Analysis
-
max time kernel
158s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 10:01
Static task
static1
Behavioral task
behavioral1
Sample
0ac47dda8d3cb2482db0b10cd2ae4638f32c4d391be712683efc8f4ba69dae1c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0ac47dda8d3cb2482db0b10cd2ae4638f32c4d391be712683efc8f4ba69dae1c.exe
Resource
win10v2004-20220812-en
General
-
Target
0ac47dda8d3cb2482db0b10cd2ae4638f32c4d391be712683efc8f4ba69dae1c.exe
-
Size
459KB
-
MD5
e9aeafc92e21b4def3a74ff327b73fee
-
SHA1
695720f543b00cdec8b5cd7b69f23837e2a7b4ba
-
SHA256
0ac47dda8d3cb2482db0b10cd2ae4638f32c4d391be712683efc8f4ba69dae1c
-
SHA512
a044cb257d962596e78a9ada15629bdfbe59ce013095adb3a648cfe3cf43c3881eeef5eec3eb7844c68053ec5035216864a7e63780faf8ba542b7192e53974ab
-
SSDEEP
6144:ujuuRW+fiGP25VqzRB/9vkPceNEsrRgDFWGfwvkfzzgNqA0fJXnIZOF:ujub/GeD8HDeNEsr+cGfwvk7ze0iMF
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
0ac47dda8d3cb2482db0b10cd2ae4638f32c4d391be712683efc8f4ba69dae1c.exepid process 4572 0ac47dda8d3cb2482db0b10cd2ae4638f32c4d391be712683efc8f4ba69dae1c.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
0ac47dda8d3cb2482db0b10cd2ae4638f32c4d391be712683efc8f4ba69dae1c.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 0ac47dda8d3cb2482db0b10cd2ae4638f32c4d391be712683efc8f4ba69dae1c.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WPmM1jWh05 = "C:\\Users\\Admin\\AppData\\Roaming\\FfmhvzQg\\tjg8vrS.exe.lnk" reg.exe -
Drops desktop.ini file(s) 2 IoCs
Processes:
0ac47dda8d3cb2482db0b10cd2ae4638f32c4d391be712683efc8f4ba69dae1c.exedescription ioc process File created C:\Windows\assembly\Desktop.ini 0ac47dda8d3cb2482db0b10cd2ae4638f32c4d391be712683efc8f4ba69dae1c.exe File opened for modification C:\Windows\assembly\Desktop.ini 0ac47dda8d3cb2482db0b10cd2ae4638f32c4d391be712683efc8f4ba69dae1c.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
0ac47dda8d3cb2482db0b10cd2ae4638f32c4d391be712683efc8f4ba69dae1c.exedescription pid process target process PID 908 set thread context of 4572 908 0ac47dda8d3cb2482db0b10cd2ae4638f32c4d391be712683efc8f4ba69dae1c.exe 0ac47dda8d3cb2482db0b10cd2ae4638f32c4d391be712683efc8f4ba69dae1c.exe -
Drops file in Windows directory 3 IoCs
Processes:
0ac47dda8d3cb2482db0b10cd2ae4638f32c4d391be712683efc8f4ba69dae1c.exedescription ioc process File opened for modification C:\Windows\assembly 0ac47dda8d3cb2482db0b10cd2ae4638f32c4d391be712683efc8f4ba69dae1c.exe File created C:\Windows\assembly\Desktop.ini 0ac47dda8d3cb2482db0b10cd2ae4638f32c4d391be712683efc8f4ba69dae1c.exe File opened for modification C:\Windows\assembly\Desktop.ini 0ac47dda8d3cb2482db0b10cd2ae4638f32c4d391be712683efc8f4ba69dae1c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
0ac47dda8d3cb2482db0b10cd2ae4638f32c4d391be712683efc8f4ba69dae1c.exepid process 908 0ac47dda8d3cb2482db0b10cd2ae4638f32c4d391be712683efc8f4ba69dae1c.exe 908 0ac47dda8d3cb2482db0b10cd2ae4638f32c4d391be712683efc8f4ba69dae1c.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
0ac47dda8d3cb2482db0b10cd2ae4638f32c4d391be712683efc8f4ba69dae1c.exepid process 4572 0ac47dda8d3cb2482db0b10cd2ae4638f32c4d391be712683efc8f4ba69dae1c.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
0ac47dda8d3cb2482db0b10cd2ae4638f32c4d391be712683efc8f4ba69dae1c.exe0ac47dda8d3cb2482db0b10cd2ae4638f32c4d391be712683efc8f4ba69dae1c.exedescription pid process Token: SeDebugPrivilege 908 0ac47dda8d3cb2482db0b10cd2ae4638f32c4d391be712683efc8f4ba69dae1c.exe Token: SeDebugPrivilege 4572 0ac47dda8d3cb2482db0b10cd2ae4638f32c4d391be712683efc8f4ba69dae1c.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
0ac47dda8d3cb2482db0b10cd2ae4638f32c4d391be712683efc8f4ba69dae1c.exepid process 4572 0ac47dda8d3cb2482db0b10cd2ae4638f32c4d391be712683efc8f4ba69dae1c.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
0ac47dda8d3cb2482db0b10cd2ae4638f32c4d391be712683efc8f4ba69dae1c.execmd.exedescription pid process target process PID 908 wrote to memory of 720 908 0ac47dda8d3cb2482db0b10cd2ae4638f32c4d391be712683efc8f4ba69dae1c.exe cmd.exe PID 908 wrote to memory of 720 908 0ac47dda8d3cb2482db0b10cd2ae4638f32c4d391be712683efc8f4ba69dae1c.exe cmd.exe PID 908 wrote to memory of 720 908 0ac47dda8d3cb2482db0b10cd2ae4638f32c4d391be712683efc8f4ba69dae1c.exe cmd.exe PID 720 wrote to memory of 2028 720 cmd.exe reg.exe PID 720 wrote to memory of 2028 720 cmd.exe reg.exe PID 720 wrote to memory of 2028 720 cmd.exe reg.exe PID 908 wrote to memory of 4572 908 0ac47dda8d3cb2482db0b10cd2ae4638f32c4d391be712683efc8f4ba69dae1c.exe 0ac47dda8d3cb2482db0b10cd2ae4638f32c4d391be712683efc8f4ba69dae1c.exe PID 908 wrote to memory of 4572 908 0ac47dda8d3cb2482db0b10cd2ae4638f32c4d391be712683efc8f4ba69dae1c.exe 0ac47dda8d3cb2482db0b10cd2ae4638f32c4d391be712683efc8f4ba69dae1c.exe PID 908 wrote to memory of 4572 908 0ac47dda8d3cb2482db0b10cd2ae4638f32c4d391be712683efc8f4ba69dae1c.exe 0ac47dda8d3cb2482db0b10cd2ae4638f32c4d391be712683efc8f4ba69dae1c.exe PID 908 wrote to memory of 4572 908 0ac47dda8d3cb2482db0b10cd2ae4638f32c4d391be712683efc8f4ba69dae1c.exe 0ac47dda8d3cb2482db0b10cd2ae4638f32c4d391be712683efc8f4ba69dae1c.exe PID 908 wrote to memory of 4572 908 0ac47dda8d3cb2482db0b10cd2ae4638f32c4d391be712683efc8f4ba69dae1c.exe 0ac47dda8d3cb2482db0b10cd2ae4638f32c4d391be712683efc8f4ba69dae1c.exe PID 908 wrote to memory of 4572 908 0ac47dda8d3cb2482db0b10cd2ae4638f32c4d391be712683efc8f4ba69dae1c.exe 0ac47dda8d3cb2482db0b10cd2ae4638f32c4d391be712683efc8f4ba69dae1c.exe PID 908 wrote to memory of 4572 908 0ac47dda8d3cb2482db0b10cd2ae4638f32c4d391be712683efc8f4ba69dae1c.exe 0ac47dda8d3cb2482db0b10cd2ae4638f32c4d391be712683efc8f4ba69dae1c.exe PID 908 wrote to memory of 4572 908 0ac47dda8d3cb2482db0b10cd2ae4638f32c4d391be712683efc8f4ba69dae1c.exe 0ac47dda8d3cb2482db0b10cd2ae4638f32c4d391be712683efc8f4ba69dae1c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ac47dda8d3cb2482db0b10cd2ae4638f32c4d391be712683efc8f4ba69dae1c.exe"C:\Users\Admin\AppData\Local\Temp\0ac47dda8d3cb2482db0b10cd2ae4638f32c4d391be712683efc8f4ba69dae1c.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "WPmM1jWh05" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\FfmhvzQg\tjg8vrS.exe.lnk"2⤵
- Suspicious use of WriteProcessMemory
PID:720 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "WPmM1jWh05" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\FfmhvzQg\tjg8vrS.exe.lnk"3⤵
- Adds Run key to start application
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\0ac47dda8d3cb2482db0b10cd2ae4638f32c4d391be712683efc8f4ba69dae1c.exe"C:\Users\Admin\AppData\Local\Temp\0ac47dda8d3cb2482db0b10cd2ae4638f32c4d391be712683efc8f4ba69dae1c.exe"2⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4572
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\0ac47dda8d3cb2482db0b10cd2ae4638f32c4d391be712683efc8f4ba69dae1c.exe
Filesize459KB
MD5e9aeafc92e21b4def3a74ff327b73fee
SHA1695720f543b00cdec8b5cd7b69f23837e2a7b4ba
SHA2560ac47dda8d3cb2482db0b10cd2ae4638f32c4d391be712683efc8f4ba69dae1c
SHA512a044cb257d962596e78a9ada15629bdfbe59ce013095adb3a648cfe3cf43c3881eeef5eec3eb7844c68053ec5035216864a7e63780faf8ba542b7192e53974ab