Analysis
-
max time kernel
160s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2022 18:34
Static task
static1
Behavioral task
behavioral1
Sample
7ad17a294bc535c8e1d5c3033bd131d1fdc49fe03d7900c61ba64835f640652f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7ad17a294bc535c8e1d5c3033bd131d1fdc49fe03d7900c61ba64835f640652f.exe
Resource
win10v2004-20221111-en
General
-
Target
7ad17a294bc535c8e1d5c3033bd131d1fdc49fe03d7900c61ba64835f640652f.exe
-
Size
318KB
-
MD5
82d802a6ac29df8fe6be7a80669da4d5
-
SHA1
c80de466261ca7a0a5ebba3f349845cf8aee8535
-
SHA256
7ad17a294bc535c8e1d5c3033bd131d1fdc49fe03d7900c61ba64835f640652f
-
SHA512
d3bcabc05e0df8aaef55d33cbbf09fa673dbe58caa446a5f4decb8bc03add26e58b198853459c894c069e39a56180ac026ccce9f84e4875fff2b6e5b9eed7295
-
SSDEEP
6144:qe03LBlo3Y+4SAMEarbE4XT72juSTxBAEC7U0HGNC1xHuoDxi+PRUTS:qeS+1A0raHjnCQ0HY0Oou
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\AdobeFlashCheck,explorer.exe" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation 7ad17a294bc535c8e1d5c3033bd131d1fdc49fe03d7900c61ba64835f640652f.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4992 set thread context of 4492 4992 7ad17a294bc535c8e1d5c3033bd131d1fdc49fe03d7900c61ba64835f640652f.exe 84 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4992 7ad17a294bc535c8e1d5c3033bd131d1fdc49fe03d7900c61ba64835f640652f.exe 4992 7ad17a294bc535c8e1d5c3033bd131d1fdc49fe03d7900c61ba64835f640652f.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4492 7ad17a294bc535c8e1d5c3033bd131d1fdc49fe03d7900c61ba64835f640652f.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4992 7ad17a294bc535c8e1d5c3033bd131d1fdc49fe03d7900c61ba64835f640652f.exe Token: SeDebugPrivilege 4492 7ad17a294bc535c8e1d5c3033bd131d1fdc49fe03d7900c61ba64835f640652f.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4492 7ad17a294bc535c8e1d5c3033bd131d1fdc49fe03d7900c61ba64835f640652f.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4992 wrote to memory of 3288 4992 7ad17a294bc535c8e1d5c3033bd131d1fdc49fe03d7900c61ba64835f640652f.exe 81 PID 4992 wrote to memory of 3288 4992 7ad17a294bc535c8e1d5c3033bd131d1fdc49fe03d7900c61ba64835f640652f.exe 81 PID 4992 wrote to memory of 3288 4992 7ad17a294bc535c8e1d5c3033bd131d1fdc49fe03d7900c61ba64835f640652f.exe 81 PID 3288 wrote to memory of 3332 3288 cmd.exe 83 PID 3288 wrote to memory of 3332 3288 cmd.exe 83 PID 3288 wrote to memory of 3332 3288 cmd.exe 83 PID 4992 wrote to memory of 4492 4992 7ad17a294bc535c8e1d5c3033bd131d1fdc49fe03d7900c61ba64835f640652f.exe 84 PID 4992 wrote to memory of 4492 4992 7ad17a294bc535c8e1d5c3033bd131d1fdc49fe03d7900c61ba64835f640652f.exe 84 PID 4992 wrote to memory of 4492 4992 7ad17a294bc535c8e1d5c3033bd131d1fdc49fe03d7900c61ba64835f640652f.exe 84 PID 4992 wrote to memory of 4492 4992 7ad17a294bc535c8e1d5c3033bd131d1fdc49fe03d7900c61ba64835f640652f.exe 84 PID 4992 wrote to memory of 4492 4992 7ad17a294bc535c8e1d5c3033bd131d1fdc49fe03d7900c61ba64835f640652f.exe 84 PID 4992 wrote to memory of 4492 4992 7ad17a294bc535c8e1d5c3033bd131d1fdc49fe03d7900c61ba64835f640652f.exe 84 PID 4992 wrote to memory of 4492 4992 7ad17a294bc535c8e1d5c3033bd131d1fdc49fe03d7900c61ba64835f640652f.exe 84 PID 4992 wrote to memory of 4492 4992 7ad17a294bc535c8e1d5c3033bd131d1fdc49fe03d7900c61ba64835f640652f.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ad17a294bc535c8e1d5c3033bd131d1fdc49fe03d7900c61ba64835f640652f.exe"C:\Users\Admin\AppData\Local\Temp\7ad17a294bc535c8e1d5c3033bd131d1fdc49fe03d7900c61ba64835f640652f.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v shell /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Adobe\AdobeFlashCheck,explorer.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v shell /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Adobe\AdobeFlashCheck,explorer.exe"3⤵
- Modifies WinLogon for persistence
PID:3332
-
-
-
C:\Users\Admin\AppData\Local\Temp\7ad17a294bc535c8e1d5c3033bd131d1fdc49fe03d7900c61ba64835f640652f.exe"C:\Users\Admin\AppData\Local\Temp\7ad17a294bc535c8e1d5c3033bd131d1fdc49fe03d7900c61ba64835f640652f.exe"2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4492
-