Analysis
-
max time kernel
205s -
max time network
236s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
31/10/2022, 00:09
Static task
static1
Behavioral task
behavioral1
Sample
43f2c9231b7dc2219e240520c058aa5814cb3597c054f76e96066613e36628e8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
43f2c9231b7dc2219e240520c058aa5814cb3597c054f76e96066613e36628e8.exe
Resource
win10v2004-20220812-en
General
-
Target
43f2c9231b7dc2219e240520c058aa5814cb3597c054f76e96066613e36628e8.exe
-
Size
1019KB
-
MD5
830360e781e4a3f465b21e0721a67997
-
SHA1
4b02652641cd98afb43e306da4f607fa3bdd6a27
-
SHA256
43f2c9231b7dc2219e240520c058aa5814cb3597c054f76e96066613e36628e8
-
SHA512
42c88c3c8d8f804526a10c09d18f1375c749b3da5a13d195d053f8720c3b575880186cecd36dc55cbc7d3eda3d109feab30f85d66acea284787453f220b05d59
-
SSDEEP
12288:rjS3Yvyn/0TvSmqN5944qwsgq0q5L6sq1:ru3Y5v652/wsgL11
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe smrss.exe" 43f2c9231b7dc2219e240520c058aa5814cb3597c054f76e96066613e36628e8.exe -
Executes dropped EXE 1 IoCs
pid Process 4512 43240.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 43f2c9231b7dc2219e240520c058aa5814cb3597c054f76e96066613e36628e8.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\freizer = "C:\\WINDOWS\\system32\\freizer.exe" reg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\WINDOWS\\system32\\svchost.exe" reg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run reg.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\smrss.exe 43f2c9231b7dc2219e240520c058aa5814cb3597c054f76e96066613e36628e8.exe File opened for modification C:\Windows\SysWOW64\smrss.exe 43f2c9231b7dc2219e240520c058aa5814cb3597c054f76e96066613e36628e8.exe File created C:\WINDOWS\SysWOW64\freizer.exe 43f2c9231b7dc2219e240520c058aa5814cb3597c054f76e96066613e36628e8.exe -
Drops file in Program Files directory 10 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe 43f2c9231b7dc2219e240520c058aa5814cb3597c054f76e96066613e36628e8.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe 43f2c9231b7dc2219e240520c058aa5814cb3597c054f76e96066613e36628e8.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe 43f2c9231b7dc2219e240520c058aa5814cb3597c054f76e96066613e36628e8.exe File opened for modification C:\Program Files\7-Zip\7zG.exe 43f2c9231b7dc2219e240520c058aa5814cb3597c054f76e96066613e36628e8.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe 43f2c9231b7dc2219e240520c058aa5814cb3597c054f76e96066613e36628e8.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe 43f2c9231b7dc2219e240520c058aa5814cb3597c054f76e96066613e36628e8.exe File opened for modification C:\Program Files\7-Zip\7z.exe 43f2c9231b7dc2219e240520c058aa5814cb3597c054f76e96066613e36628e8.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe 43f2c9231b7dc2219e240520c058aa5814cb3597c054f76e96066613e36628e8.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe 43f2c9231b7dc2219e240520c058aa5814cb3597c054f76e96066613e36628e8.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe 43f2c9231b7dc2219e240520c058aa5814cb3597c054f76e96066613e36628e8.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\svchost.exe 43f2c9231b7dc2219e240520c058aa5814cb3597c054f76e96066613e36628e8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 4928 43f2c9231b7dc2219e240520c058aa5814cb3597c054f76e96066613e36628e8.exe 4928 43f2c9231b7dc2219e240520c058aa5814cb3597c054f76e96066613e36628e8.exe 4928 43f2c9231b7dc2219e240520c058aa5814cb3597c054f76e96066613e36628e8.exe 4928 43f2c9231b7dc2219e240520c058aa5814cb3597c054f76e96066613e36628e8.exe 4928 43f2c9231b7dc2219e240520c058aa5814cb3597c054f76e96066613e36628e8.exe 4928 43f2c9231b7dc2219e240520c058aa5814cb3597c054f76e96066613e36628e8.exe 4928 43f2c9231b7dc2219e240520c058aa5814cb3597c054f76e96066613e36628e8.exe 4928 43f2c9231b7dc2219e240520c058aa5814cb3597c054f76e96066613e36628e8.exe 4928 43f2c9231b7dc2219e240520c058aa5814cb3597c054f76e96066613e36628e8.exe 4928 43f2c9231b7dc2219e240520c058aa5814cb3597c054f76e96066613e36628e8.exe 4928 43f2c9231b7dc2219e240520c058aa5814cb3597c054f76e96066613e36628e8.exe 4928 43f2c9231b7dc2219e240520c058aa5814cb3597c054f76e96066613e36628e8.exe 4928 43f2c9231b7dc2219e240520c058aa5814cb3597c054f76e96066613e36628e8.exe 4928 43f2c9231b7dc2219e240520c058aa5814cb3597c054f76e96066613e36628e8.exe 4928 43f2c9231b7dc2219e240520c058aa5814cb3597c054f76e96066613e36628e8.exe 4928 43f2c9231b7dc2219e240520c058aa5814cb3597c054f76e96066613e36628e8.exe 4928 43f2c9231b7dc2219e240520c058aa5814cb3597c054f76e96066613e36628e8.exe 4928 43f2c9231b7dc2219e240520c058aa5814cb3597c054f76e96066613e36628e8.exe 4928 43f2c9231b7dc2219e240520c058aa5814cb3597c054f76e96066613e36628e8.exe 4928 43f2c9231b7dc2219e240520c058aa5814cb3597c054f76e96066613e36628e8.exe 4928 43f2c9231b7dc2219e240520c058aa5814cb3597c054f76e96066613e36628e8.exe 4928 43f2c9231b7dc2219e240520c058aa5814cb3597c054f76e96066613e36628e8.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4928 wrote to memory of 3396 4928 43f2c9231b7dc2219e240520c058aa5814cb3597c054f76e96066613e36628e8.exe 84 PID 4928 wrote to memory of 3396 4928 43f2c9231b7dc2219e240520c058aa5814cb3597c054f76e96066613e36628e8.exe 84 PID 4928 wrote to memory of 3396 4928 43f2c9231b7dc2219e240520c058aa5814cb3597c054f76e96066613e36628e8.exe 84 PID 4928 wrote to memory of 4660 4928 43f2c9231b7dc2219e240520c058aa5814cb3597c054f76e96066613e36628e8.exe 87 PID 4928 wrote to memory of 4660 4928 43f2c9231b7dc2219e240520c058aa5814cb3597c054f76e96066613e36628e8.exe 87 PID 4928 wrote to memory of 4660 4928 43f2c9231b7dc2219e240520c058aa5814cb3597c054f76e96066613e36628e8.exe 87 PID 3396 wrote to memory of 1312 3396 cmd.exe 88 PID 3396 wrote to memory of 1312 3396 cmd.exe 88 PID 3396 wrote to memory of 1312 3396 cmd.exe 88 PID 4660 wrote to memory of 4628 4660 cmd.exe 89 PID 4660 wrote to memory of 4628 4660 cmd.exe 89 PID 4660 wrote to memory of 4628 4660 cmd.exe 89 PID 4928 wrote to memory of 4512 4928 43f2c9231b7dc2219e240520c058aa5814cb3597c054f76e96066613e36628e8.exe 90 PID 4928 wrote to memory of 4512 4928 43f2c9231b7dc2219e240520c058aa5814cb3597c054f76e96066613e36628e8.exe 90 PID 4928 wrote to memory of 4512 4928 43f2c9231b7dc2219e240520c058aa5814cb3597c054f76e96066613e36628e8.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\43f2c9231b7dc2219e240520c058aa5814cb3597c054f76e96066613e36628e8.exe"C:\Users\Admin\AppData\Local\Temp\43f2c9231b7dc2219e240520c058aa5814cb3597c054f76e96066613e36628e8.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Windows\SysWOW64\cmd.execmd /c reg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v freizer /t REG_SZ /d C:\WINDOWS\system32\freizer.exe /f2⤵
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Windows\SysWOW64\reg.exereg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v freizer /t REG_SZ /d C:\WINDOWS\system32\freizer.exe /f3⤵
- Adds Run key to start application
PID:1312
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c reg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v svchost /t REG_SZ /d C:\WINDOWS\system32\svchost.exe /f2⤵
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Windows\SysWOW64\reg.exereg ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v svchost /t REG_SZ /d C:\WINDOWS\system32\svchost.exe /f3⤵
- Adds Run key to start application
PID:4628
-
-
-
C:\windows\temp\43240.exe"C:\windows\temp\43240.exe"2⤵
- Executes dropped EXE
PID:4512
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD509ae02badc8b2086b93bf9a8e6e571d9
SHA12e11e03477348890d59be465b6ebd57643ba4b2e
SHA256035314fbb4239808456f30f60a6562a911b55e12a1432bdfe7ef33ae5d1748ec
SHA512877380540fd8ea834dab3681d7e4920a56458f20048bffcec092daddaca21933faeadb2ce18f22040b2172279c42aa258d39f56decb2a1497db30aa24eaad224
-
Filesize
90KB
MD509ae02badc8b2086b93bf9a8e6e571d9
SHA12e11e03477348890d59be465b6ebd57643ba4b2e
SHA256035314fbb4239808456f30f60a6562a911b55e12a1432bdfe7ef33ae5d1748ec
SHA512877380540fd8ea834dab3681d7e4920a56458f20048bffcec092daddaca21933faeadb2ce18f22040b2172279c42aa258d39f56decb2a1497db30aa24eaad224