Analysis
-
max time kernel
158s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2022, 19:33
Static task
static1
Behavioral task
behavioral1
Sample
c0b1533f0ba3fd5dd5b7ddf63c61bd090dbd9cd3f9654b994a65b360d3781e7b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c0b1533f0ba3fd5dd5b7ddf63c61bd090dbd9cd3f9654b994a65b360d3781e7b.exe
Resource
win10v2004-20220901-en
General
-
Target
c0b1533f0ba3fd5dd5b7ddf63c61bd090dbd9cd3f9654b994a65b360d3781e7b.exe
-
Size
185KB
-
MD5
723ee30aaf9142c03fd9a6e83b6c0220
-
SHA1
ae70b4bb8c555b263fa037a19661523c105cd2e4
-
SHA256
c0b1533f0ba3fd5dd5b7ddf63c61bd090dbd9cd3f9654b994a65b360d3781e7b
-
SHA512
156fa60452b4e264c3cb717870e216aeb37df96c1a44ac88b4f9dce9d9954ec4a679baa7e06475a54388df8ea2dfff18538b70b88818e4f64ff6794d8a8b771f
-
SSDEEP
3072:CBI5ArKGCnhgU1XA+ArXjeaMoh6lgUaVwQ+/76bSSN+PS7VyoCeJ6ik+0b0UCCV:CK5ArKjbAxXSaegUqGeGpBohMp
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 4768 choikill.exe 4336 disksult.exe 616 ~D1DB.tmp -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation c0b1533f0ba3fd5dd5b7ddf63c61bd090dbd9cd3f9654b994a65b360d3781e7b.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\curlntui = "C:\\Users\\Admin\\AppData\\Roaming\\Launroxy\\choikill.exe" c0b1533f0ba3fd5dd5b7ddf63c61bd090dbd9cd3f9654b994a65b360d3781e7b.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\disksult.exe c0b1533f0ba3fd5dd5b7ddf63c61bd090dbd9cd3f9654b994a65b360d3781e7b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings c0b1533f0ba3fd5dd5b7ddf63c61bd090dbd9cd3f9654b994a65b360d3781e7b.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2988 WINWORD.EXE 2988 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4768 choikill.exe 4768 choikill.exe 2736 Explorer.EXE 2736 Explorer.EXE 4336 disksult.exe 4336 disksult.exe 2736 Explorer.EXE 2736 Explorer.EXE 4336 disksult.exe 4336 disksult.exe 2736 Explorer.EXE 2736 Explorer.EXE 4336 disksult.exe 4336 disksult.exe 2736 Explorer.EXE 2736 Explorer.EXE 4336 disksult.exe 4336 disksult.exe 2736 Explorer.EXE 2736 Explorer.EXE 4336 disksult.exe 4336 disksult.exe 2736 Explorer.EXE 2736 Explorer.EXE 4336 disksult.exe 4336 disksult.exe 2736 Explorer.EXE 2736 Explorer.EXE 4336 disksult.exe 4336 disksult.exe 2736 Explorer.EXE 2736 Explorer.EXE 4336 disksult.exe 4336 disksult.exe 2736 Explorer.EXE 2736 Explorer.EXE 4336 disksult.exe 4336 disksult.exe 2736 Explorer.EXE 2736 Explorer.EXE 4336 disksult.exe 4336 disksult.exe 2736 Explorer.EXE 2736 Explorer.EXE 4336 disksult.exe 4336 disksult.exe 2736 Explorer.EXE 2736 Explorer.EXE 4336 disksult.exe 4336 disksult.exe 2736 Explorer.EXE 2736 Explorer.EXE 4336 disksult.exe 4336 disksult.exe 2736 Explorer.EXE 2736 Explorer.EXE 4336 disksult.exe 4336 disksult.exe 2736 Explorer.EXE 2736 Explorer.EXE 4336 disksult.exe 4336 disksult.exe 2736 Explorer.EXE 2736 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2736 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 32 IoCs
description pid Process Token: SeShutdownPrivilege 2736 Explorer.EXE Token: SeCreatePagefilePrivilege 2736 Explorer.EXE Token: SeShutdownPrivilege 2736 Explorer.EXE Token: SeCreatePagefilePrivilege 2736 Explorer.EXE Token: SeShutdownPrivilege 2736 Explorer.EXE Token: SeCreatePagefilePrivilege 2736 Explorer.EXE Token: SeShutdownPrivilege 2736 Explorer.EXE Token: SeCreatePagefilePrivilege 2736 Explorer.EXE Token: SeShutdownPrivilege 2736 Explorer.EXE Token: SeCreatePagefilePrivilege 2736 Explorer.EXE Token: SeShutdownPrivilege 2736 Explorer.EXE Token: SeCreatePagefilePrivilege 2736 Explorer.EXE Token: SeShutdownPrivilege 2736 Explorer.EXE Token: SeCreatePagefilePrivilege 2736 Explorer.EXE Token: SeShutdownPrivilege 2736 Explorer.EXE Token: SeCreatePagefilePrivilege 2736 Explorer.EXE Token: SeShutdownPrivilege 2736 Explorer.EXE Token: SeCreatePagefilePrivilege 2736 Explorer.EXE Token: SeShutdownPrivilege 2736 Explorer.EXE Token: SeCreatePagefilePrivilege 2736 Explorer.EXE Token: SeShutdownPrivilege 2736 Explorer.EXE Token: SeCreatePagefilePrivilege 2736 Explorer.EXE Token: SeShutdownPrivilege 2736 Explorer.EXE Token: SeCreatePagefilePrivilege 2736 Explorer.EXE Token: SeShutdownPrivilege 2736 Explorer.EXE Token: SeCreatePagefilePrivilege 2736 Explorer.EXE Token: SeShutdownPrivilege 2736 Explorer.EXE Token: SeCreatePagefilePrivilege 2736 Explorer.EXE Token: SeShutdownPrivilege 2736 Explorer.EXE Token: SeCreatePagefilePrivilege 2736 Explorer.EXE Token: SeShutdownPrivilege 2736 Explorer.EXE Token: SeCreatePagefilePrivilege 2736 Explorer.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2736 Explorer.EXE -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 2988 WINWORD.EXE 2988 WINWORD.EXE 2988 WINWORD.EXE 2988 WINWORD.EXE 2988 WINWORD.EXE 2988 WINWORD.EXE 2988 WINWORD.EXE 2988 WINWORD.EXE 2736 Explorer.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 5036 wrote to memory of 4768 5036 c0b1533f0ba3fd5dd5b7ddf63c61bd090dbd9cd3f9654b994a65b360d3781e7b.exe 83 PID 5036 wrote to memory of 4768 5036 c0b1533f0ba3fd5dd5b7ddf63c61bd090dbd9cd3f9654b994a65b360d3781e7b.exe 83 PID 5036 wrote to memory of 4768 5036 c0b1533f0ba3fd5dd5b7ddf63c61bd090dbd9cd3f9654b994a65b360d3781e7b.exe 83 PID 4768 wrote to memory of 616 4768 choikill.exe 84 PID 4768 wrote to memory of 616 4768 choikill.exe 84 PID 616 wrote to memory of 2736 616 ~D1DB.tmp 46 PID 5036 wrote to memory of 2988 5036 c0b1533f0ba3fd5dd5b7ddf63c61bd090dbd9cd3f9654b994a65b360d3781e7b.exe 86 PID 5036 wrote to memory of 2988 5036 c0b1533f0ba3fd5dd5b7ddf63c61bd090dbd9cd3f9654b994a65b360d3781e7b.exe 86
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\c0b1533f0ba3fd5dd5b7ddf63c61bd090dbd9cd3f9654b994a65b360d3781e7b.exe"C:\Users\Admin\AppData\Local\Temp\c0b1533f0ba3fd5dd5b7ddf63c61bd090dbd9cd3f9654b994a65b360d3781e7b.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Users\Admin\AppData\Roaming\Launroxy\choikill.exe"C:\Users\Admin\AppData\Roaming\Launroxy\choikill.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\~D1DB.tmp"C:\Users\Admin\AppData\Local\Temp\~D1DB.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:616
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\~D258.tmp.docx" /o ""3⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2988
-
-
-
C:\Windows\SysWOW64\disksult.exeC:\Windows\SysWOW64\disksult.exe -k1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4336
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD52aedf39086c6584e830f4efd638ceff4
SHA10e14b2d4a14f696ffca5d4990acfd1ef0676d3e5
SHA256aa6e7acd53f3d70cc3afc015d5bc56cdbfdaea3265adc3e8cc4e4d429cfe4a4f
SHA512ca16a3667e8a89fa2add9259b5b3a44dcfe10a6d3b08ff7280b50ba858744a1b5c727577247d03be402d5e6e507f67eaa900b896aebb93cf0fd14684c13e234a
-
Filesize
6KB
MD52aedf39086c6584e830f4efd638ceff4
SHA10e14b2d4a14f696ffca5d4990acfd1ef0676d3e5
SHA256aa6e7acd53f3d70cc3afc015d5bc56cdbfdaea3265adc3e8cc4e4d429cfe4a4f
SHA512ca16a3667e8a89fa2add9259b5b3a44dcfe10a6d3b08ff7280b50ba858744a1b5c727577247d03be402d5e6e507f67eaa900b896aebb93cf0fd14684c13e234a
-
Filesize
11KB
MD50686a58a9b9b4fcb25574ef458d3e874
SHA196f2d62923ae45ddf49abe9a382d737d474d142d
SHA25636c52a4963e38a18b76774277d1403148c4db026653e84ab7ccbd6b45192a89a
SHA512ebdf077662b0d150ed256709fd3cf9e58a2a501b844afa113d7f4f00031c1843ad119a521cb95d5066422c3a57ac568792af39843f34a05137e9e5f7510d07fd
-
Filesize
172KB
MD582543e99aeda77430459c8bd8ff34a4e
SHA1d601701cb457b92a5b0c537c979e9016c240bf22
SHA256aaa09bdcc49e43c4d0c9ba4d788e36a65d3eba79fb79effe71b128cde71a4598
SHA512bac656ad076cb58956610064482058c9d4dd320f9b8117774e662ed3208f2d992da9c7caf161ece73f504773ca93268383e1d4763bd269d0a977f4fd96f402ad
-
Filesize
172KB
MD582543e99aeda77430459c8bd8ff34a4e
SHA1d601701cb457b92a5b0c537c979e9016c240bf22
SHA256aaa09bdcc49e43c4d0c9ba4d788e36a65d3eba79fb79effe71b128cde71a4598
SHA512bac656ad076cb58956610064482058c9d4dd320f9b8117774e662ed3208f2d992da9c7caf161ece73f504773ca93268383e1d4763bd269d0a977f4fd96f402ad
-
Filesize
185KB
MD5723ee30aaf9142c03fd9a6e83b6c0220
SHA1ae70b4bb8c555b263fa037a19661523c105cd2e4
SHA256c0b1533f0ba3fd5dd5b7ddf63c61bd090dbd9cd3f9654b994a65b360d3781e7b
SHA512156fa60452b4e264c3cb717870e216aeb37df96c1a44ac88b4f9dce9d9954ec4a679baa7e06475a54388df8ea2dfff18538b70b88818e4f64ff6794d8a8b771f
-
Filesize
185KB
MD5723ee30aaf9142c03fd9a6e83b6c0220
SHA1ae70b4bb8c555b263fa037a19661523c105cd2e4
SHA256c0b1533f0ba3fd5dd5b7ddf63c61bd090dbd9cd3f9654b994a65b360d3781e7b
SHA512156fa60452b4e264c3cb717870e216aeb37df96c1a44ac88b4f9dce9d9954ec4a679baa7e06475a54388df8ea2dfff18538b70b88818e4f64ff6794d8a8b771f