Analysis
-
max time kernel
187s -
max time network
251s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2022 16:16
Static task
static1
Behavioral task
behavioral1
Sample
17663de3b5590994b113887514c3d108e9e34cb3ad4487e2eafcf824044ea632.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
17663de3b5590994b113887514c3d108e9e34cb3ad4487e2eafcf824044ea632.exe
Resource
win10v2004-20220812-en
General
-
Target
17663de3b5590994b113887514c3d108e9e34cb3ad4487e2eafcf824044ea632.exe
-
Size
88KB
-
MD5
5b5d924e1f57f965b630f76ca67a78e0
-
SHA1
558e3d39e536050f2096a70490cb15b8341c4525
-
SHA256
17663de3b5590994b113887514c3d108e9e34cb3ad4487e2eafcf824044ea632
-
SHA512
20a0abf003823ff88221fe159d2a8ad713900fc9758f4c807c08109c016a9b717cd4df7f45ad7c55d72843bc1f72e49e89b9b4ff79dcd5c9e82aa780bcfd22e0
-
SSDEEP
1536:wbNrxkeaUMzYurxQhfvbKkQI3yMp1xP93AT4JR7YNUsEkEs01V:wxpMzYsdMp1xVQT4Tql01V
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1832 troyan7.exe 1412 troyan7.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 17663de3b5590994b113887514c3d108e9e34cb3ad4487e2eafcf824044ea632.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1412 set thread context of 2740 1412 troyan7.exe 70 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4856 17663de3b5590994b113887514c3d108e9e34cb3ad4487e2eafcf824044ea632.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4856 wrote to memory of 1832 4856 17663de3b5590994b113887514c3d108e9e34cb3ad4487e2eafcf824044ea632.exe 82 PID 4856 wrote to memory of 1832 4856 17663de3b5590994b113887514c3d108e9e34cb3ad4487e2eafcf824044ea632.exe 82 PID 4856 wrote to memory of 1832 4856 17663de3b5590994b113887514c3d108e9e34cb3ad4487e2eafcf824044ea632.exe 82 PID 1832 wrote to memory of 1412 1832 troyan7.exe 83 PID 1832 wrote to memory of 1412 1832 troyan7.exe 83 PID 1832 wrote to memory of 1412 1832 troyan7.exe 83 PID 1412 wrote to memory of 2740 1412 troyan7.exe 70 PID 1412 wrote to memory of 2740 1412 troyan7.exe 70 PID 1412 wrote to memory of 2740 1412 troyan7.exe 70
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2740
-
C:\Users\Admin\AppData\Local\Temp\17663de3b5590994b113887514c3d108e9e34cb3ad4487e2eafcf824044ea632.exe"C:\Users\Admin\AppData\Local\Temp\17663de3b5590994b113887514c3d108e9e34cb3ad4487e2eafcf824044ea632.exe"2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\troyan7.exe"C:\Users\Admin\AppData\Local\Temp\troyan7.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\troyan7.exeStubPath4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1412
-
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\FirewallControlPanel.dll,ShowWarningDialog "C:\Users\Admin\AppData\Local\Temp\17663de3b5590994b113887514c3d108e9e34cb3ad4487e2eafcf824044ea632.exe"1⤵
- Modifies registry class
PID:4720
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD5284a47f6c479b9ad48204038527ab619
SHA133ec0d00cf5e6352a99688cb34353e59b7fae2cc
SHA256cd34f1cc2ce944e583c6bd642fab7aa8daf29ab97da848088cd3cec335d19034
SHA51294c7c03fc2538e96be5d7af31e848a829350f89f4ef29df489e1bc024ebbaf4d6390f56865c6780d2bee151d61cbb14bfc7fd0c37fb2ff002d78303e245808ff
-
Filesize
7KB
MD5284a47f6c479b9ad48204038527ab619
SHA133ec0d00cf5e6352a99688cb34353e59b7fae2cc
SHA256cd34f1cc2ce944e583c6bd642fab7aa8daf29ab97da848088cd3cec335d19034
SHA51294c7c03fc2538e96be5d7af31e848a829350f89f4ef29df489e1bc024ebbaf4d6390f56865c6780d2bee151d61cbb14bfc7fd0c37fb2ff002d78303e245808ff
-
Filesize
7KB
MD5284a47f6c479b9ad48204038527ab619
SHA133ec0d00cf5e6352a99688cb34353e59b7fae2cc
SHA256cd34f1cc2ce944e583c6bd642fab7aa8daf29ab97da848088cd3cec335d19034
SHA51294c7c03fc2538e96be5d7af31e848a829350f89f4ef29df489e1bc024ebbaf4d6390f56865c6780d2bee151d61cbb14bfc7fd0c37fb2ff002d78303e245808ff