Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 10:00
Static task
static1
Behavioral task
behavioral1
Sample
77e8c0273519c3e171ca236bb9632e8ce9805ca8709f881dbe04958d77cd911c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
77e8c0273519c3e171ca236bb9632e8ce9805ca8709f881dbe04958d77cd911c.exe
Resource
win10v2004-20220901-en
General
-
Target
77e8c0273519c3e171ca236bb9632e8ce9805ca8709f881dbe04958d77cd911c.exe
-
Size
1.8MB
-
MD5
f0735b19049ea3f9fedea91d5cc0c4f5
-
SHA1
ba0ed610606c05ddba9da100c3d62cbbe72fe216
-
SHA256
77e8c0273519c3e171ca236bb9632e8ce9805ca8709f881dbe04958d77cd911c
-
SHA512
8517c8624ef5754ef446af68f372013763a62f0274252d576ed6545f6d9b82f04e467881a845ede1de5a6eb88bfd28e85d41dc849d13285dd576c384423c8f96
-
SSDEEP
3072:1+kZqVeInSk82TfatZ9mD5fvNj6kECsjZ:1jaSk8iCtPmD5Hl6ysN
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
Processes:
winlogon.exewinlogon.exewinlogon.exewinlogon.exepid process 2352 winlogon.exe 3140 winlogon.exe 232 winlogon.exe 1560 winlogon.exe -
Processes:
resource yara_rule behavioral2/memory/3080-134-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/3080-136-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/3080-137-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/3080-140-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/3080-145-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/3140-150-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/3140-151-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/3140-154-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/3140-158-0x0000000000400000-0x000000000041C000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
77e8c0273519c3e171ca236bb9632e8ce9805ca8709f881dbe04958d77cd911c.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 77e8c0273519c3e171ca236bb9632e8ce9805ca8709f881dbe04958d77cd911c.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
77e8c0273519c3e171ca236bb9632e8ce9805ca8709f881dbe04958d77cd911c.exewinlogon.exewinlogon.exedescription pid process target process PID 1516 set thread context of 3080 1516 77e8c0273519c3e171ca236bb9632e8ce9805ca8709f881dbe04958d77cd911c.exe 77e8c0273519c3e171ca236bb9632e8ce9805ca8709f881dbe04958d77cd911c.exe PID 2352 set thread context of 3140 2352 winlogon.exe winlogon.exe PID 3140 set thread context of 232 3140 winlogon.exe winlogon.exe PID 3140 set thread context of 1560 3140 winlogon.exe winlogon.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1044 232 WerFault.exe winlogon.exe 2348 1560 WerFault.exe winlogon.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
77e8c0273519c3e171ca236bb9632e8ce9805ca8709f881dbe04958d77cd911c.exewinlogon.exepid process 3080 77e8c0273519c3e171ca236bb9632e8ce9805ca8709f881dbe04958d77cd911c.exe 3140 winlogon.exe -
Suspicious use of WriteProcessMemory 41 IoCs
Processes:
77e8c0273519c3e171ca236bb9632e8ce9805ca8709f881dbe04958d77cd911c.exe77e8c0273519c3e171ca236bb9632e8ce9805ca8709f881dbe04958d77cd911c.exewinlogon.exewinlogon.exedescription pid process target process PID 1516 wrote to memory of 4040 1516 77e8c0273519c3e171ca236bb9632e8ce9805ca8709f881dbe04958d77cd911c.exe svchost.exe PID 1516 wrote to memory of 4040 1516 77e8c0273519c3e171ca236bb9632e8ce9805ca8709f881dbe04958d77cd911c.exe svchost.exe PID 1516 wrote to memory of 4040 1516 77e8c0273519c3e171ca236bb9632e8ce9805ca8709f881dbe04958d77cd911c.exe svchost.exe PID 1516 wrote to memory of 3080 1516 77e8c0273519c3e171ca236bb9632e8ce9805ca8709f881dbe04958d77cd911c.exe 77e8c0273519c3e171ca236bb9632e8ce9805ca8709f881dbe04958d77cd911c.exe PID 1516 wrote to memory of 3080 1516 77e8c0273519c3e171ca236bb9632e8ce9805ca8709f881dbe04958d77cd911c.exe 77e8c0273519c3e171ca236bb9632e8ce9805ca8709f881dbe04958d77cd911c.exe PID 1516 wrote to memory of 3080 1516 77e8c0273519c3e171ca236bb9632e8ce9805ca8709f881dbe04958d77cd911c.exe 77e8c0273519c3e171ca236bb9632e8ce9805ca8709f881dbe04958d77cd911c.exe PID 1516 wrote to memory of 3080 1516 77e8c0273519c3e171ca236bb9632e8ce9805ca8709f881dbe04958d77cd911c.exe 77e8c0273519c3e171ca236bb9632e8ce9805ca8709f881dbe04958d77cd911c.exe PID 1516 wrote to memory of 3080 1516 77e8c0273519c3e171ca236bb9632e8ce9805ca8709f881dbe04958d77cd911c.exe 77e8c0273519c3e171ca236bb9632e8ce9805ca8709f881dbe04958d77cd911c.exe PID 1516 wrote to memory of 3080 1516 77e8c0273519c3e171ca236bb9632e8ce9805ca8709f881dbe04958d77cd911c.exe 77e8c0273519c3e171ca236bb9632e8ce9805ca8709f881dbe04958d77cd911c.exe PID 1516 wrote to memory of 3080 1516 77e8c0273519c3e171ca236bb9632e8ce9805ca8709f881dbe04958d77cd911c.exe 77e8c0273519c3e171ca236bb9632e8ce9805ca8709f881dbe04958d77cd911c.exe PID 1516 wrote to memory of 3080 1516 77e8c0273519c3e171ca236bb9632e8ce9805ca8709f881dbe04958d77cd911c.exe 77e8c0273519c3e171ca236bb9632e8ce9805ca8709f881dbe04958d77cd911c.exe PID 3080 wrote to memory of 2352 3080 77e8c0273519c3e171ca236bb9632e8ce9805ca8709f881dbe04958d77cd911c.exe winlogon.exe PID 3080 wrote to memory of 2352 3080 77e8c0273519c3e171ca236bb9632e8ce9805ca8709f881dbe04958d77cd911c.exe winlogon.exe PID 3080 wrote to memory of 2352 3080 77e8c0273519c3e171ca236bb9632e8ce9805ca8709f881dbe04958d77cd911c.exe winlogon.exe PID 2352 wrote to memory of 2504 2352 winlogon.exe svchost.exe PID 2352 wrote to memory of 2504 2352 winlogon.exe svchost.exe PID 2352 wrote to memory of 2504 2352 winlogon.exe svchost.exe PID 2352 wrote to memory of 3140 2352 winlogon.exe winlogon.exe PID 2352 wrote to memory of 3140 2352 winlogon.exe winlogon.exe PID 2352 wrote to memory of 3140 2352 winlogon.exe winlogon.exe PID 2352 wrote to memory of 3140 2352 winlogon.exe winlogon.exe PID 2352 wrote to memory of 3140 2352 winlogon.exe winlogon.exe PID 2352 wrote to memory of 3140 2352 winlogon.exe winlogon.exe PID 2352 wrote to memory of 3140 2352 winlogon.exe winlogon.exe PID 2352 wrote to memory of 3140 2352 winlogon.exe winlogon.exe PID 3140 wrote to memory of 232 3140 winlogon.exe winlogon.exe PID 3140 wrote to memory of 232 3140 winlogon.exe winlogon.exe PID 3140 wrote to memory of 232 3140 winlogon.exe winlogon.exe PID 3140 wrote to memory of 232 3140 winlogon.exe winlogon.exe PID 3140 wrote to memory of 232 3140 winlogon.exe winlogon.exe PID 3140 wrote to memory of 232 3140 winlogon.exe winlogon.exe PID 3140 wrote to memory of 232 3140 winlogon.exe winlogon.exe PID 3140 wrote to memory of 232 3140 winlogon.exe winlogon.exe PID 3140 wrote to memory of 1560 3140 winlogon.exe winlogon.exe PID 3140 wrote to memory of 1560 3140 winlogon.exe winlogon.exe PID 3140 wrote to memory of 1560 3140 winlogon.exe winlogon.exe PID 3140 wrote to memory of 1560 3140 winlogon.exe winlogon.exe PID 3140 wrote to memory of 1560 3140 winlogon.exe winlogon.exe PID 3140 wrote to memory of 1560 3140 winlogon.exe winlogon.exe PID 3140 wrote to memory of 1560 3140 winlogon.exe winlogon.exe PID 3140 wrote to memory of 1560 3140 winlogon.exe winlogon.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\77e8c0273519c3e171ca236bb9632e8ce9805ca8709f881dbe04958d77cd911c.exe"C:\Users\Admin\AppData\Local\Temp\77e8c0273519c3e171ca236bb9632e8ce9805ca8709f881dbe04958d77cd911c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\\svchost.exe2⤵PID:4040
-
C:\Users\Admin\AppData\Local\Temp\77e8c0273519c3e171ca236bb9632e8ce9805ca8709f881dbe04958d77cd911c.exe
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\\svchost.exe4⤵PID:2504
-
C:\Users\Admin\E696D64614\winlogon.exe
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"5⤵
- Executes dropped EXE
PID:232 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 232 -s 126⤵
- Program crash
PID:1044 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"5⤵
- Executes dropped EXE
PID:1560 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1560 -s 126⤵
- Program crash
PID:2348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 232 -ip 2321⤵PID:228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1560 -ip 15601⤵PID:2076
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5f0735b19049ea3f9fedea91d5cc0c4f5
SHA1ba0ed610606c05ddba9da100c3d62cbbe72fe216
SHA25677e8c0273519c3e171ca236bb9632e8ce9805ca8709f881dbe04958d77cd911c
SHA5128517c8624ef5754ef446af68f372013763a62f0274252d576ed6545f6d9b82f04e467881a845ede1de5a6eb88bfd28e85d41dc849d13285dd576c384423c8f96
-
Filesize
1.8MB
MD5f0735b19049ea3f9fedea91d5cc0c4f5
SHA1ba0ed610606c05ddba9da100c3d62cbbe72fe216
SHA25677e8c0273519c3e171ca236bb9632e8ce9805ca8709f881dbe04958d77cd911c
SHA5128517c8624ef5754ef446af68f372013763a62f0274252d576ed6545f6d9b82f04e467881a845ede1de5a6eb88bfd28e85d41dc849d13285dd576c384423c8f96
-
Filesize
1.8MB
MD5f0735b19049ea3f9fedea91d5cc0c4f5
SHA1ba0ed610606c05ddba9da100c3d62cbbe72fe216
SHA25677e8c0273519c3e171ca236bb9632e8ce9805ca8709f881dbe04958d77cd911c
SHA5128517c8624ef5754ef446af68f372013763a62f0274252d576ed6545f6d9b82f04e467881a845ede1de5a6eb88bfd28e85d41dc849d13285dd576c384423c8f96
-
Filesize
1.8MB
MD5f0735b19049ea3f9fedea91d5cc0c4f5
SHA1ba0ed610606c05ddba9da100c3d62cbbe72fe216
SHA25677e8c0273519c3e171ca236bb9632e8ce9805ca8709f881dbe04958d77cd911c
SHA5128517c8624ef5754ef446af68f372013763a62f0274252d576ed6545f6d9b82f04e467881a845ede1de5a6eb88bfd28e85d41dc849d13285dd576c384423c8f96
-
Filesize
1.8MB
MD5f0735b19049ea3f9fedea91d5cc0c4f5
SHA1ba0ed610606c05ddba9da100c3d62cbbe72fe216
SHA25677e8c0273519c3e171ca236bb9632e8ce9805ca8709f881dbe04958d77cd911c
SHA5128517c8624ef5754ef446af68f372013763a62f0274252d576ed6545f6d9b82f04e467881a845ede1de5a6eb88bfd28e85d41dc849d13285dd576c384423c8f96