Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 10:00
Static task
static1
Behavioral task
behavioral1
Sample
672ddc8560117901848158f7ed21dddb8beff6c47a6af031e1c9828505e8fc9f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
672ddc8560117901848158f7ed21dddb8beff6c47a6af031e1c9828505e8fc9f.exe
Resource
win10v2004-20220812-en
General
-
Target
672ddc8560117901848158f7ed21dddb8beff6c47a6af031e1c9828505e8fc9f.exe
-
Size
1.9MB
-
MD5
4600f3fefc27a218542df4a1f207b9e0
-
SHA1
14d425be26dec14c5738a046bbe2500683d4861b
-
SHA256
672ddc8560117901848158f7ed21dddb8beff6c47a6af031e1c9828505e8fc9f
-
SHA512
bf94493894e5453002a5bda61c992610042f724337e2c50026e5cd621588860a509e2c08cf3f873ce784d9eb7071f4b5e58d4e9c4adcab7e73ca18aa1290d45b
-
SSDEEP
3072:1+kZqVeInSk82TfatZ9mD5fvNj6kECsjZ:1jaSk8iCtPmD5Hl6ysN
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
Processes:
winlogon.exewinlogon.exewinlogon.exewinlogon.exewinlogon.exepid process 5092 winlogon.exe 1628 winlogon.exe 2984 winlogon.exe 2792 winlogon.exe 5032 winlogon.exe -
Processes:
resource yara_rule behavioral2/memory/4780-134-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/4780-136-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/4780-137-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/4780-140-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/4780-145-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/1628-154-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/1628-158-0x0000000000400000-0x000000000041C000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
672ddc8560117901848158f7ed21dddb8beff6c47a6af031e1c9828505e8fc9f.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 672ddc8560117901848158f7ed21dddb8beff6c47a6af031e1c9828505e8fc9f.exe -
Suspicious use of SetThreadContext 5 IoCs
Processes:
672ddc8560117901848158f7ed21dddb8beff6c47a6af031e1c9828505e8fc9f.exewinlogon.exewinlogon.exedescription pid process target process PID 4072 set thread context of 4780 4072 672ddc8560117901848158f7ed21dddb8beff6c47a6af031e1c9828505e8fc9f.exe 672ddc8560117901848158f7ed21dddb8beff6c47a6af031e1c9828505e8fc9f.exe PID 5092 set thread context of 1628 5092 winlogon.exe winlogon.exe PID 1628 set thread context of 2984 1628 winlogon.exe winlogon.exe PID 1628 set thread context of 2792 1628 winlogon.exe winlogon.exe PID 1628 set thread context of 5032 1628 winlogon.exe winlogon.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 224 2984 WerFault.exe winlogon.exe 3136 2792 WerFault.exe winlogon.exe 4528 5032 WerFault.exe winlogon.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
672ddc8560117901848158f7ed21dddb8beff6c47a6af031e1c9828505e8fc9f.exewinlogon.exepid process 4780 672ddc8560117901848158f7ed21dddb8beff6c47a6af031e1c9828505e8fc9f.exe 1628 winlogon.exe -
Suspicious use of WriteProcessMemory 49 IoCs
Processes:
672ddc8560117901848158f7ed21dddb8beff6c47a6af031e1c9828505e8fc9f.exe672ddc8560117901848158f7ed21dddb8beff6c47a6af031e1c9828505e8fc9f.exewinlogon.exewinlogon.exedescription pid process target process PID 4072 wrote to memory of 1436 4072 672ddc8560117901848158f7ed21dddb8beff6c47a6af031e1c9828505e8fc9f.exe svchost.exe PID 4072 wrote to memory of 1436 4072 672ddc8560117901848158f7ed21dddb8beff6c47a6af031e1c9828505e8fc9f.exe svchost.exe PID 4072 wrote to memory of 1436 4072 672ddc8560117901848158f7ed21dddb8beff6c47a6af031e1c9828505e8fc9f.exe svchost.exe PID 4072 wrote to memory of 4780 4072 672ddc8560117901848158f7ed21dddb8beff6c47a6af031e1c9828505e8fc9f.exe 672ddc8560117901848158f7ed21dddb8beff6c47a6af031e1c9828505e8fc9f.exe PID 4072 wrote to memory of 4780 4072 672ddc8560117901848158f7ed21dddb8beff6c47a6af031e1c9828505e8fc9f.exe 672ddc8560117901848158f7ed21dddb8beff6c47a6af031e1c9828505e8fc9f.exe PID 4072 wrote to memory of 4780 4072 672ddc8560117901848158f7ed21dddb8beff6c47a6af031e1c9828505e8fc9f.exe 672ddc8560117901848158f7ed21dddb8beff6c47a6af031e1c9828505e8fc9f.exe PID 4072 wrote to memory of 4780 4072 672ddc8560117901848158f7ed21dddb8beff6c47a6af031e1c9828505e8fc9f.exe 672ddc8560117901848158f7ed21dddb8beff6c47a6af031e1c9828505e8fc9f.exe PID 4072 wrote to memory of 4780 4072 672ddc8560117901848158f7ed21dddb8beff6c47a6af031e1c9828505e8fc9f.exe 672ddc8560117901848158f7ed21dddb8beff6c47a6af031e1c9828505e8fc9f.exe PID 4072 wrote to memory of 4780 4072 672ddc8560117901848158f7ed21dddb8beff6c47a6af031e1c9828505e8fc9f.exe 672ddc8560117901848158f7ed21dddb8beff6c47a6af031e1c9828505e8fc9f.exe PID 4072 wrote to memory of 4780 4072 672ddc8560117901848158f7ed21dddb8beff6c47a6af031e1c9828505e8fc9f.exe 672ddc8560117901848158f7ed21dddb8beff6c47a6af031e1c9828505e8fc9f.exe PID 4072 wrote to memory of 4780 4072 672ddc8560117901848158f7ed21dddb8beff6c47a6af031e1c9828505e8fc9f.exe 672ddc8560117901848158f7ed21dddb8beff6c47a6af031e1c9828505e8fc9f.exe PID 4780 wrote to memory of 5092 4780 672ddc8560117901848158f7ed21dddb8beff6c47a6af031e1c9828505e8fc9f.exe winlogon.exe PID 4780 wrote to memory of 5092 4780 672ddc8560117901848158f7ed21dddb8beff6c47a6af031e1c9828505e8fc9f.exe winlogon.exe PID 4780 wrote to memory of 5092 4780 672ddc8560117901848158f7ed21dddb8beff6c47a6af031e1c9828505e8fc9f.exe winlogon.exe PID 5092 wrote to memory of 560 5092 winlogon.exe svchost.exe PID 5092 wrote to memory of 560 5092 winlogon.exe svchost.exe PID 5092 wrote to memory of 560 5092 winlogon.exe svchost.exe PID 5092 wrote to memory of 1628 5092 winlogon.exe winlogon.exe PID 5092 wrote to memory of 1628 5092 winlogon.exe winlogon.exe PID 5092 wrote to memory of 1628 5092 winlogon.exe winlogon.exe PID 5092 wrote to memory of 1628 5092 winlogon.exe winlogon.exe PID 5092 wrote to memory of 1628 5092 winlogon.exe winlogon.exe PID 5092 wrote to memory of 1628 5092 winlogon.exe winlogon.exe PID 5092 wrote to memory of 1628 5092 winlogon.exe winlogon.exe PID 5092 wrote to memory of 1628 5092 winlogon.exe winlogon.exe PID 1628 wrote to memory of 2984 1628 winlogon.exe winlogon.exe PID 1628 wrote to memory of 2984 1628 winlogon.exe winlogon.exe PID 1628 wrote to memory of 2984 1628 winlogon.exe winlogon.exe PID 1628 wrote to memory of 2984 1628 winlogon.exe winlogon.exe PID 1628 wrote to memory of 2984 1628 winlogon.exe winlogon.exe PID 1628 wrote to memory of 2984 1628 winlogon.exe winlogon.exe PID 1628 wrote to memory of 2984 1628 winlogon.exe winlogon.exe PID 1628 wrote to memory of 2984 1628 winlogon.exe winlogon.exe PID 1628 wrote to memory of 2792 1628 winlogon.exe winlogon.exe PID 1628 wrote to memory of 2792 1628 winlogon.exe winlogon.exe PID 1628 wrote to memory of 2792 1628 winlogon.exe winlogon.exe PID 1628 wrote to memory of 2792 1628 winlogon.exe winlogon.exe PID 1628 wrote to memory of 2792 1628 winlogon.exe winlogon.exe PID 1628 wrote to memory of 2792 1628 winlogon.exe winlogon.exe PID 1628 wrote to memory of 2792 1628 winlogon.exe winlogon.exe PID 1628 wrote to memory of 2792 1628 winlogon.exe winlogon.exe PID 1628 wrote to memory of 5032 1628 winlogon.exe winlogon.exe PID 1628 wrote to memory of 5032 1628 winlogon.exe winlogon.exe PID 1628 wrote to memory of 5032 1628 winlogon.exe winlogon.exe PID 1628 wrote to memory of 5032 1628 winlogon.exe winlogon.exe PID 1628 wrote to memory of 5032 1628 winlogon.exe winlogon.exe PID 1628 wrote to memory of 5032 1628 winlogon.exe winlogon.exe PID 1628 wrote to memory of 5032 1628 winlogon.exe winlogon.exe PID 1628 wrote to memory of 5032 1628 winlogon.exe winlogon.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\672ddc8560117901848158f7ed21dddb8beff6c47a6af031e1c9828505e8fc9f.exe"C:\Users\Admin\AppData\Local\Temp\672ddc8560117901848158f7ed21dddb8beff6c47a6af031e1c9828505e8fc9f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\\svchost.exe2⤵PID:1436
-
C:\Users\Admin\AppData\Local\Temp\672ddc8560117901848158f7ed21dddb8beff6c47a6af031e1c9828505e8fc9f.exe
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\\svchost.exe4⤵PID:560
-
C:\Users\Admin\E696D64614\winlogon.exe
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"5⤵
- Executes dropped EXE
PID:2984 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2984 -s 126⤵
- Program crash
PID:224 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"5⤵
- Executes dropped EXE
PID:2792 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2792 -s 126⤵
- Program crash
PID:3136 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"5⤵
- Executes dropped EXE
PID:5032 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5032 -s 126⤵
- Program crash
PID:4528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2984 -ip 29841⤵PID:4224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2792 -ip 27921⤵PID:4592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 5032 -ip 50321⤵PID:3176
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD54600f3fefc27a218542df4a1f207b9e0
SHA114d425be26dec14c5738a046bbe2500683d4861b
SHA256672ddc8560117901848158f7ed21dddb8beff6c47a6af031e1c9828505e8fc9f
SHA512bf94493894e5453002a5bda61c992610042f724337e2c50026e5cd621588860a509e2c08cf3f873ce784d9eb7071f4b5e58d4e9c4adcab7e73ca18aa1290d45b
-
Filesize
1.9MB
MD54600f3fefc27a218542df4a1f207b9e0
SHA114d425be26dec14c5738a046bbe2500683d4861b
SHA256672ddc8560117901848158f7ed21dddb8beff6c47a6af031e1c9828505e8fc9f
SHA512bf94493894e5453002a5bda61c992610042f724337e2c50026e5cd621588860a509e2c08cf3f873ce784d9eb7071f4b5e58d4e9c4adcab7e73ca18aa1290d45b
-
Filesize
1.9MB
MD54600f3fefc27a218542df4a1f207b9e0
SHA114d425be26dec14c5738a046bbe2500683d4861b
SHA256672ddc8560117901848158f7ed21dddb8beff6c47a6af031e1c9828505e8fc9f
SHA512bf94493894e5453002a5bda61c992610042f724337e2c50026e5cd621588860a509e2c08cf3f873ce784d9eb7071f4b5e58d4e9c4adcab7e73ca18aa1290d45b
-
Filesize
1.9MB
MD54600f3fefc27a218542df4a1f207b9e0
SHA114d425be26dec14c5738a046bbe2500683d4861b
SHA256672ddc8560117901848158f7ed21dddb8beff6c47a6af031e1c9828505e8fc9f
SHA512bf94493894e5453002a5bda61c992610042f724337e2c50026e5cd621588860a509e2c08cf3f873ce784d9eb7071f4b5e58d4e9c4adcab7e73ca18aa1290d45b
-
Filesize
1.9MB
MD54600f3fefc27a218542df4a1f207b9e0
SHA114d425be26dec14c5738a046bbe2500683d4861b
SHA256672ddc8560117901848158f7ed21dddb8beff6c47a6af031e1c9828505e8fc9f
SHA512bf94493894e5453002a5bda61c992610042f724337e2c50026e5cd621588860a509e2c08cf3f873ce784d9eb7071f4b5e58d4e9c4adcab7e73ca18aa1290d45b
-
Filesize
1.9MB
MD54600f3fefc27a218542df4a1f207b9e0
SHA114d425be26dec14c5738a046bbe2500683d4861b
SHA256672ddc8560117901848158f7ed21dddb8beff6c47a6af031e1c9828505e8fc9f
SHA512bf94493894e5453002a5bda61c992610042f724337e2c50026e5cd621588860a509e2c08cf3f873ce784d9eb7071f4b5e58d4e9c4adcab7e73ca18aa1290d45b