Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2022, 05:10
Static task
static1
Behavioral task
behavioral1
Sample
71535fce2373744f5daeaa60efecb805a228e5e988dc2f68e504d31752f402f1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
71535fce2373744f5daeaa60efecb805a228e5e988dc2f68e504d31752f402f1.exe
Resource
win10v2004-20220901-en
General
-
Target
71535fce2373744f5daeaa60efecb805a228e5e988dc2f68e504d31752f402f1.exe
-
Size
676KB
-
MD5
09a9476fcef04898eaae48d5f7e737e0
-
SHA1
6f849f53d358947b48ea928cda82c9103b9e1104
-
SHA256
71535fce2373744f5daeaa60efecb805a228e5e988dc2f68e504d31752f402f1
-
SHA512
3c1d92babee6af1bd655258d9d0230480cddcffb3c366eb890c372915c0426a55a49085dc18335f3051cf373b7a129cf2f893d51aa83009a39f65a44fb052fd5
-
SSDEEP
12288:VHjcoe9PH96vB/fAuBcm9TyOE/xG3muGx44MG4Yx:VDgINfAuBcgcZG2uG24MG4Y
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 4056 nyufupq.exe 5012 ~DFA236.tmp 1960 gutyhyq.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 71535fce2373744f5daeaa60efecb805a228e5e988dc2f68e504d31752f402f1.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation ~DFA236.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 1960 gutyhyq.exe 1960 gutyhyq.exe 1960 gutyhyq.exe 1960 gutyhyq.exe 1960 gutyhyq.exe 1960 gutyhyq.exe 1960 gutyhyq.exe 1960 gutyhyq.exe 1960 gutyhyq.exe 1960 gutyhyq.exe 1960 gutyhyq.exe 1960 gutyhyq.exe 1960 gutyhyq.exe 1960 gutyhyq.exe 1960 gutyhyq.exe 1960 gutyhyq.exe 1960 gutyhyq.exe 1960 gutyhyq.exe 1960 gutyhyq.exe 1960 gutyhyq.exe 1960 gutyhyq.exe 1960 gutyhyq.exe 1960 gutyhyq.exe 1960 gutyhyq.exe 1960 gutyhyq.exe 1960 gutyhyq.exe 1960 gutyhyq.exe 1960 gutyhyq.exe 1960 gutyhyq.exe 1960 gutyhyq.exe 1960 gutyhyq.exe 1960 gutyhyq.exe 1960 gutyhyq.exe 1960 gutyhyq.exe 1960 gutyhyq.exe 1960 gutyhyq.exe 1960 gutyhyq.exe 1960 gutyhyq.exe 1960 gutyhyq.exe 1960 gutyhyq.exe 1960 gutyhyq.exe 1960 gutyhyq.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5012 ~DFA236.tmp -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 616 wrote to memory of 4056 616 71535fce2373744f5daeaa60efecb805a228e5e988dc2f68e504d31752f402f1.exe 80 PID 616 wrote to memory of 4056 616 71535fce2373744f5daeaa60efecb805a228e5e988dc2f68e504d31752f402f1.exe 80 PID 616 wrote to memory of 4056 616 71535fce2373744f5daeaa60efecb805a228e5e988dc2f68e504d31752f402f1.exe 80 PID 4056 wrote to memory of 5012 4056 nyufupq.exe 81 PID 4056 wrote to memory of 5012 4056 nyufupq.exe 81 PID 4056 wrote to memory of 5012 4056 nyufupq.exe 81 PID 616 wrote to memory of 5048 616 71535fce2373744f5daeaa60efecb805a228e5e988dc2f68e504d31752f402f1.exe 82 PID 616 wrote to memory of 5048 616 71535fce2373744f5daeaa60efecb805a228e5e988dc2f68e504d31752f402f1.exe 82 PID 616 wrote to memory of 5048 616 71535fce2373744f5daeaa60efecb805a228e5e988dc2f68e504d31752f402f1.exe 82 PID 5012 wrote to memory of 1960 5012 ~DFA236.tmp 92 PID 5012 wrote to memory of 1960 5012 ~DFA236.tmp 92 PID 5012 wrote to memory of 1960 5012 ~DFA236.tmp 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\71535fce2373744f5daeaa60efecb805a228e5e988dc2f68e504d31752f402f1.exe"C:\Users\Admin\AppData\Local\Temp\71535fce2373744f5daeaa60efecb805a228e5e988dc2f68e504d31752f402f1.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:616 -
C:\Users\Admin\AppData\Local\Temp\nyufupq.exeC:\Users\Admin\AppData\Local\Temp\nyufupq.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Users\Admin\AppData\Local\Temp\~DFA236.tmpC:\Users\Admin\AppData\Local\Temp\~DFA236.tmp OK3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\gutyhyq.exe"C:\Users\Admin\AppData\Local\Temp\gutyhyq.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1960
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uninsep.bat" "2⤵PID:5048
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
341B
MD590dcaf8bf6553cf4221d60e44395bb9c
SHA11e927acd95fcf6220c5f051bff3a4b131a0278ab
SHA256a1262f359bd1849bf3f71c9f171e38a80e95eb55b22a8565250f0aa6c1064608
SHA51212b4dcb437de52ccbf55d1714a77c7a0403eb55d03af1e06b13f78b8cf7e328507c2c76732c8449abb211fcd14ca9132ae1d35cc21e74641c75468f83e1093bb
-
Filesize
104B
MD586bb2dbeaef655893262f3c041f6afe2
SHA11b26ff1241c1353bd506c18bd0c11878076ba65d
SHA2564a57643d2c59d1235bc0926f845583f39345839e3e9428ad619eb4b6baf96ad2
SHA51258294cfaa5882a4c5625c03fe6f9e4882912b31f7169241f95626745d66c0a746083a9044365943d66ae7a420113d28c0ddd642c4ed697c683deb63796a13d31
-
Filesize
480B
MD57979600ee7e91dffa210831e43d2e68a
SHA1921f0d6c8cfe0695179456e69c0ab1b7ec5e82a5
SHA2561efa5b57c4988bdea4da88075a961ffff0c31a93e00b853c6aae5d24aa405c47
SHA512eb26c30aa0642e5f0f36fff9beabd67c82734a719ffcaf101694a9aeab373e8adc976b9f62ee7958697c25027342a7de4e3d5bb180a8a6987a9d7eff56196a8a
-
Filesize
380KB
MD5c11b428ec4c657b55d0d41c6bc42d35c
SHA1d158d5caaa6eb78f1392ef172bc488ee81a91ad0
SHA256b8a7638ee406b6b956f461d4ac3db8c54cbe6379d796de4c4895b55892efeb70
SHA5125efab05b905ed98f561295622e6a6c7067d4e395797b069b3d74544c53533cc07f64b2276502fa601beec14428cfb386bb9480be762f5860fe59f40da70c3ec4
-
Filesize
380KB
MD5c11b428ec4c657b55d0d41c6bc42d35c
SHA1d158d5caaa6eb78f1392ef172bc488ee81a91ad0
SHA256b8a7638ee406b6b956f461d4ac3db8c54cbe6379d796de4c4895b55892efeb70
SHA5125efab05b905ed98f561295622e6a6c7067d4e395797b069b3d74544c53533cc07f64b2276502fa601beec14428cfb386bb9480be762f5860fe59f40da70c3ec4
-
Filesize
682KB
MD524ba7f032f722ecf6b8c518973709085
SHA183cab3b9f89febcd7f41091bc151d8e46f0ed803
SHA25667188dd5cc9d7a28cd524c8fdeaf6a6a7ba464a01123d58e6344b1f620ab1adc
SHA51235518645db7951a5c4e48ab2f8842ced450cb80a39654033a82f82501d8ecd650411cc6b20119573953e623f5f3ea044ad2f761630a0545a181018c2185e9f53
-
Filesize
682KB
MD524ba7f032f722ecf6b8c518973709085
SHA183cab3b9f89febcd7f41091bc151d8e46f0ed803
SHA25667188dd5cc9d7a28cd524c8fdeaf6a6a7ba464a01123d58e6344b1f620ab1adc
SHA51235518645db7951a5c4e48ab2f8842ced450cb80a39654033a82f82501d8ecd650411cc6b20119573953e623f5f3ea044ad2f761630a0545a181018c2185e9f53
-
Filesize
689KB
MD5c611283d0ab7a94cf4e0c8ae35787fcd
SHA1ee7a511702e3b0aa58e5b9f8aa52d11a7112a5f0
SHA256ef1071e6c4d46a7ccdbc9a4a84172e8df594029f95d0431e205ce1e4860b0d4f
SHA512427f8972478a0c72e5fbf37b6349292cd58c5e7acdd41ecdeac3d4d14bd4cee95254931b8cda7fb5d8f323948d3e6a2ddfd7b1a63b0232b0aadc7482faac1bd1
-
Filesize
689KB
MD5c611283d0ab7a94cf4e0c8ae35787fcd
SHA1ee7a511702e3b0aa58e5b9f8aa52d11a7112a5f0
SHA256ef1071e6c4d46a7ccdbc9a4a84172e8df594029f95d0431e205ce1e4860b0d4f
SHA512427f8972478a0c72e5fbf37b6349292cd58c5e7acdd41ecdeac3d4d14bd4cee95254931b8cda7fb5d8f323948d3e6a2ddfd7b1a63b0232b0aadc7482faac1bd1