Analysis
-
max time kernel
152s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2022 00:04
Static task
static1
Behavioral task
behavioral1
Sample
4c0bad50e096f7de960d929c08ccf52d4e4ac43307eeaef05fcf0efc98df4339.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4c0bad50e096f7de960d929c08ccf52d4e4ac43307eeaef05fcf0efc98df4339.exe
Resource
win10v2004-20220901-en
General
-
Target
4c0bad50e096f7de960d929c08ccf52d4e4ac43307eeaef05fcf0efc98df4339.exe
-
Size
556KB
-
MD5
570e2f11e0da3acc19c49b2891b13ec6
-
SHA1
c6ee78e90327357da1a4b784d77f75e07942f69d
-
SHA256
4c0bad50e096f7de960d929c08ccf52d4e4ac43307eeaef05fcf0efc98df4339
-
SHA512
61ed74a7bbb4d7d5635020b629b265c8c2a9b768d9dc982a450739ff01f15e4c769afaa952a31463b886c54f809fd5fa737ebc802355f992869475071f845aa5
-
SSDEEP
1536:SbxIUJKzDp+4e/BnZlTg9L4wPMwrLHDDG3ERz4QcJ5JM:0bODp5eJnZYMwrrLHDDG3BJM
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 4c0bad50e096f7de960d929c08ccf52d4e4ac43307eeaef05fcf0efc98df4339.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" jtwuz.exe -
Executes dropped EXE 1 IoCs
pid Process 312 jtwuz.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 4c0bad50e096f7de960d929c08ccf52d4e4ac43307eeaef05fcf0efc98df4339.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jtwuz = "C:\\Users\\Admin\\jtwuz.exe /x" jtwuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jtwuz = "C:\\Users\\Admin\\jtwuz.exe /e" jtwuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jtwuz = "C:\\Users\\Admin\\jtwuz.exe /t" jtwuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jtwuz = "C:\\Users\\Admin\\jtwuz.exe /y" jtwuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jtwuz = "C:\\Users\\Admin\\jtwuz.exe /p" jtwuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jtwuz = "C:\\Users\\Admin\\jtwuz.exe /c" jtwuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jtwuz = "C:\\Users\\Admin\\jtwuz.exe /g" jtwuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jtwuz = "C:\\Users\\Admin\\jtwuz.exe /a" jtwuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jtwuz = "C:\\Users\\Admin\\jtwuz.exe /b" jtwuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jtwuz = "C:\\Users\\Admin\\jtwuz.exe /n" jtwuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jtwuz = "C:\\Users\\Admin\\jtwuz.exe /v" jtwuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jtwuz = "C:\\Users\\Admin\\jtwuz.exe /o" jtwuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jtwuz = "C:\\Users\\Admin\\jtwuz.exe /i" jtwuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jtwuz = "C:\\Users\\Admin\\jtwuz.exe /r" jtwuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jtwuz = "C:\\Users\\Admin\\jtwuz.exe /q" jtwuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jtwuz = "C:\\Users\\Admin\\jtwuz.exe /w" jtwuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jtwuz = "C:\\Users\\Admin\\jtwuz.exe /d" jtwuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jtwuz = "C:\\Users\\Admin\\jtwuz.exe /l" jtwuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jtwuz = "C:\\Users\\Admin\\jtwuz.exe /p" 4c0bad50e096f7de960d929c08ccf52d4e4ac43307eeaef05fcf0efc98df4339.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jtwuz = "C:\\Users\\Admin\\jtwuz.exe /s" jtwuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jtwuz = "C:\\Users\\Admin\\jtwuz.exe /z" jtwuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jtwuz = "C:\\Users\\Admin\\jtwuz.exe /h" jtwuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jtwuz = "C:\\Users\\Admin\\jtwuz.exe /k" jtwuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jtwuz = "C:\\Users\\Admin\\jtwuz.exe /u" jtwuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jtwuz = "C:\\Users\\Admin\\jtwuz.exe /j" jtwuz.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 4c0bad50e096f7de960d929c08ccf52d4e4ac43307eeaef05fcf0efc98df4339.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run\ jtwuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jtwuz = "C:\\Users\\Admin\\jtwuz.exe /m" jtwuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jtwuz = "C:\\Users\\Admin\\jtwuz.exe /f" jtwuz.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4264 4c0bad50e096f7de960d929c08ccf52d4e4ac43307eeaef05fcf0efc98df4339.exe 4264 4c0bad50e096f7de960d929c08ccf52d4e4ac43307eeaef05fcf0efc98df4339.exe 312 jtwuz.exe 312 jtwuz.exe 312 jtwuz.exe 312 jtwuz.exe 312 jtwuz.exe 312 jtwuz.exe 312 jtwuz.exe 312 jtwuz.exe 312 jtwuz.exe 312 jtwuz.exe 312 jtwuz.exe 312 jtwuz.exe 312 jtwuz.exe 312 jtwuz.exe 312 jtwuz.exe 312 jtwuz.exe 312 jtwuz.exe 312 jtwuz.exe 312 jtwuz.exe 312 jtwuz.exe 312 jtwuz.exe 312 jtwuz.exe 312 jtwuz.exe 312 jtwuz.exe 312 jtwuz.exe 312 jtwuz.exe 312 jtwuz.exe 312 jtwuz.exe 312 jtwuz.exe 312 jtwuz.exe 312 jtwuz.exe 312 jtwuz.exe 312 jtwuz.exe 312 jtwuz.exe 312 jtwuz.exe 312 jtwuz.exe 312 jtwuz.exe 312 jtwuz.exe 312 jtwuz.exe 312 jtwuz.exe 312 jtwuz.exe 312 jtwuz.exe 312 jtwuz.exe 312 jtwuz.exe 312 jtwuz.exe 312 jtwuz.exe 312 jtwuz.exe 312 jtwuz.exe 312 jtwuz.exe 312 jtwuz.exe 312 jtwuz.exe 312 jtwuz.exe 312 jtwuz.exe 312 jtwuz.exe 312 jtwuz.exe 312 jtwuz.exe 312 jtwuz.exe 312 jtwuz.exe 312 jtwuz.exe 312 jtwuz.exe 312 jtwuz.exe 312 jtwuz.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4264 4c0bad50e096f7de960d929c08ccf52d4e4ac43307eeaef05fcf0efc98df4339.exe 312 jtwuz.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4264 wrote to memory of 312 4264 4c0bad50e096f7de960d929c08ccf52d4e4ac43307eeaef05fcf0efc98df4339.exe 87 PID 4264 wrote to memory of 312 4264 4c0bad50e096f7de960d929c08ccf52d4e4ac43307eeaef05fcf0efc98df4339.exe 87 PID 4264 wrote to memory of 312 4264 4c0bad50e096f7de960d929c08ccf52d4e4ac43307eeaef05fcf0efc98df4339.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c0bad50e096f7de960d929c08ccf52d4e4ac43307eeaef05fcf0efc98df4339.exe"C:\Users\Admin\AppData\Local\Temp\4c0bad50e096f7de960d929c08ccf52d4e4ac43307eeaef05fcf0efc98df4339.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Users\Admin\jtwuz.exe"C:\Users\Admin\jtwuz.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:312
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
556KB
MD5c6be8a65bea98170cbb2fb632d3ef283
SHA19469e68eb4ad0e9d9bf69b2477195c99d4c96224
SHA256e3d01ac7ada63156536296c7fae1c2a6df3e88fd62df6abdcd4f5943e2372826
SHA512a2c6ca46afb1476621240d69bbcda0b3f630f3e3220d5c2ed0e23154d088f0f5ce12bdd5915ecf112b680a86e68acb827bb396f65757d410bb1ee451e71b90c8
-
Filesize
556KB
MD5c6be8a65bea98170cbb2fb632d3ef283
SHA19469e68eb4ad0e9d9bf69b2477195c99d4c96224
SHA256e3d01ac7ada63156536296c7fae1c2a6df3e88fd62df6abdcd4f5943e2372826
SHA512a2c6ca46afb1476621240d69bbcda0b3f630f3e3220d5c2ed0e23154d088f0f5ce12bdd5915ecf112b680a86e68acb827bb396f65757d410bb1ee451e71b90c8