Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2022 14:46
Static task
static1
Behavioral task
behavioral1
Sample
982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8.exe
Resource
win10v2004-20220812-en
General
-
Target
982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8.exe
-
Size
338KB
-
MD5
1a6e98a94b85f52007fd959f6b8bc110
-
SHA1
f3bdccb0d1a136cef5af28d95b3b378fb8e204ed
-
SHA256
982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8
-
SHA512
1c2301bf20e4c730324aec545b2aab9eb6001ffd1da89ccf211a590eee5a51afc5dc82cd78709c71e7fddd53730dba4bb538478369058dcb58c4325b63c61d26
-
SSDEEP
6144:i4V7nL2adqmpbSwQYpdE9nOYrGFigjeMpMwpmCezgpHreXFI8:i4V7nL2a9pR109n7rOiupu3zgt8a8
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1296 svchost.exe 4376 svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\svchost.exe" 982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: svchost.exe File opened (read-only) \??\X: svchost.exe File opened (read-only) \??\M: svchost.exe File opened (read-only) \??\F: svchost.exe File opened (read-only) \??\H: svchost.exe File opened (read-only) \??\K: svchost.exe File opened (read-only) \??\N: svchost.exe File opened (read-only) \??\Q: svchost.exe File opened (read-only) \??\R: svchost.exe File opened (read-only) \??\Z: svchost.exe File opened (read-only) \??\E: svchost.exe File opened (read-only) \??\J: svchost.exe File opened (read-only) \??\V: svchost.exe File opened (read-only) \??\W: svchost.exe File opened (read-only) \??\Y: svchost.exe File opened (read-only) \??\G: svchost.exe File opened (read-only) \??\L: svchost.exe File opened (read-only) \??\O: svchost.exe File opened (read-only) \??\S: svchost.exe File opened (read-only) \??\T: svchost.exe File opened (read-only) \??\U: svchost.exe File opened (read-only) \??\I: svchost.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4904 set thread context of 4632 4904 982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8.exe 83 PID 1296 set thread context of 4376 1296 svchost.exe 85 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4904 982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8.exe 1296 svchost.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4904 wrote to memory of 4632 4904 982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8.exe 83 PID 4904 wrote to memory of 4632 4904 982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8.exe 83 PID 4904 wrote to memory of 4632 4904 982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8.exe 83 PID 4904 wrote to memory of 4632 4904 982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8.exe 83 PID 4904 wrote to memory of 4632 4904 982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8.exe 83 PID 4904 wrote to memory of 4632 4904 982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8.exe 83 PID 4904 wrote to memory of 4632 4904 982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8.exe 83 PID 4904 wrote to memory of 4632 4904 982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8.exe 83 PID 4904 wrote to memory of 4632 4904 982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8.exe 83 PID 4904 wrote to memory of 4632 4904 982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8.exe 83 PID 4904 wrote to memory of 4632 4904 982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8.exe 83 PID 4904 wrote to memory of 4632 4904 982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8.exe 83 PID 4904 wrote to memory of 4632 4904 982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8.exe 83 PID 4632 wrote to memory of 1296 4632 982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8.exe 84 PID 4632 wrote to memory of 1296 4632 982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8.exe 84 PID 4632 wrote to memory of 1296 4632 982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8.exe 84 PID 1296 wrote to memory of 4376 1296 svchost.exe 85 PID 1296 wrote to memory of 4376 1296 svchost.exe 85 PID 1296 wrote to memory of 4376 1296 svchost.exe 85 PID 1296 wrote to memory of 4376 1296 svchost.exe 85 PID 1296 wrote to memory of 4376 1296 svchost.exe 85 PID 1296 wrote to memory of 4376 1296 svchost.exe 85 PID 1296 wrote to memory of 4376 1296 svchost.exe 85 PID 1296 wrote to memory of 4376 1296 svchost.exe 85 PID 1296 wrote to memory of 4376 1296 svchost.exe 85 PID 1296 wrote to memory of 4376 1296 svchost.exe 85 PID 1296 wrote to memory of 4376 1296 svchost.exe 85 PID 1296 wrote to memory of 4376 1296 svchost.exe 85 PID 1296 wrote to memory of 4376 1296 svchost.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8.exe"C:\Users\Admin\AppData\Local\Temp\982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8.exe"C:\Users\Admin\AppData\Local\Temp\982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"4⤵
- Executes dropped EXE
- Enumerates connected drives
PID:4376
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
338KB
MD51a6e98a94b85f52007fd959f6b8bc110
SHA1f3bdccb0d1a136cef5af28d95b3b378fb8e204ed
SHA256982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8
SHA5121c2301bf20e4c730324aec545b2aab9eb6001ffd1da89ccf211a590eee5a51afc5dc82cd78709c71e7fddd53730dba4bb538478369058dcb58c4325b63c61d26
-
Filesize
338KB
MD51a6e98a94b85f52007fd959f6b8bc110
SHA1f3bdccb0d1a136cef5af28d95b3b378fb8e204ed
SHA256982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8
SHA5121c2301bf20e4c730324aec545b2aab9eb6001ffd1da89ccf211a590eee5a51afc5dc82cd78709c71e7fddd53730dba4bb538478369058dcb58c4325b63c61d26
-
Filesize
338KB
MD51a6e98a94b85f52007fd959f6b8bc110
SHA1f3bdccb0d1a136cef5af28d95b3b378fb8e204ed
SHA256982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8
SHA5121c2301bf20e4c730324aec545b2aab9eb6001ffd1da89ccf211a590eee5a51afc5dc82cd78709c71e7fddd53730dba4bb538478369058dcb58c4325b63c61d26