Analysis
-
max time kernel
163s -
max time network
181s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2022, 15:26
Static task
static1
Behavioral task
behavioral1
Sample
2cd58fe6356962d493074c403480143a8aaa10e0d2aa9850464bc5b61ff5bab1.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2cd58fe6356962d493074c403480143a8aaa10e0d2aa9850464bc5b61ff5bab1.exe
Resource
win10v2004-20221111-en
General
-
Target
2cd58fe6356962d493074c403480143a8aaa10e0d2aa9850464bc5b61ff5bab1.exe
-
Size
768KB
-
MD5
22df29ca44e19211d3630e84ec0eeb01
-
SHA1
ae81fa6e0f616f8c1ff8c284d793bd2b057bfd9e
-
SHA256
2cd58fe6356962d493074c403480143a8aaa10e0d2aa9850464bc5b61ff5bab1
-
SHA512
4800b4275499b068ab2f4cebc6ed9e58f9dcd5955d2321b5e048e349c6ab2b501a8bed146fdf2cb60c39820676161ef7f39bf5c758455f27fb6383713004a59d
-
SSDEEP
12288:RCRSvpzh90Dft/dVYkk0DmPN7Z4AxH5t24VFLlfVoDh1ewE2HmwWqzIxLJIdT/Ps:RCRIpre/dVYw6YAF24Hmh1a2Gwxzq
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4584 see.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 2cd58fe6356962d493074c403480143a8aaa10e0d2aa9850464bc5b61ff5bab1.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\thrue = "C:\\Users\\Admin\\AppData\\Roaming\\lanko\\see.exe" 2cd58fe6356962d493074c403480143a8aaa10e0d2aa9850464bc5b61ff5bab1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3164 2cd58fe6356962d493074c403480143a8aaa10e0d2aa9850464bc5b61ff5bab1.exe 4584 see.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3164 wrote to memory of 4584 3164 2cd58fe6356962d493074c403480143a8aaa10e0d2aa9850464bc5b61ff5bab1.exe 83 PID 3164 wrote to memory of 4584 3164 2cd58fe6356962d493074c403480143a8aaa10e0d2aa9850464bc5b61ff5bab1.exe 83 PID 3164 wrote to memory of 4584 3164 2cd58fe6356962d493074c403480143a8aaa10e0d2aa9850464bc5b61ff5bab1.exe 83 PID 4584 wrote to memory of 2092 4584 see.exe 84 PID 4584 wrote to memory of 2092 4584 see.exe 84 PID 4584 wrote to memory of 2092 4584 see.exe 84 PID 4584 wrote to memory of 2092 4584 see.exe 84 PID 4584 wrote to memory of 2092 4584 see.exe 84 PID 4584 wrote to memory of 2092 4584 see.exe 84 PID 4584 wrote to memory of 2092 4584 see.exe 84 PID 4584 wrote to memory of 2092 4584 see.exe 84 PID 4584 wrote to memory of 2092 4584 see.exe 84 PID 4584 wrote to memory of 2092 4584 see.exe 84 PID 4584 wrote to memory of 2092 4584 see.exe 84 PID 4584 wrote to memory of 2092 4584 see.exe 84 PID 4584 wrote to memory of 3900 4584 see.exe 85 PID 4584 wrote to memory of 3900 4584 see.exe 85 PID 4584 wrote to memory of 3900 4584 see.exe 85 PID 4584 wrote to memory of 3900 4584 see.exe 85 PID 4584 wrote to memory of 3900 4584 see.exe 85 PID 4584 wrote to memory of 3900 4584 see.exe 85 PID 4584 wrote to memory of 3900 4584 see.exe 85 PID 4584 wrote to memory of 3900 4584 see.exe 85 PID 4584 wrote to memory of 3900 4584 see.exe 85 PID 4584 wrote to memory of 3900 4584 see.exe 85 PID 4584 wrote to memory of 3900 4584 see.exe 85 PID 4584 wrote to memory of 3900 4584 see.exe 85 PID 4584 wrote to memory of 2924 4584 see.exe 86 PID 4584 wrote to memory of 2924 4584 see.exe 86 PID 4584 wrote to memory of 2924 4584 see.exe 86 PID 4584 wrote to memory of 2924 4584 see.exe 86 PID 4584 wrote to memory of 2924 4584 see.exe 86 PID 4584 wrote to memory of 2924 4584 see.exe 86 PID 4584 wrote to memory of 2924 4584 see.exe 86 PID 4584 wrote to memory of 2924 4584 see.exe 86 PID 4584 wrote to memory of 2924 4584 see.exe 86 PID 4584 wrote to memory of 2924 4584 see.exe 86 PID 4584 wrote to memory of 2924 4584 see.exe 86 PID 4584 wrote to memory of 2924 4584 see.exe 86 PID 4584 wrote to memory of 2964 4584 see.exe 87 PID 4584 wrote to memory of 2964 4584 see.exe 87 PID 4584 wrote to memory of 2964 4584 see.exe 87 PID 4584 wrote to memory of 2964 4584 see.exe 87 PID 4584 wrote to memory of 2964 4584 see.exe 87 PID 4584 wrote to memory of 2964 4584 see.exe 87 PID 4584 wrote to memory of 2964 4584 see.exe 87 PID 4584 wrote to memory of 2964 4584 see.exe 87 PID 4584 wrote to memory of 2964 4584 see.exe 87 PID 4584 wrote to memory of 2964 4584 see.exe 87 PID 4584 wrote to memory of 2964 4584 see.exe 87 PID 4584 wrote to memory of 2964 4584 see.exe 87 PID 4584 wrote to memory of 4288 4584 see.exe 88 PID 4584 wrote to memory of 4288 4584 see.exe 88 PID 4584 wrote to memory of 4288 4584 see.exe 88 PID 4584 wrote to memory of 4288 4584 see.exe 88 PID 4584 wrote to memory of 4288 4584 see.exe 88 PID 4584 wrote to memory of 4288 4584 see.exe 88 PID 4584 wrote to memory of 4288 4584 see.exe 88 PID 4584 wrote to memory of 4288 4584 see.exe 88 PID 4584 wrote to memory of 4288 4584 see.exe 88 PID 4584 wrote to memory of 4288 4584 see.exe 88 PID 4584 wrote to memory of 4288 4584 see.exe 88 PID 4584 wrote to memory of 4288 4584 see.exe 88 PID 4584 wrote to memory of 4680 4584 see.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\2cd58fe6356962d493074c403480143a8aaa10e0d2aa9850464bc5b61ff5bab1.exe"C:\Users\Admin\AppData\Local\Temp\2cd58fe6356962d493074c403480143a8aaa10e0d2aa9850464bc5b61ff5bab1.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Users\Admin\AppData\Roaming\lanko\see.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:2092
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:3900
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:2924
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:2964
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:4288
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:4680
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:400
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:432
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:3716
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:1456
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:3192
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:2460
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:1596
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:1592
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:3908
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:1324
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:428
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:1812
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:2328
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:4532
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:3920
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:2800
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:4664
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:2248
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:1012
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:4384
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:4676
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:3688
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:3440
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:4356
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:3424
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:3960
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:4408
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:1144
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:1648
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:4160
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:4892
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:8
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:4816
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:4456
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:1796
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:3540
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:2728
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:3952
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:1652
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:3624
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:1288
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:4716
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:3604
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:1140
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:3924
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:2676
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:1196
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:1372
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:2564
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:1412
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:4004
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:3784
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\lanko\see.exe"3⤵PID:4744
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
768KB
MD522df29ca44e19211d3630e84ec0eeb01
SHA1ae81fa6e0f616f8c1ff8c284d793bd2b057bfd9e
SHA2562cd58fe6356962d493074c403480143a8aaa10e0d2aa9850464bc5b61ff5bab1
SHA5124800b4275499b068ab2f4cebc6ed9e58f9dcd5955d2321b5e048e349c6ab2b501a8bed146fdf2cb60c39820676161ef7f39bf5c758455f27fb6383713004a59d
-
Filesize
768KB
MD522df29ca44e19211d3630e84ec0eeb01
SHA1ae81fa6e0f616f8c1ff8c284d793bd2b057bfd9e
SHA2562cd58fe6356962d493074c403480143a8aaa10e0d2aa9850464bc5b61ff5bab1
SHA5124800b4275499b068ab2f4cebc6ed9e58f9dcd5955d2321b5e048e349c6ab2b501a8bed146fdf2cb60c39820676161ef7f39bf5c758455f27fb6383713004a59d