Analysis
-
max time kernel
152s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/10/2022, 23:27
Static task
static1
Behavioral task
behavioral1
Sample
e8f0b67861705801676cf4ad8edddcc6ee3233d4aa367ea3191bc8a080a49e00.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e8f0b67861705801676cf4ad8edddcc6ee3233d4aa367ea3191bc8a080a49e00.exe
Resource
win10v2004-20220812-en
General
-
Target
e8f0b67861705801676cf4ad8edddcc6ee3233d4aa367ea3191bc8a080a49e00.exe
-
Size
45KB
-
MD5
c4c4bcf2646caf649c30f037f4e6065f
-
SHA1
2ccd7762f43c258aef4fe5160239e7251962412e
-
SHA256
e8f0b67861705801676cf4ad8edddcc6ee3233d4aa367ea3191bc8a080a49e00
-
SHA512
8bb05f80a457e2fd8695d870544d30fe069fb200198fe7102b6b284e405efbe7bd622c6ff9863e58790a87f024cc23916eeb4d9b5547afa05d08285756dae265
-
SSDEEP
768:qkBy+xPvm5dxZj3B95Jr8qHUiljyEPdr/F05ccxGhZhzooqRrIbH:qkMRdxZLB95Jwot7Pd7EGfhkoqVI
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4072 sys32.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 4580 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation e8f0b67861705801676cf4ad8edddcc6ee3233d4aa367ea3191bc8a080a49e00.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\9204272cb5f1d2d37625bec6891bc1c4.exe sys32.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\9204272cb5f1d2d37625bec6891bc1c4.exe sys32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\9204272cb5f1d2d37625bec6891bc1c4 = "\"C:\\Users\\Admin\\AppData\\Roaming\\sys32.exe\" .." sys32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\9204272cb5f1d2d37625bec6891bc1c4 = "\"C:\\Users\\Admin\\AppData\\Roaming\\sys32.exe\" .." sys32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeDebugPrivilege 4072 sys32.exe Token: 33 4072 sys32.exe Token: SeIncBasePriorityPrivilege 4072 sys32.exe Token: 33 4072 sys32.exe Token: SeIncBasePriorityPrivilege 4072 sys32.exe Token: 33 4072 sys32.exe Token: SeIncBasePriorityPrivilege 4072 sys32.exe Token: 33 4072 sys32.exe Token: SeIncBasePriorityPrivilege 4072 sys32.exe Token: 33 4072 sys32.exe Token: SeIncBasePriorityPrivilege 4072 sys32.exe Token: 33 4072 sys32.exe Token: SeIncBasePriorityPrivilege 4072 sys32.exe Token: 33 4072 sys32.exe Token: SeIncBasePriorityPrivilege 4072 sys32.exe Token: 33 4072 sys32.exe Token: SeIncBasePriorityPrivilege 4072 sys32.exe Token: 33 4072 sys32.exe Token: SeIncBasePriorityPrivilege 4072 sys32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2020 wrote to memory of 4072 2020 e8f0b67861705801676cf4ad8edddcc6ee3233d4aa367ea3191bc8a080a49e00.exe 83 PID 2020 wrote to memory of 4072 2020 e8f0b67861705801676cf4ad8edddcc6ee3233d4aa367ea3191bc8a080a49e00.exe 83 PID 2020 wrote to memory of 4072 2020 e8f0b67861705801676cf4ad8edddcc6ee3233d4aa367ea3191bc8a080a49e00.exe 83 PID 4072 wrote to memory of 4580 4072 sys32.exe 88 PID 4072 wrote to memory of 4580 4072 sys32.exe 88 PID 4072 wrote to memory of 4580 4072 sys32.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8f0b67861705801676cf4ad8edddcc6ee3233d4aa367ea3191bc8a080a49e00.exe"C:\Users\Admin\AppData\Local\Temp\e8f0b67861705801676cf4ad8edddcc6ee3233d4aa367ea3191bc8a080a49e00.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Roaming\sys32.exe"C:\Users\Admin\AppData\Roaming\sys32.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\sys32.exe" "sys32.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:4580
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD5c4c4bcf2646caf649c30f037f4e6065f
SHA12ccd7762f43c258aef4fe5160239e7251962412e
SHA256e8f0b67861705801676cf4ad8edddcc6ee3233d4aa367ea3191bc8a080a49e00
SHA5128bb05f80a457e2fd8695d870544d30fe069fb200198fe7102b6b284e405efbe7bd622c6ff9863e58790a87f024cc23916eeb4d9b5547afa05d08285756dae265
-
Filesize
45KB
MD5c4c4bcf2646caf649c30f037f4e6065f
SHA12ccd7762f43c258aef4fe5160239e7251962412e
SHA256e8f0b67861705801676cf4ad8edddcc6ee3233d4aa367ea3191bc8a080a49e00
SHA5128bb05f80a457e2fd8695d870544d30fe069fb200198fe7102b6b284e405efbe7bd622c6ff9863e58790a87f024cc23916eeb4d9b5547afa05d08285756dae265