Analysis
-
max time kernel
165s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2022 23:15
Static task
static1
Behavioral task
behavioral1
Sample
11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe
Resource
win10v2004-20221111-en
General
-
Target
11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe
-
Size
367KB
-
MD5
4cd35a7fecaacbff98897773a7328161
-
SHA1
d4212fd5f5fc183e47e06059faa72df99431c79e
-
SHA256
11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072
-
SHA512
9b41801e0556ab7155537f150e6748b6d0b4361918d8be7668d347c273d1abd53712aba44ec3f734fbf4b1e1517dc162d7a8a3c8ab42d59b53ca3b0e28558e45
-
SSDEEP
6144:st0cWX5uAgeqDoxNAhkxvIgbmSPbEu47C5siUVLrNSyzEkNk0vWhV:3RX5u0FSkFI8mqMAFqrNSCEjphV
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2680 WUDHost.exe 4840 Acctres.exe 3576 Acctres.exe 4516 WUDHost.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation Acctres.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Boot File Servicing Utility = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\WUDHost.exe" WUDHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Boot File Servicing Utility = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\WUDHost.exe" WUDHost.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe File opened for modification C:\Windows\assembly\Desktop.ini 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4864 set thread context of 2556 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 86 PID 4840 set thread context of 3576 4840 Acctres.exe 91 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe File created C:\Windows\assembly\Desktop.ini 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe File opened for modification C:\Windows\assembly\Desktop.ini 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2556 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe Token: SeDebugPrivilege 2556 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe Token: SeDebugPrivilege 2680 WUDHost.exe Token: SeDebugPrivilege 4840 Acctres.exe Token: SeDebugPrivilege 4516 WUDHost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2556 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 4864 wrote to memory of 2556 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 86 PID 4864 wrote to memory of 2556 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 86 PID 4864 wrote to memory of 2556 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 86 PID 4864 wrote to memory of 2556 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 86 PID 4864 wrote to memory of 2556 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 86 PID 4864 wrote to memory of 2556 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 86 PID 4864 wrote to memory of 2556 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 86 PID 4864 wrote to memory of 2556 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 86 PID 4864 wrote to memory of 2680 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 87 PID 4864 wrote to memory of 2680 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 87 PID 4864 wrote to memory of 2680 4864 11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe 87 PID 2680 wrote to memory of 4840 2680 WUDHost.exe 90 PID 2680 wrote to memory of 4840 2680 WUDHost.exe 90 PID 2680 wrote to memory of 4840 2680 WUDHost.exe 90 PID 4840 wrote to memory of 3576 4840 Acctres.exe 91 PID 4840 wrote to memory of 3576 4840 Acctres.exe 91 PID 4840 wrote to memory of 3576 4840 Acctres.exe 91 PID 4840 wrote to memory of 3576 4840 Acctres.exe 91 PID 4840 wrote to memory of 3576 4840 Acctres.exe 91 PID 4840 wrote to memory of 3576 4840 Acctres.exe 91 PID 4840 wrote to memory of 3576 4840 Acctres.exe 91 PID 4840 wrote to memory of 3576 4840 Acctres.exe 91 PID 4840 wrote to memory of 4516 4840 Acctres.exe 92 PID 4840 wrote to memory of 4516 4840 Acctres.exe 92 PID 4840 wrote to memory of 4516 4840 Acctres.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe"C:\Users\Admin\AppData\Local\Temp\11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Users\Admin\AppData\Local\Temp\11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe"C:\Users\Admin\AppData\Local\Temp\11f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072.exe"2⤵
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2556
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\WUDHost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\WUDHost.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Acctres.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Acctres.exe3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Acctres.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Acctres.exe"4⤵
- Executes dropped EXE
PID:3576
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\WUDHost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\WUDHost.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:4516
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
319B
MD5824ba7b7eed8b900a98dd25129c4cd83
SHA154478770b2158000ef365591d42977cb854453a1
SHA256d182dd648c92e41cd62dccc65f130c07f0a96c03b32f907c3d1218e9aa5bda03
SHA512ae4f3a9673711ecb6cc5d06874c587341d5094803923b53b6e982278fa64549d7acf866de165e23750facd55da556b6794c0d32f129f4087529c73acd4ffb11e
-
Filesize
367KB
MD54cd35a7fecaacbff98897773a7328161
SHA1d4212fd5f5fc183e47e06059faa72df99431c79e
SHA25611f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072
SHA5129b41801e0556ab7155537f150e6748b6d0b4361918d8be7668d347c273d1abd53712aba44ec3f734fbf4b1e1517dc162d7a8a3c8ab42d59b53ca3b0e28558e45
-
Filesize
367KB
MD54cd35a7fecaacbff98897773a7328161
SHA1d4212fd5f5fc183e47e06059faa72df99431c79e
SHA25611f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072
SHA5129b41801e0556ab7155537f150e6748b6d0b4361918d8be7668d347c273d1abd53712aba44ec3f734fbf4b1e1517dc162d7a8a3c8ab42d59b53ca3b0e28558e45
-
Filesize
367KB
MD54cd35a7fecaacbff98897773a7328161
SHA1d4212fd5f5fc183e47e06059faa72df99431c79e
SHA25611f63ddfb71a41d3d8899e65783bf60053f4dc9335ab32adacd41543c3845072
SHA5129b41801e0556ab7155537f150e6748b6d0b4361918d8be7668d347c273d1abd53712aba44ec3f734fbf4b1e1517dc162d7a8a3c8ab42d59b53ca3b0e28558e45
-
Filesize
13KB
MD583fc91c3ad682312604cd0523b50b293
SHA13b17a838d2a7d75fbddbe0b82c6f319413fd2c90
SHA256d664c40ee7910bb799c083fbd9c51cca102f13e8d7683feac9a362d2bbbfa294
SHA512bd7dec870c1766830319f8dfd969cd2c008eb5e9de5ef266cb15cda8773018c165e3244bda791cd473b3cd0eeb732972ccd1b95c9a53a1d7ba17d9dd7c9d8627
-
Filesize
13KB
MD583fc91c3ad682312604cd0523b50b293
SHA13b17a838d2a7d75fbddbe0b82c6f319413fd2c90
SHA256d664c40ee7910bb799c083fbd9c51cca102f13e8d7683feac9a362d2bbbfa294
SHA512bd7dec870c1766830319f8dfd969cd2c008eb5e9de5ef266cb15cda8773018c165e3244bda791cd473b3cd0eeb732972ccd1b95c9a53a1d7ba17d9dd7c9d8627
-
Filesize
13KB
MD583fc91c3ad682312604cd0523b50b293
SHA13b17a838d2a7d75fbddbe0b82c6f319413fd2c90
SHA256d664c40ee7910bb799c083fbd9c51cca102f13e8d7683feac9a362d2bbbfa294
SHA512bd7dec870c1766830319f8dfd969cd2c008eb5e9de5ef266cb15cda8773018c165e3244bda791cd473b3cd0eeb732972ccd1b95c9a53a1d7ba17d9dd7c9d8627
-
Filesize
13KB
MD583fc91c3ad682312604cd0523b50b293
SHA13b17a838d2a7d75fbddbe0b82c6f319413fd2c90
SHA256d664c40ee7910bb799c083fbd9c51cca102f13e8d7683feac9a362d2bbbfa294
SHA512bd7dec870c1766830319f8dfd969cd2c008eb5e9de5ef266cb15cda8773018c165e3244bda791cd473b3cd0eeb732972ccd1b95c9a53a1d7ba17d9dd7c9d8627