Analysis
-
max time kernel
188s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2022, 13:13
Static task
static1
Behavioral task
behavioral1
Sample
9f05f91e45939bec6b29a7ca24a27b05ee7b7f3969fde1e32a8c177a61acb8c7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9f05f91e45939bec6b29a7ca24a27b05ee7b7f3969fde1e32a8c177a61acb8c7.exe
Resource
win10v2004-20220812-en
General
-
Target
9f05f91e45939bec6b29a7ca24a27b05ee7b7f3969fde1e32a8c177a61acb8c7.exe
-
Size
268KB
-
MD5
0850fe33aa378f9b95b977d622461739
-
SHA1
067095a4cb9f237b18345e2f7d99010d2ae9f94e
-
SHA256
9f05f91e45939bec6b29a7ca24a27b05ee7b7f3969fde1e32a8c177a61acb8c7
-
SHA512
0beb5810c976220f7cc58b678663bc9c60e46ac6f2f59086bb792f79fbfe5c19d660ce256a382df00e3500a3800a5315446c794562a67fbcf274905e831f9672
-
SSDEEP
6144:1t0PHPr5dFvW8HGzNz8I4vDWsQOnByGcSnuXLH6M+:70PHVdFvW8Hu/4vDKOnByLXLw
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" tlmiw.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 9f05f91e45939bec6b29a7ca24a27b05ee7b7f3969fde1e32a8c177a61acb8c7.exe -
Executes dropped EXE 1 IoCs
pid Process 4388 tlmiw.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 9f05f91e45939bec6b29a7ca24a27b05ee7b7f3969fde1e32a8c177a61acb8c7.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tlmiw = "C:\\Users\\Admin\\tlmiw.exe /p" tlmiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tlmiw = "C:\\Users\\Admin\\tlmiw.exe /y" tlmiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tlmiw = "C:\\Users\\Admin\\tlmiw.exe /z" tlmiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tlmiw = "C:\\Users\\Admin\\tlmiw.exe /a" tlmiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tlmiw = "C:\\Users\\Admin\\tlmiw.exe /d" tlmiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tlmiw = "C:\\Users\\Admin\\tlmiw.exe /s" tlmiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tlmiw = "C:\\Users\\Admin\\tlmiw.exe /u" tlmiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tlmiw = "C:\\Users\\Admin\\tlmiw.exe /g" tlmiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tlmiw = "C:\\Users\\Admin\\tlmiw.exe /i" tlmiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tlmiw = "C:\\Users\\Admin\\tlmiw.exe /k" tlmiw.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 9f05f91e45939bec6b29a7ca24a27b05ee7b7f3969fde1e32a8c177a61acb8c7.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tlmiw = "C:\\Users\\Admin\\tlmiw.exe /c" tlmiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tlmiw = "C:\\Users\\Admin\\tlmiw.exe /n" tlmiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tlmiw = "C:\\Users\\Admin\\tlmiw.exe /b" tlmiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tlmiw = "C:\\Users\\Admin\\tlmiw.exe /j" tlmiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tlmiw = "C:\\Users\\Admin\\tlmiw.exe /o" tlmiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tlmiw = "C:\\Users\\Admin\\tlmiw.exe /m" tlmiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tlmiw = "C:\\Users\\Admin\\tlmiw.exe /x" tlmiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tlmiw = "C:\\Users\\Admin\\tlmiw.exe /e" 9f05f91e45939bec6b29a7ca24a27b05ee7b7f3969fde1e32a8c177a61acb8c7.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tlmiw = "C:\\Users\\Admin\\tlmiw.exe /t" tlmiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tlmiw = "C:\\Users\\Admin\\tlmiw.exe /h" tlmiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tlmiw = "C:\\Users\\Admin\\tlmiw.exe /e" tlmiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tlmiw = "C:\\Users\\Admin\\tlmiw.exe /q" tlmiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tlmiw = "C:\\Users\\Admin\\tlmiw.exe /l" tlmiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tlmiw = "C:\\Users\\Admin\\tlmiw.exe /f" tlmiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tlmiw = "C:\\Users\\Admin\\tlmiw.exe /v" tlmiw.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ tlmiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tlmiw = "C:\\Users\\Admin\\tlmiw.exe /r" tlmiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tlmiw = "C:\\Users\\Admin\\tlmiw.exe /w" tlmiw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 836 9f05f91e45939bec6b29a7ca24a27b05ee7b7f3969fde1e32a8c177a61acb8c7.exe 836 9f05f91e45939bec6b29a7ca24a27b05ee7b7f3969fde1e32a8c177a61acb8c7.exe 4388 tlmiw.exe 4388 tlmiw.exe 4388 tlmiw.exe 4388 tlmiw.exe 4388 tlmiw.exe 4388 tlmiw.exe 4388 tlmiw.exe 4388 tlmiw.exe 4388 tlmiw.exe 4388 tlmiw.exe 4388 tlmiw.exe 4388 tlmiw.exe 4388 tlmiw.exe 4388 tlmiw.exe 4388 tlmiw.exe 4388 tlmiw.exe 4388 tlmiw.exe 4388 tlmiw.exe 4388 tlmiw.exe 4388 tlmiw.exe 4388 tlmiw.exe 4388 tlmiw.exe 4388 tlmiw.exe 4388 tlmiw.exe 4388 tlmiw.exe 4388 tlmiw.exe 4388 tlmiw.exe 4388 tlmiw.exe 4388 tlmiw.exe 4388 tlmiw.exe 4388 tlmiw.exe 4388 tlmiw.exe 4388 tlmiw.exe 4388 tlmiw.exe 4388 tlmiw.exe 4388 tlmiw.exe 4388 tlmiw.exe 4388 tlmiw.exe 4388 tlmiw.exe 4388 tlmiw.exe 4388 tlmiw.exe 4388 tlmiw.exe 4388 tlmiw.exe 4388 tlmiw.exe 4388 tlmiw.exe 4388 tlmiw.exe 4388 tlmiw.exe 4388 tlmiw.exe 4388 tlmiw.exe 4388 tlmiw.exe 4388 tlmiw.exe 4388 tlmiw.exe 4388 tlmiw.exe 4388 tlmiw.exe 4388 tlmiw.exe 4388 tlmiw.exe 4388 tlmiw.exe 4388 tlmiw.exe 4388 tlmiw.exe 4388 tlmiw.exe 4388 tlmiw.exe 4388 tlmiw.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 836 9f05f91e45939bec6b29a7ca24a27b05ee7b7f3969fde1e32a8c177a61acb8c7.exe 4388 tlmiw.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 836 wrote to memory of 4388 836 9f05f91e45939bec6b29a7ca24a27b05ee7b7f3969fde1e32a8c177a61acb8c7.exe 78 PID 836 wrote to memory of 4388 836 9f05f91e45939bec6b29a7ca24a27b05ee7b7f3969fde1e32a8c177a61acb8c7.exe 78 PID 836 wrote to memory of 4388 836 9f05f91e45939bec6b29a7ca24a27b05ee7b7f3969fde1e32a8c177a61acb8c7.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f05f91e45939bec6b29a7ca24a27b05ee7b7f3969fde1e32a8c177a61acb8c7.exe"C:\Users\Admin\AppData\Local\Temp\9f05f91e45939bec6b29a7ca24a27b05ee7b7f3969fde1e32a8c177a61acb8c7.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Users\Admin\tlmiw.exe"C:\Users\Admin\tlmiw.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4388
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
268KB
MD5e0e0268a5e77aa84e7cc547e9dcb214e
SHA13a4125a2564dc7bbe14297821748be2fa996b984
SHA2568702a51885a3f4a48b3d30aa46b50302300779110833d54a744aaf06b2c9e8d1
SHA5120b1fd950fd6192100230a4c32cddb16f7fa417bc0c3ed1c38049b1dedcd515758cb15bab8f8bf88358a1ef8b6c38b98e1f46a99580edbe9f04627522446c111a
-
Filesize
268KB
MD5e0e0268a5e77aa84e7cc547e9dcb214e
SHA13a4125a2564dc7bbe14297821748be2fa996b984
SHA2568702a51885a3f4a48b3d30aa46b50302300779110833d54a744aaf06b2c9e8d1
SHA5120b1fd950fd6192100230a4c32cddb16f7fa417bc0c3ed1c38049b1dedcd515758cb15bab8f8bf88358a1ef8b6c38b98e1f46a99580edbe9f04627522446c111a