exe 3324 ishost.exe 3324 ishost.exe 5044 ismini.exe 5044 ismini.exe 3324 ishost.exe 3324 ishost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1968 e8158445103eee8f4fdbd5133ce1a59076f82ecb2f9fadc7a02c4cc958a205bc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1968 wrote to memory of 3324 1968 e8158445103eee8f4fdbd5133ce1a59076f82ecb2f9fadc7a02c4cc958a205bc.exe 81 PID 1968 wrote to memory of 3324 1968 e8158445103eee8f4fdbd5133ce1a59076f82ecb2f9fadc7a02c4cc958a205bc.exe 81 PID 1968 wrote to memory of 3324 1968 e8158445103eee8f4fdbd5133ce1a59076f82ecb2f9fadc7a02c4cc958a205bc.exe 81 PID 3324 wrote to memory of 5044 3324 ishost.exe 82 PID 3324 wrote to memory of 5044 3324 ishost.exe 82 PID 3324 wrote to memory of 5044 3324 ishost.exe 82 PID 1968 wrote to memory of 2136 1968 e8158445103eee8f4fdbd5133ce1a59076f82ecb2f9fadc7a02c4cc958a205bc.exe 83 PID 1968 wrote to memory of 2136 1968 e8158445103eee8f4fdbd5133ce1a59076f82ecb2f9fadc7a02c4cc958a205bc.exe 83 PID 1968 wrote to memory of 2136 1968 e8158445103eee8f4fdbd5133ce1a59076f82ecb2f9fadc7a02c4cc958a205bc.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8158445103eee8f4fdbd5133ce1a59076f82ecb2f9fadc7a02c4cc958a205bc.exe"C:\Users\Admin\AppData\Local\Temp\e8158445103eee8f4fdbd5133ce1a59076f82ecb2f9fadc7a02c4cc958a205bc.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SysWOW64\ishost.exeC:\Windows\system32\ishost.exe2⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Windows\SysWOW64\ismini.exeC:\Windows\system32\ismini.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:5044
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\E81584~1.EXE > nul2⤵PID:2136
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD50d953795d16d21afbef4eaeeb1e912bc
SHA150ec9290f4e96f1903b03e93dd471538ac0cee48
SHA2567fd7167030f22a725f86f7a382d925ebb00d1281c4499f3e1de58758f8d7aa22
SHA51271d7b0bd69299f5e264afd7110511d133cb56af0cd5dc12939be61dc74591cf367549a2de700a101acddd4f85aad389a5d20180dcb8b5fed129f8dd7bbf8e52b
-
Filesize
33KB
MD50d953795d16d21afbef4eaeeb1e912bc
SHA150ec9290f4e96f1903b03e93dd471538ac0cee48
SHA2567fd7167030f22a725f86f7a382d925ebb00d1281c4499f3e1de58758f8d7aa22
SHA51271d7b0bd69299f5e264afd7110511d133cb56af0cd5dc12939be61dc74591cf367549a2de700a101acddd4f85aad389a5d20180dcb8b5fed129f8dd7bbf8e52b
-
Filesize
4KB
MD51643c0c6446c19b0a4fa925953b23564
SHA1e31991c436cdfca8937ca27c28d9bd9e830aa0bb
SHA256649c2ad2d97bbe4a6017152aa8011673065000a12c2a32ff99b49cd857ae7885
SHA512095da571869d8b85407dbce52ccff05e8dd058d6be8d33b0d0f6c36c7eb80fcfc58d96a749222b8766e84e3b41aeefa8be1c755ff040e79ca7834a3d16003527
-
Filesize
4KB
MD51643c0c6446c19b0a4fa925953b23564
SHA1e31991c436cdfca8937ca27c28d9bd9e830aa0bb
SHA256649c2ad2d97bbe4a6017152aa8011673065000a12c2a32ff99b49cd857ae7885
SHA512095da571869d8b85407dbce52ccff05e8dd058d6be8d33b0d0f6c36c7eb80fcfc58d96a749222b8766e84e3b41aeefa8be1c755ff040e79ca7834a3d16003527