Analysis
-
max time kernel
188s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29-10-2022 09:40
Static task
static1
Behavioral task
behavioral1
Sample
0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af.exe
Resource
win10v2004-20220812-en
General
-
Target
0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af.exe
-
Size
2.3MB
-
MD5
1acd748077b01272fc18ca9a1271c7b0
-
SHA1
b2c7fce642fd06ec9122021ee43a9ca593914cc3
-
SHA256
0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af
-
SHA512
b7396be5df422911ba28b5ee04c3b2b2d691f3dde074a9af897be9041aa1b4798842f862e9420d3734dbb49caab947b91dd4cbaa5a089819d60b35a01ae39a72
-
SSDEEP
49152:xpymeCZZQYiMg6+vf8YfogWyxSQtrbXFLO6W4mAeEAGnpfBDb:xpyEZQ6c0Imy0UfVLOYm0nR5b
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows.exe\\LfLQAXQdO57A.exe\",explorer.exe" 0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows.exe\\Zx7zFSrGTyRJ.exe\",explorer.exe" 0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af.exe -
Executes dropped EXE 3 IoCs
pid Process 4176 yEKHa3tzYCdwZpUF.exe 2540 TempCSGO Client.exe 3884 yEKHa3tzYCdwZpUF.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation yEKHa3tzYCdwZpUF.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini 0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af.exe File opened for modification C:\Windows\assembly\Desktop.ini 0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af.exe -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000022e2c-136.dat autoit_exe behavioral2/files/0x0007000000022e2c-135.dat autoit_exe behavioral2/files/0x0007000000022e2c-149.dat autoit_exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4760 set thread context of 4668 4760 0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af.exe 84 PID 4760 set thread context of 3896 4760 0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af.exe 85 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly 0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af.exe File created C:\Windows\assembly\Desktop.ini 0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af.exe File opened for modification C:\Windows\assembly\Desktop.ini 0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings yEKHa3tzYCdwZpUF.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell yEKHa3tzYCdwZpUF.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU yEKHa3tzYCdwZpUF.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots yEKHa3tzYCdwZpUF.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff yEKHa3tzYCdwZpUF.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2388 PING.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4760 0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af.exe 4760 0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af.exe 4760 0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af.exe 4760 0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4668 0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4760 0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af.exe Token: SeDebugPrivilege 4760 0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af.exe Token: SeDebugPrivilege 4668 0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 4176 yEKHa3tzYCdwZpUF.exe 4176 yEKHa3tzYCdwZpUF.exe 4176 yEKHa3tzYCdwZpUF.exe 4176 yEKHa3tzYCdwZpUF.exe 4176 yEKHa3tzYCdwZpUF.exe 4176 yEKHa3tzYCdwZpUF.exe -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 4176 yEKHa3tzYCdwZpUF.exe 4176 yEKHa3tzYCdwZpUF.exe 4176 yEKHa3tzYCdwZpUF.exe 4176 yEKHa3tzYCdwZpUF.exe 4176 yEKHa3tzYCdwZpUF.exe 4176 yEKHa3tzYCdwZpUF.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4668 0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4760 wrote to memory of 4176 4760 0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af.exe 83 PID 4760 wrote to memory of 4176 4760 0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af.exe 83 PID 4760 wrote to memory of 4176 4760 0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af.exe 83 PID 4760 wrote to memory of 4668 4760 0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af.exe 84 PID 4760 wrote to memory of 4668 4760 0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af.exe 84 PID 4760 wrote to memory of 4668 4760 0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af.exe 84 PID 4760 wrote to memory of 4668 4760 0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af.exe 84 PID 4760 wrote to memory of 4668 4760 0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af.exe 84 PID 4760 wrote to memory of 4668 4760 0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af.exe 84 PID 4760 wrote to memory of 4668 4760 0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af.exe 84 PID 4760 wrote to memory of 4668 4760 0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af.exe 84 PID 4760 wrote to memory of 3896 4760 0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af.exe 85 PID 4760 wrote to memory of 3896 4760 0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af.exe 85 PID 4760 wrote to memory of 3896 4760 0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af.exe 85 PID 4760 wrote to memory of 3896 4760 0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af.exe 85 PID 4760 wrote to memory of 3896 4760 0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af.exe 85 PID 4760 wrote to memory of 3896 4760 0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af.exe 85 PID 4760 wrote to memory of 3896 4760 0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af.exe 85 PID 4760 wrote to memory of 3896 4760 0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af.exe 85 PID 4176 wrote to memory of 2540 4176 yEKHa3tzYCdwZpUF.exe 86 PID 4176 wrote to memory of 2540 4176 yEKHa3tzYCdwZpUF.exe 86 PID 4176 wrote to memory of 3884 4176 yEKHa3tzYCdwZpUF.exe 88 PID 4176 wrote to memory of 3884 4176 yEKHa3tzYCdwZpUF.exe 88 PID 4176 wrote to memory of 3884 4176 yEKHa3tzYCdwZpUF.exe 88 PID 3884 wrote to memory of 3648 3884 yEKHa3tzYCdwZpUF.exe 89 PID 3884 wrote to memory of 3648 3884 yEKHa3tzYCdwZpUF.exe 89 PID 3884 wrote to memory of 3648 3884 yEKHa3tzYCdwZpUF.exe 89 PID 3648 wrote to memory of 2388 3648 cmd.exe 91 PID 3648 wrote to memory of 2388 3648 cmd.exe 91 PID 3648 wrote to memory of 2388 3648 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af.exe"C:\Users\Admin\AppData\Local\Temp\0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Users\Admin\AppData\Local\Temp\yEKHa3tzYCdwZpUF.exe"C:\Users\Admin\AppData\Local\Temp\yEKHa3tzYCdwZpUF.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Users\Admin\AppData\Local\TempCSGO Client.exe"C:\Users\Admin\AppData\Local\TempCSGO Client.exe"3⤵
- Executes dropped EXE
PID:2540
-
-
C:\Users\Admin\AppData\Local\Temp\yEKHa3tzYCdwZpUF.exe"C:\Users\Admin\AppData\Local\Temp\yEKHa3tzYCdwZpUF.exe" /AutoIt3ExecuteScript "C:\Users\Admin\AppData\Local\Temp\831626" "C:\Users\Admin\AppData\Local\Temp\yEKHa3tzYCdwZpUF.exe"3⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\81.bat4⤵
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Windows\SysWOW64\PING.EXEping -n 0127.0.0.15⤵
- Runs ping.exe
PID:2388
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af.exe"C:\Users\Admin\AppData\Local\Temp\0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af.exe"2⤵
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4668
-
-
C:\Users\Admin\AppData\Local\Temp\0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af.exe"C:\Users\Admin\AppData\Local\Temp\0b42161e889ed181ad0b0a7b0240208cf10c23452b33f170c60734a5ab52b2af.exe"2⤵PID:3896
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1240
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151KB
MD55f05e7130bc6dc523faa9cf537157af1
SHA1c63fe5480dbed5a2b0d40426160d5892a8c9130f
SHA256ab2399f8c2e7ef0eac6ed6697d17471bd170b093ac3aab9a9af4a1b9a4b39efa
SHA512dea6b35d0164046adf661557c68a7fb1a7f643cbc671f216469db8f8c3af5cfceb11e72982910cbcf3a0ddabdfa39d042ef837ef1f5cac3dfd863273650c42ac
-
Filesize
151KB
MD55f05e7130bc6dc523faa9cf537157af1
SHA1c63fe5480dbed5a2b0d40426160d5892a8c9130f
SHA256ab2399f8c2e7ef0eac6ed6697d17471bd170b093ac3aab9a9af4a1b9a4b39efa
SHA512dea6b35d0164046adf661557c68a7fb1a7f643cbc671f216469db8f8c3af5cfceb11e72982910cbcf3a0ddabdfa39d042ef837ef1f5cac3dfd863273650c42ac
-
Filesize
188B
MD5af53a4743e592c6cee1e5e2151651890
SHA128bfc771c1c9678f07ddcf80509813fc6437d4e9
SHA256cd99268267e660f69a13a4fdd1b90d89a5011a7a4a14f85050aa6cb9d081832f
SHA512de14b10327a4d3dbe9cf0ba194ffa9d76b5a2ea731beaca8842e3cb319eed1fa88462160b0df45b0d1e30d630b201bef5497a632ac980e7f106f7bf0a82ab954
-
Filesize
18KB
MD5ba7ed704ea46ad6efe082e5ff4e373ee
SHA1f77c50c318e5b65c06ef07b466fbf49fa477fc34
SHA256b6725014e644232a901aa4bf9546fa02a77e163d32c15b6843d0147826d11b30
SHA512b6e94cc31608bda8299285d6f58935ed2ccb817faad96d42a6e35db82fa11a97b6e6457ded75550aea7786f522f743b16028ee6723623e0b83fa94f2423859bb
-
Filesize
1.6MB
MD5ca31b9b62cd0e6d2c306076283058574
SHA19fb108cc95deff0ca4f75eac7ec4dfa3c363d927
SHA25621923cda960ce09c6eba5863525154d60eb7f9d80ca4021f61cf6c86dd721b6b
SHA51284363cb72b6025eed6108529dda6847341d89e289f9711f8ff39060c0553d07ee1e0164dabc7c3c2f8d66567059e55f82dcb731c63bed80f457a18dfab04d191
-
Filesize
1.6MB
MD5ca31b9b62cd0e6d2c306076283058574
SHA19fb108cc95deff0ca4f75eac7ec4dfa3c363d927
SHA25621923cda960ce09c6eba5863525154d60eb7f9d80ca4021f61cf6c86dd721b6b
SHA51284363cb72b6025eed6108529dda6847341d89e289f9711f8ff39060c0553d07ee1e0164dabc7c3c2f8d66567059e55f82dcb731c63bed80f457a18dfab04d191
-
Filesize
1.6MB
MD5ca31b9b62cd0e6d2c306076283058574
SHA19fb108cc95deff0ca4f75eac7ec4dfa3c363d927
SHA25621923cda960ce09c6eba5863525154d60eb7f9d80ca4021f61cf6c86dd721b6b
SHA51284363cb72b6025eed6108529dda6847341d89e289f9711f8ff39060c0553d07ee1e0164dabc7c3c2f8d66567059e55f82dcb731c63bed80f457a18dfab04d191