Analysis

  • max time kernel
    155s
  • max time network
    182s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/11/2022, 04:58

General

  • Target

    a9278d263852cc3c17c8bff3d69f400e6223d6de2698e89243cc30946a4be5c1.exe

  • Size

    98KB

  • MD5

    3f89d99c1240af69375689d123916d10

  • SHA1

    1ca2546306dd1b1bdb970b2b7ef3353b8b4e0281

  • SHA256

    a9278d263852cc3c17c8bff3d69f400e6223d6de2698e89243cc30946a4be5c1

  • SHA512

    e8f2d6432c44c52dcd2c8a787ae4eb5a9eeb74a9288afc65ca35fa2c954c2da4a2f18a4628a8ff3dd0c1d640db935e95583fb89aa7f04bbf9c6a9f8d20e4bd4d

  • SSDEEP

    1536:9QxqcQu0XPmEmEcYUpEjCTfaAIW1EvqTlrxtPpFAXF9N/6Sy:y/03mEcppEjCTfaAIWSqTlrbPLEz4

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:596
    • C:\Users\Admin\AppData\Local\Temp\a9278d263852cc3c17c8bff3d69f400e6223d6de2698e89243cc30946a4be5c1.exe
      "C:\Users\Admin\AppData\Local\Temp\a9278d263852cc3c17c8bff3d69f400e6223d6de2698e89243cc30946a4be5c1.exe"
      1⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:2012
      • C:\Users\Admin\AppData\Local\Temp\6tyE777.exe
        "C:\Users\Admin\AppData\Local\Temp\6tyE777.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2492
        • C:\Users\Admin\AppData\Local\Temp\6tyE777.exe
          "C:\Users\Admin\AppData\Local\Temp\6tyE777.exe"
          3⤵
          • Modifies WinLogon for persistence
          • Executes dropped EXE
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4768

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\6tyE777.exe

            Filesize

            74KB

            MD5

            5b1a85d948bd7a075ebd0df2296ae9d5

            SHA1

            2b7cab4c68ca6c0fa28b360f9eb4673e7b075a24

            SHA256

            8cfb09392dd6cf7042c9aa9c98fbc9ef5969441d9cbf9d142fd5cbb9d70cd121

            SHA512

            46f05ba3117297faab0a7279d0791fd2e1daebcf9dbcbffaa17c2ee34ac3a68b4b8a40d4d73431a9da7e4a4c293aaf7a9f4bde2d4c93aa4f883c57fb6b2c0575

          • C:\Users\Admin\AppData\Local\Temp\6tyE777.exe

            Filesize

            74KB

            MD5

            5b1a85d948bd7a075ebd0df2296ae9d5

            SHA1

            2b7cab4c68ca6c0fa28b360f9eb4673e7b075a24

            SHA256

            8cfb09392dd6cf7042c9aa9c98fbc9ef5969441d9cbf9d142fd5cbb9d70cd121

            SHA512

            46f05ba3117297faab0a7279d0791fd2e1daebcf9dbcbffaa17c2ee34ac3a68b4b8a40d4d73431a9da7e4a4c293aaf7a9f4bde2d4c93aa4f883c57fb6b2c0575

          • C:\Users\Admin\AppData\Local\Temp\6tyE777.exe

            Filesize

            74KB

            MD5

            5b1a85d948bd7a075ebd0df2296ae9d5

            SHA1

            2b7cab4c68ca6c0fa28b360f9eb4673e7b075a24

            SHA256

            8cfb09392dd6cf7042c9aa9c98fbc9ef5969441d9cbf9d142fd5cbb9d70cd121

            SHA512

            46f05ba3117297faab0a7279d0791fd2e1daebcf9dbcbffaa17c2ee34ac3a68b4b8a40d4d73431a9da7e4a4c293aaf7a9f4bde2d4c93aa4f883c57fb6b2c0575

          • memory/596-167-0x0000000010F60000-0x0000000010F86000-memory.dmp

            Filesize

            152KB

          • memory/596-212-0x0000000011110000-0x0000000011136000-memory.dmp

            Filesize

            152KB

          • memory/596-242-0x0000000011230000-0x0000000011256000-memory.dmp

            Filesize

            152KB

          • memory/596-237-0x0000000011200000-0x0000000011226000-memory.dmp

            Filesize

            152KB

          • memory/596-232-0x00000000111D0000-0x00000000111F6000-memory.dmp

            Filesize

            152KB

          • memory/596-227-0x00000000111A0000-0x00000000111C6000-memory.dmp

            Filesize

            152KB

          • memory/596-222-0x0000000011170000-0x0000000011196000-memory.dmp

            Filesize

            152KB

          • memory/596-217-0x0000000011140000-0x0000000011166000-memory.dmp

            Filesize

            152KB

          • memory/596-182-0x0000000010FF0000-0x0000000011016000-memory.dmp

            Filesize

            152KB

          • memory/596-207-0x00000000110E0000-0x0000000011106000-memory.dmp

            Filesize

            152KB

          • memory/596-152-0x0000000000400000-0x0000000000426000-memory.dmp

            Filesize

            152KB

          • memory/596-157-0x0000000010F00000-0x0000000010F26000-memory.dmp

            Filesize

            152KB

          • memory/596-162-0x0000000010F30000-0x0000000010F56000-memory.dmp

            Filesize

            152KB

          • memory/596-202-0x00000000110B0000-0x00000000110D6000-memory.dmp

            Filesize

            152KB

          • memory/596-177-0x0000000010FC0000-0x0000000010FE6000-memory.dmp

            Filesize

            152KB

          • memory/596-197-0x0000000011080000-0x00000000110A6000-memory.dmp

            Filesize

            152KB

          • memory/596-172-0x0000000010F90000-0x0000000010FB6000-memory.dmp

            Filesize

            152KB

          • memory/596-187-0x0000000011020000-0x0000000011046000-memory.dmp

            Filesize

            152KB

          • memory/596-192-0x0000000011050000-0x0000000011076000-memory.dmp

            Filesize

            152KB

          • memory/4768-138-0x0000000000400000-0x0000000000426000-memory.dmp

            Filesize

            152KB

          • memory/4768-147-0x0000000000400000-0x0000000000426000-memory.dmp

            Filesize

            152KB

          • memory/4768-145-0x0000000000400000-0x0000000000426000-memory.dmp

            Filesize

            152KB

          • memory/4768-146-0x0000000000410000-0x0000000000412000-memory.dmp

            Filesize

            8KB

          • memory/4768-144-0x0000000000400000-0x0000000000426000-memory.dmp

            Filesize

            152KB

          • memory/4768-141-0x0000000000400000-0x0000000000426000-memory.dmp

            Filesize

            152KB

          • memory/4768-140-0x0000000000400000-0x0000000000426000-memory.dmp

            Filesize

            152KB

          • memory/4768-139-0x0000000000400000-0x0000000000426000-memory.dmp

            Filesize

            152KB