Analysis
-
max time kernel
205s -
max time network
223s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2022, 00:57
Behavioral task
behavioral1
Sample
4293d0b6843a403ab7f667afa8ad5611bd152dc09f24f61d0b457a6b8168fb85.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4293d0b6843a403ab7f667afa8ad5611bd152dc09f24f61d0b457a6b8168fb85.exe
Resource
win10v2004-20220812-en
General
-
Target
4293d0b6843a403ab7f667afa8ad5611bd152dc09f24f61d0b457a6b8168fb85.exe
-
Size
306KB
-
MD5
0cefbb3733325fbf69db7ae198f7e654
-
SHA1
c4ad28644ad93bd799af62b2617d175da2c68400
-
SHA256
4293d0b6843a403ab7f667afa8ad5611bd152dc09f24f61d0b457a6b8168fb85
-
SHA512
9cd04464d648e4082009a5dc4d7a24fa198556b0b9db25062c1f7ebb2af1568cffcf20987e7c6d4ba5d4bb61a24f1f143aaebf0671d51092f76f166770cb88e5
-
SSDEEP
6144:xfNdLF0ocp0dyd+97C6H8nnMHPer11XgUfcgxFomgXHsMjoSp:xFdLF9S0deQJ8n7RkgxFZgXxoSp
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\Windows Updater.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Windows Updater.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\Window Updates\winupdt2.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Window Updates\\winupdt2.exe:*:Enabled:Windows Messanger" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 1120 winupdt2.exe 2148 winupdt2.exe 2336 winupdt2.exe -
resource yara_rule upx behavioral2/memory/3180-134-0x0000000000400000-0x00000000005C9000-memory.dmp upx behavioral2/files/0x0006000000022e66-139.dat upx behavioral2/files/0x0006000000022e66-140.dat upx behavioral2/memory/3180-141-0x0000000000400000-0x00000000005C9000-memory.dmp upx behavioral2/memory/1120-145-0x0000000000400000-0x00000000005C9000-memory.dmp upx behavioral2/memory/2148-146-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/files/0x0006000000022e66-147.dat upx behavioral2/memory/2148-149-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/2148-151-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/2336-152-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/files/0x0006000000022e66-154.dat upx behavioral2/memory/2336-156-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/2336-158-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/1120-160-0x0000000000400000-0x00000000005C9000-memory.dmp upx behavioral2/memory/2148-171-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/2336-172-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/2148-173-0x0000000000400000-0x000000000045C000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 4293d0b6843a403ab7f667afa8ad5611bd152dc09f24f61d0b457a6b8168fb85.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WinUpdt = "C:\\Users\\Admin\\AppData\\Roaming\\Window Updates\\winupdt2.exe" reg.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1120 set thread context of 2148 1120 winupdt2.exe 84 PID 1120 set thread context of 2336 1120 winupdt2.exe 85 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 4 IoCs
pid Process 1356 reg.exe 3880 reg.exe 5068 reg.exe 5084 reg.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: 1 2148 winupdt2.exe Token: SeCreateTokenPrivilege 2148 winupdt2.exe Token: SeAssignPrimaryTokenPrivilege 2148 winupdt2.exe Token: SeLockMemoryPrivilege 2148 winupdt2.exe Token: SeIncreaseQuotaPrivilege 2148 winupdt2.exe Token: SeMachineAccountPrivilege 2148 winupdt2.exe Token: SeTcbPrivilege 2148 winupdt2.exe Token: SeSecurityPrivilege 2148 winupdt2.exe Token: SeTakeOwnershipPrivilege 2148 winupdt2.exe Token: SeLoadDriverPrivilege 2148 winupdt2.exe Token: SeSystemProfilePrivilege 2148 winupdt2.exe Token: SeSystemtimePrivilege 2148 winupdt2.exe Token: SeProfSingleProcessPrivilege 2148 winupdt2.exe Token: SeIncBasePriorityPrivilege 2148 winupdt2.exe Token: SeCreatePagefilePrivilege 2148 winupdt2.exe Token: SeCreatePermanentPrivilege 2148 winupdt2.exe Token: SeBackupPrivilege 2148 winupdt2.exe Token: SeRestorePrivilege 2148 winupdt2.exe Token: SeShutdownPrivilege 2148 winupdt2.exe Token: SeDebugPrivilege 2148 winupdt2.exe Token: SeAuditPrivilege 2148 winupdt2.exe Token: SeSystemEnvironmentPrivilege 2148 winupdt2.exe Token: SeChangeNotifyPrivilege 2148 winupdt2.exe Token: SeRemoteShutdownPrivilege 2148 winupdt2.exe Token: SeUndockPrivilege 2148 winupdt2.exe Token: SeSyncAgentPrivilege 2148 winupdt2.exe Token: SeEnableDelegationPrivilege 2148 winupdt2.exe Token: SeManageVolumePrivilege 2148 winupdt2.exe Token: SeImpersonatePrivilege 2148 winupdt2.exe Token: SeCreateGlobalPrivilege 2148 winupdt2.exe Token: 31 2148 winupdt2.exe Token: 32 2148 winupdt2.exe Token: 33 2148 winupdt2.exe Token: 34 2148 winupdt2.exe Token: 35 2148 winupdt2.exe Token: SeDebugPrivilege 2336 winupdt2.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3180 4293d0b6843a403ab7f667afa8ad5611bd152dc09f24f61d0b457a6b8168fb85.exe 1120 winupdt2.exe 2148 winupdt2.exe 2148 winupdt2.exe 2336 winupdt2.exe 2148 winupdt2.exe -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 3180 wrote to memory of 4828 3180 4293d0b6843a403ab7f667afa8ad5611bd152dc09f24f61d0b457a6b8168fb85.exe 79 PID 3180 wrote to memory of 4828 3180 4293d0b6843a403ab7f667afa8ad5611bd152dc09f24f61d0b457a6b8168fb85.exe 79 PID 3180 wrote to memory of 4828 3180 4293d0b6843a403ab7f667afa8ad5611bd152dc09f24f61d0b457a6b8168fb85.exe 79 PID 4828 wrote to memory of 2344 4828 cmd.exe 82 PID 4828 wrote to memory of 2344 4828 cmd.exe 82 PID 4828 wrote to memory of 2344 4828 cmd.exe 82 PID 3180 wrote to memory of 1120 3180 4293d0b6843a403ab7f667afa8ad5611bd152dc09f24f61d0b457a6b8168fb85.exe 83 PID 3180 wrote to memory of 1120 3180 4293d0b6843a403ab7f667afa8ad5611bd152dc09f24f61d0b457a6b8168fb85.exe 83 PID 3180 wrote to memory of 1120 3180 4293d0b6843a403ab7f667afa8ad5611bd152dc09f24f61d0b457a6b8168fb85.exe 83 PID 1120 wrote to memory of 2148 1120 winupdt2.exe 84 PID 1120 wrote to memory of 2148 1120 winupdt2.exe 84 PID 1120 wrote to memory of 2148 1120 winupdt2.exe 84 PID 1120 wrote to memory of 2148 1120 winupdt2.exe 84 PID 1120 wrote to memory of 2148 1120 winupdt2.exe 84 PID 1120 wrote to memory of 2148 1120 winupdt2.exe 84 PID 1120 wrote to memory of 2148 1120 winupdt2.exe 84 PID 1120 wrote to memory of 2148 1120 winupdt2.exe 84 PID 1120 wrote to memory of 2336 1120 winupdt2.exe 85 PID 1120 wrote to memory of 2336 1120 winupdt2.exe 85 PID 1120 wrote to memory of 2336 1120 winupdt2.exe 85 PID 1120 wrote to memory of 2336 1120 winupdt2.exe 85 PID 1120 wrote to memory of 2336 1120 winupdt2.exe 85 PID 1120 wrote to memory of 2336 1120 winupdt2.exe 85 PID 1120 wrote to memory of 2336 1120 winupdt2.exe 85 PID 1120 wrote to memory of 2336 1120 winupdt2.exe 85 PID 2148 wrote to memory of 4528 2148 winupdt2.exe 86 PID 2148 wrote to memory of 4528 2148 winupdt2.exe 86 PID 2148 wrote to memory of 4528 2148 winupdt2.exe 86 PID 2148 wrote to memory of 1496 2148 winupdt2.exe 87 PID 2148 wrote to memory of 1496 2148 winupdt2.exe 87 PID 2148 wrote to memory of 1496 2148 winupdt2.exe 87 PID 2148 wrote to memory of 4740 2148 winupdt2.exe 93 PID 2148 wrote to memory of 4740 2148 winupdt2.exe 93 PID 2148 wrote to memory of 4740 2148 winupdt2.exe 93 PID 2148 wrote to memory of 4036 2148 winupdt2.exe 89 PID 2148 wrote to memory of 4036 2148 winupdt2.exe 89 PID 2148 wrote to memory of 4036 2148 winupdt2.exe 89 PID 1496 wrote to memory of 3880 1496 cmd.exe 94 PID 1496 wrote to memory of 3880 1496 cmd.exe 94 PID 1496 wrote to memory of 3880 1496 cmd.exe 94 PID 4036 wrote to memory of 5084 4036 cmd.exe 96 PID 4036 wrote to memory of 5084 4036 cmd.exe 96 PID 4036 wrote to memory of 5084 4036 cmd.exe 96 PID 4528 wrote to memory of 1356 4528 cmd.exe 97 PID 4528 wrote to memory of 1356 4528 cmd.exe 97 PID 4528 wrote to memory of 1356 4528 cmd.exe 97 PID 4740 wrote to memory of 5068 4740 cmd.exe 95 PID 4740 wrote to memory of 5068 4740 cmd.exe 95 PID 4740 wrote to memory of 5068 4740 cmd.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\4293d0b6843a403ab7f667afa8ad5611bd152dc09f24f61d0b457a6b8168fb85.exe"C:\Users\Admin\AppData\Local\Temp\4293d0b6843a403ab7f667afa8ad5611bd152dc09f24f61d0b457a6b8168fb85.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\lHsKg.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WinUpdt" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Window Updates\winupdt2.exe" /f3⤵
- Adds Run key to start application
PID:2344
-
-
-
C:\Users\Admin\AppData\Roaming\Window Updates\winupdt2.exe"C:\Users\Admin\AppData\Roaming\Window Updates\winupdt2.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Users\Admin\AppData\Roaming\Window Updates\winupdt2.exe"C:\Users\Admin\AppData\Roaming\Window Updates\winupdt2.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- Modifies registry key
PID:1356
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Window Updates\winupdt2.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Window Updates\winupdt2.exe:*:Enabled:Windows Messanger" /f4⤵
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Window Updates\winupdt2.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Window Updates\winupdt2.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- Modifies registry key
PID:3880
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Windows Updater.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Windows Updater.exe:*:Enabled:Windows Messanger" /f4⤵
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Windows Updater.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Windows Updater.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- Modifies registry key
PID:5084
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- Modifies registry key
PID:5068
-
-
-
-
C:\Users\Admin\AppData\Roaming\Window Updates\winupdt2.exe"C:\Users\Admin\AppData\Roaming\Window Updates\winupdt2.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2336
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD549bb161b07149b1bda99901c71d98b1f
SHA1e5e3b389c09d551bd8f3a4cf71ee30e566fdf6e2
SHA256734c4f48449a118dbdfbbe4971ecf112b26b2b45d1889678c01dea98eb5767d8
SHA512da09a2af9b7f9528916ab719ed97ee8b61179bba92016eaed64b3e7d6bf08646801aeeb0eb332bdde175eb64b48106f7cf2fe2bf01ea6128753e4ce1d48707be
-
Filesize
306KB
MD5947b3f4ad7069ee0fa5b022002e5d192
SHA1a31839238ee3b02b8c4615aacc1b52fb715ee66e
SHA2567b96bf286dece202071cc54a289ee1c38b31669c687a2a583aa23911478d3b2b
SHA512486ce4661d6b185c711f3c6452c31feb853b90ccc3bb8262795216023b560e88bb2f5c35be80973c6fbe59aa3b1a71155317b36b66b4f92cbb251e1539a4189a
-
Filesize
306KB
MD5947b3f4ad7069ee0fa5b022002e5d192
SHA1a31839238ee3b02b8c4615aacc1b52fb715ee66e
SHA2567b96bf286dece202071cc54a289ee1c38b31669c687a2a583aa23911478d3b2b
SHA512486ce4661d6b185c711f3c6452c31feb853b90ccc3bb8262795216023b560e88bb2f5c35be80973c6fbe59aa3b1a71155317b36b66b4f92cbb251e1539a4189a
-
Filesize
306KB
MD5947b3f4ad7069ee0fa5b022002e5d192
SHA1a31839238ee3b02b8c4615aacc1b52fb715ee66e
SHA2567b96bf286dece202071cc54a289ee1c38b31669c687a2a583aa23911478d3b2b
SHA512486ce4661d6b185c711f3c6452c31feb853b90ccc3bb8262795216023b560e88bb2f5c35be80973c6fbe59aa3b1a71155317b36b66b4f92cbb251e1539a4189a
-
Filesize
306KB
MD5947b3f4ad7069ee0fa5b022002e5d192
SHA1a31839238ee3b02b8c4615aacc1b52fb715ee66e
SHA2567b96bf286dece202071cc54a289ee1c38b31669c687a2a583aa23911478d3b2b
SHA512486ce4661d6b185c711f3c6452c31feb853b90ccc3bb8262795216023b560e88bb2f5c35be80973c6fbe59aa3b1a71155317b36b66b4f92cbb251e1539a4189a