Analysis
-
max time kernel
80s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
29/10/2022, 23:15
Static task
static1
Behavioral task
behavioral1
Sample
8f26c24b6b78a631db0850fe3358c31be3ccff69e9018127fda2a00c61869bd7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8f26c24b6b78a631db0850fe3358c31be3ccff69e9018127fda2a00c61869bd7.exe
Resource
win10v2004-20220901-en
General
-
Target
8f26c24b6b78a631db0850fe3358c31be3ccff69e9018127fda2a00c61869bd7.exe
-
Size
154KB
-
MD5
4dfc6fd0aa6d7d397e19c0749a089210
-
SHA1
2a1ae383d6cfe187307bf1860982642bc864a2c7
-
SHA256
8f26c24b6b78a631db0850fe3358c31be3ccff69e9018127fda2a00c61869bd7
-
SHA512
b16f2235c064cc2899aad9bb162a96b737fc608ced45938a612cd6fd6f51fc679a7f7a525d9df778a33cb5484253b036a568a0798cba504140de2c8e35233821
-
SSDEEP
3072:JhebBAqtYA4FVb/NFiVDcVyH5q/hUAR+ifVj+lp2SXahfUBojVf+RDG:2ABLFlXLVk5quAhqlMjfU2yD
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5020 Trojan.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 3544 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 8f26c24b6b78a631db0850fe3358c31be3ccff69e9018127fda2a00c61869bd7.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\5cd8f17f4086744065eb0992a09e05a2.exe Trojan.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\5cd8f17f4086744065eb0992a09e05a2.exe Trojan.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5cd8f17f4086744065eb0992a09e05a2 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Trojan.exe\" .." Trojan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5cd8f17f4086744065eb0992a09e05a2 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Trojan.exe\" .." Trojan.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2312 5020 WerFault.exe 82 -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 5020 Trojan.exe 5020 Trojan.exe 5020 Trojan.exe 5020 Trojan.exe 5020 Trojan.exe 5020 Trojan.exe 5020 Trojan.exe 5020 Trojan.exe 5020 Trojan.exe 5020 Trojan.exe 5020 Trojan.exe 5020 Trojan.exe 5020 Trojan.exe 5020 Trojan.exe 5020 Trojan.exe 5020 Trojan.exe 5020 Trojan.exe 5020 Trojan.exe 5020 Trojan.exe 5020 Trojan.exe 5020 Trojan.exe 5020 Trojan.exe 5020 Trojan.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5020 Trojan.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3284 wrote to memory of 5020 3284 8f26c24b6b78a631db0850fe3358c31be3ccff69e9018127fda2a00c61869bd7.exe 82 PID 3284 wrote to memory of 5020 3284 8f26c24b6b78a631db0850fe3358c31be3ccff69e9018127fda2a00c61869bd7.exe 82 PID 5020 wrote to memory of 3544 5020 Trojan.exe 83 PID 5020 wrote to memory of 3544 5020 Trojan.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f26c24b6b78a631db0850fe3358c31be3ccff69e9018127fda2a00c61869bd7.exe"C:\Users\Admin\AppData\Local\Temp\8f26c24b6b78a631db0850fe3358c31be3ccff69e9018127fda2a00c61869bd7.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Users\Admin\AppData\Local\Temp\Trojan.exe"C:\Users\Admin\AppData\Local\Temp\Trojan.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Windows\SYSTEM32\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Trojan.exe" "Trojan.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:3544
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5020 -s 11363⤵
- Program crash
PID:2312
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 408 -p 5020 -ip 50201⤵PID:3776
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
154KB
MD54dfc6fd0aa6d7d397e19c0749a089210
SHA12a1ae383d6cfe187307bf1860982642bc864a2c7
SHA2568f26c24b6b78a631db0850fe3358c31be3ccff69e9018127fda2a00c61869bd7
SHA512b16f2235c064cc2899aad9bb162a96b737fc608ced45938a612cd6fd6f51fc679a7f7a525d9df778a33cb5484253b036a568a0798cba504140de2c8e35233821
-
Filesize
154KB
MD54dfc6fd0aa6d7d397e19c0749a089210
SHA12a1ae383d6cfe187307bf1860982642bc864a2c7
SHA2568f26c24b6b78a631db0850fe3358c31be3ccff69e9018127fda2a00c61869bd7
SHA512b16f2235c064cc2899aad9bb162a96b737fc608ced45938a612cd6fd6f51fc679a7f7a525d9df778a33cb5484253b036a568a0798cba504140de2c8e35233821