Analysis
-
max time kernel
150s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2022, 17:06
Static task
static1
Behavioral task
behavioral1
Sample
2cba3a53b6f768ff778b83c59e09f4a15c3f1a8ed4f07539e304179ed6b1221f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2cba3a53b6f768ff778b83c59e09f4a15c3f1a8ed4f07539e304179ed6b1221f.exe
Resource
win10v2004-20221111-en
General
-
Target
2cba3a53b6f768ff778b83c59e09f4a15c3f1a8ed4f07539e304179ed6b1221f.exe
-
Size
53KB
-
MD5
3049db80087caf34c1ae3b094a7ca880
-
SHA1
f936609503eb51438b3d30d26e03c4fcae19785a
-
SHA256
2cba3a53b6f768ff778b83c59e09f4a15c3f1a8ed4f07539e304179ed6b1221f
-
SHA512
392c4727835b28c922fc2f8469c0321e29bd6c762159dab1e3fbfa3f892ed9141b994b5c5f60527c116c454d194788850bd5a69dbe0bb6dc4c79a26ea7051d33
-
SSDEEP
768:lU/Pl86Jgr/SuuEf+rG9WTnu2GB581M6HTjHHGqvtq1ssE71iwM4vYNK2qlXQHCv:0WWbrBJ/h2k9M4vY0lAHCCrk3eWO2
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4476 Explorer.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2060 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Control Panel\International\Geo\Nation 2cba3a53b6f768ff778b83c59e09f4a15c3f1a8ed4f07539e304179ed6b1221f.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ac439cebf616f4d8bde17b2a53a518ac.exe Explorer.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ac439cebf616f4d8bde17b2a53a518ac.exe Explorer.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ac439cebf616f4d8bde17b2a53a518ac = "\"C:\\ProgramData\\Explorer.exe\" .." Explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ac439cebf616f4d8bde17b2a53a518ac = "\"C:\\ProgramData\\Explorer.exe\" .." Explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 4476 Explorer.exe 4476 Explorer.exe 4476 Explorer.exe 4476 Explorer.exe 4476 Explorer.exe 4476 Explorer.exe 4476 Explorer.exe 4476 Explorer.exe 4476 Explorer.exe 4476 Explorer.exe 4476 Explorer.exe 4476 Explorer.exe 4476 Explorer.exe 4476 Explorer.exe 4476 Explorer.exe 4476 Explorer.exe 4476 Explorer.exe 4476 Explorer.exe 4476 Explorer.exe 4476 Explorer.exe 4476 Explorer.exe 4476 Explorer.exe 4476 Explorer.exe 4476 Explorer.exe 4476 Explorer.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4476 Explorer.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2692 wrote to memory of 4476 2692 2cba3a53b6f768ff778b83c59e09f4a15c3f1a8ed4f07539e304179ed6b1221f.exe 82 PID 2692 wrote to memory of 4476 2692 2cba3a53b6f768ff778b83c59e09f4a15c3f1a8ed4f07539e304179ed6b1221f.exe 82 PID 2692 wrote to memory of 4476 2692 2cba3a53b6f768ff778b83c59e09f4a15c3f1a8ed4f07539e304179ed6b1221f.exe 82 PID 4476 wrote to memory of 2060 4476 Explorer.exe 83 PID 4476 wrote to memory of 2060 4476 Explorer.exe 83 PID 4476 wrote to memory of 2060 4476 Explorer.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\2cba3a53b6f768ff778b83c59e09f4a15c3f1a8ed4f07539e304179ed6b1221f.exe"C:\Users\Admin\AppData\Local\Temp\2cba3a53b6f768ff778b83c59e09f4a15c3f1a8ed4f07539e304179ed6b1221f.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\ProgramData\Explorer.exe"C:\ProgramData\Explorer.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\ProgramData\Explorer.exe" "Explorer.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:2060
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD53049db80087caf34c1ae3b094a7ca880
SHA1f936609503eb51438b3d30d26e03c4fcae19785a
SHA2562cba3a53b6f768ff778b83c59e09f4a15c3f1a8ed4f07539e304179ed6b1221f
SHA512392c4727835b28c922fc2f8469c0321e29bd6c762159dab1e3fbfa3f892ed9141b994b5c5f60527c116c454d194788850bd5a69dbe0bb6dc4c79a26ea7051d33
-
Filesize
53KB
MD53049db80087caf34c1ae3b094a7ca880
SHA1f936609503eb51438b3d30d26e03c4fcae19785a
SHA2562cba3a53b6f768ff778b83c59e09f4a15c3f1a8ed4f07539e304179ed6b1221f
SHA512392c4727835b28c922fc2f8469c0321e29bd6c762159dab1e3fbfa3f892ed9141b994b5c5f60527c116c454d194788850bd5a69dbe0bb6dc4c79a26ea7051d33