Analysis
-
max time kernel
141s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2022 02:49
Behavioral task
behavioral1
Sample
4670a73ccbba29475686f7fd044ff64854fc19949d3efa46cdd48c1c02ef77eb.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4670a73ccbba29475686f7fd044ff64854fc19949d3efa46cdd48c1c02ef77eb.exe
Resource
win10v2004-20220901-en
General
-
Target
4670a73ccbba29475686f7fd044ff64854fc19949d3efa46cdd48c1c02ef77eb.exe
-
Size
473KB
-
MD5
05734ec77bf7ff49ab33faa9ea9241f7
-
SHA1
3650464a2f997b9530c129d6f1420ab8b4f5bebd
-
SHA256
4670a73ccbba29475686f7fd044ff64854fc19949d3efa46cdd48c1c02ef77eb
-
SHA512
6b2dfbe9da01abb5755ec3dc6a24fc6072ab900ed9cba209d59c4ff29620c90b75f235840d0c759ed20a27852f8c92181ba81d887baa1db634a8eac3753b5f0c
-
SSDEEP
12288:jnNhuBoY8SorxgmA+nlvVlg2qn1G3GWVxWu:jPatCg7EPGn1G3GWVMu
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe csrcs.exe" 4670a73ccbba29475686f7fd044ff64854fc19949d3efa46cdd48c1c02ef77eb.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 4670a73ccbba29475686f7fd044ff64854fc19949d3efa46cdd48c1c02ef77eb.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 4670a73ccbba29475686f7fd044ff64854fc19949d3efa46cdd48c1c02ef77eb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\csrcs = "C:\\Windows\\system32\\csrcs.exe" 4670a73ccbba29475686f7fd044ff64854fc19949d3efa46cdd48c1c02ef77eb.exe -
Executes dropped EXE 1 IoCs
pid Process 1808 csrcs.exe -
resource yara_rule behavioral2/memory/4416-132-0x0000000000400000-0x00000000004D3000-memory.dmp upx behavioral2/files/0x0006000000000727-134.dat upx behavioral2/files/0x0006000000000727-135.dat upx behavioral2/memory/1808-136-0x0000000000400000-0x00000000004D3000-memory.dmp upx behavioral2/memory/1808-138-0x0000000000400000-0x00000000004D3000-memory.dmp upx behavioral2/memory/4416-142-0x0000000000400000-0x00000000004D3000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 4670a73ccbba29475686f7fd044ff64854fc19949d3efa46cdd48c1c02ef77eb.exe -
AutoIT Executable 4 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/4416-132-0x0000000000400000-0x00000000004D3000-memory.dmp autoit_exe behavioral2/memory/1808-136-0x0000000000400000-0x00000000004D3000-memory.dmp autoit_exe behavioral2/memory/1808-138-0x0000000000400000-0x00000000004D3000-memory.dmp autoit_exe behavioral2/memory/4416-142-0x0000000000400000-0x00000000004D3000-memory.dmp autoit_exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\csrcs.exe 4670a73ccbba29475686f7fd044ff64854fc19949d3efa46cdd48c1c02ef77eb.exe File opened for modification C:\Windows\SysWOW64\csrcs.exe 4670a73ccbba29475686f7fd044ff64854fc19949d3efa46cdd48c1c02ef77eb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 4670a73ccbba29475686f7fd044ff64854fc19949d3efa46cdd48c1c02ef77eb.exe -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 2436 PING.EXE 3988 PING.EXE 212 PING.EXE -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4416 4670a73ccbba29475686f7fd044ff64854fc19949d3efa46cdd48c1c02ef77eb.exe 4416 4670a73ccbba29475686f7fd044ff64854fc19949d3efa46cdd48c1c02ef77eb.exe 4416 4670a73ccbba29475686f7fd044ff64854fc19949d3efa46cdd48c1c02ef77eb.exe 4416 4670a73ccbba29475686f7fd044ff64854fc19949d3efa46cdd48c1c02ef77eb.exe 4416 4670a73ccbba29475686f7fd044ff64854fc19949d3efa46cdd48c1c02ef77eb.exe 4416 4670a73ccbba29475686f7fd044ff64854fc19949d3efa46cdd48c1c02ef77eb.exe 1808 csrcs.exe 1808 csrcs.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4416 wrote to memory of 1808 4416 4670a73ccbba29475686f7fd044ff64854fc19949d3efa46cdd48c1c02ef77eb.exe 83 PID 4416 wrote to memory of 1808 4416 4670a73ccbba29475686f7fd044ff64854fc19949d3efa46cdd48c1c02ef77eb.exe 83 PID 4416 wrote to memory of 1808 4416 4670a73ccbba29475686f7fd044ff64854fc19949d3efa46cdd48c1c02ef77eb.exe 83 PID 1808 wrote to memory of 2524 1808 csrcs.exe 85 PID 1808 wrote to memory of 2524 1808 csrcs.exe 85 PID 1808 wrote to memory of 2524 1808 csrcs.exe 85 PID 2524 wrote to memory of 2436 2524 cmd.exe 87 PID 2524 wrote to memory of 2436 2524 cmd.exe 87 PID 2524 wrote to memory of 2436 2524 cmd.exe 87 PID 4416 wrote to memory of 3936 4416 4670a73ccbba29475686f7fd044ff64854fc19949d3efa46cdd48c1c02ef77eb.exe 88 PID 4416 wrote to memory of 3936 4416 4670a73ccbba29475686f7fd044ff64854fc19949d3efa46cdd48c1c02ef77eb.exe 88 PID 4416 wrote to memory of 3936 4416 4670a73ccbba29475686f7fd044ff64854fc19949d3efa46cdd48c1c02ef77eb.exe 88 PID 3936 wrote to memory of 3988 3936 cmd.exe 90 PID 3936 wrote to memory of 3988 3936 cmd.exe 90 PID 3936 wrote to memory of 3988 3936 cmd.exe 90 PID 2524 wrote to memory of 212 2524 cmd.exe 91 PID 2524 wrote to memory of 212 2524 cmd.exe 91 PID 2524 wrote to memory of 212 2524 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\4670a73ccbba29475686f7fd044ff64854fc19949d3efa46cdd48c1c02ef77eb.exe"C:\Users\Admin\AppData\Local\Temp\4670a73ccbba29475686f7fd044ff64854fc19949d3efa46cdd48c1c02ef77eb.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Adds policy Run key to start application
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Windows\SysWOW64\csrcs.exe"C:\Windows\System32\csrcs.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\suicide.bat3⤵
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\PING.EXEping -n 5 -w 250 127.0.0.14⤵
- Runs ping.exe
PID:2436
-
-
C:\Windows\SysWOW64\PING.EXEping -n 5 -w 250 127.0.0.14⤵
- Runs ping.exe
PID:212
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\suicide.bat2⤵
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Windows\SysWOW64\PING.EXEping -n 5 -w 250 127.0.0.13⤵
- Runs ping.exe
PID:3988
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
141B
MD59d7ddbc6c331aefed77908f803fca1e5
SHA1d36afa796236730342b216f083c68a39227c13bf
SHA25619f0453504f36aef7d207f11345ed203440a3a8dd1594df1aa072b2f4eeb39bf
SHA512014c7cb15ec0bfc96e1f5b5a66b0bba9b87440256d0e8d9106cef8c4d2f1d244a3063a7abb847957310b2e0c9db466291851d7bb2ff8e6b50e0b9ad907b9b54c
-
Filesize
287B
MD581a4b977163fca252ff5731254c3706a
SHA1bf37a1336c67da451cf2e36d6e08b5e86503e750
SHA25648bbcb7416a5385897819953ed12bdc9676d325aeddf8b1e10f69a74ace0c824
SHA512a99d94f0b113ededcf2f41f029da64131973e4a5b3ce4891b1028ab4050525f332fe5beeb35cb2960ea28cda5dad3b5ff23154de1a070c899c12ccc038a99f9f
-
Filesize
473KB
MD505734ec77bf7ff49ab33faa9ea9241f7
SHA13650464a2f997b9530c129d6f1420ab8b4f5bebd
SHA2564670a73ccbba29475686f7fd044ff64854fc19949d3efa46cdd48c1c02ef77eb
SHA5126b2dfbe9da01abb5755ec3dc6a24fc6072ab900ed9cba209d59c4ff29620c90b75f235840d0c759ed20a27852f8c92181ba81d887baa1db634a8eac3753b5f0c
-
Filesize
473KB
MD505734ec77bf7ff49ab33faa9ea9241f7
SHA13650464a2f997b9530c129d6f1420ab8b4f5bebd
SHA2564670a73ccbba29475686f7fd044ff64854fc19949d3efa46cdd48c1c02ef77eb
SHA5126b2dfbe9da01abb5755ec3dc6a24fc6072ab900ed9cba209d59c4ff29620c90b75f235840d0c759ed20a27852f8c92181ba81d887baa1db634a8eac3753b5f0c