Analysis
-
max time kernel
248s -
max time network
261s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 09:49
Static task
static1
Behavioral task
behavioral1
Sample
66cbebbd63941908191fc300c5d2eb66cc76e27d07bed058b1edf92db98ede0c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
66cbebbd63941908191fc300c5d2eb66cc76e27d07bed058b1edf92db98ede0c.exe
Resource
win10v2004-20221111-en
General
-
Target
66cbebbd63941908191fc300c5d2eb66cc76e27d07bed058b1edf92db98ede0c.exe
-
Size
399KB
-
MD5
e05211a125aaa576aaea4d34784feeb7
-
SHA1
a72fe7d8f9db241d478582797e3be33f47cf376d
-
SHA256
66cbebbd63941908191fc300c5d2eb66cc76e27d07bed058b1edf92db98ede0c
-
SHA512
8075da1e31d5eef99c062f16a6cff91607ffe2012a9253c369d8d71ab2c6834d13f0f54dfd19bc0722bc164d6a6239720dc46a3531d15d4ffe3c9192b5a94f1d
-
SSDEEP
1536:7I17SYMoQEeZ3tmnunbHq7eOHc3Hbuk93VMjBmGQSbcW+gZ372Fc0h:i4otehtmnuLqdHguq3pGz4W+g
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
winlogon.exewinlogon.exepid process 4656 winlogon.exe 4940 winlogon.exe -
Processes:
resource yara_rule behavioral2/memory/3844-133-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/3844-135-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/3844-136-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/3844-139-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/3844-145-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/4940-152-0x0000000000400000-0x000000000041A000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
66cbebbd63941908191fc300c5d2eb66cc76e27d07bed058b1edf92db98ede0c.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation 66cbebbd63941908191fc300c5d2eb66cc76e27d07bed058b1edf92db98ede0c.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
66cbebbd63941908191fc300c5d2eb66cc76e27d07bed058b1edf92db98ede0c.exewinlogon.exedescription pid process target process PID 2056 set thread context of 3844 2056 66cbebbd63941908191fc300c5d2eb66cc76e27d07bed058b1edf92db98ede0c.exe 66cbebbd63941908191fc300c5d2eb66cc76e27d07bed058b1edf92db98ede0c.exe PID 4656 set thread context of 4940 4656 winlogon.exe winlogon.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
66cbebbd63941908191fc300c5d2eb66cc76e27d07bed058b1edf92db98ede0c.exewinlogon.exepid process 3844 66cbebbd63941908191fc300c5d2eb66cc76e27d07bed058b1edf92db98ede0c.exe 4940 winlogon.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
66cbebbd63941908191fc300c5d2eb66cc76e27d07bed058b1edf92db98ede0c.exe66cbebbd63941908191fc300c5d2eb66cc76e27d07bed058b1edf92db98ede0c.exewinlogon.exedescription pid process target process PID 2056 wrote to memory of 3844 2056 66cbebbd63941908191fc300c5d2eb66cc76e27d07bed058b1edf92db98ede0c.exe 66cbebbd63941908191fc300c5d2eb66cc76e27d07bed058b1edf92db98ede0c.exe PID 2056 wrote to memory of 3844 2056 66cbebbd63941908191fc300c5d2eb66cc76e27d07bed058b1edf92db98ede0c.exe 66cbebbd63941908191fc300c5d2eb66cc76e27d07bed058b1edf92db98ede0c.exe PID 2056 wrote to memory of 3844 2056 66cbebbd63941908191fc300c5d2eb66cc76e27d07bed058b1edf92db98ede0c.exe 66cbebbd63941908191fc300c5d2eb66cc76e27d07bed058b1edf92db98ede0c.exe PID 2056 wrote to memory of 3844 2056 66cbebbd63941908191fc300c5d2eb66cc76e27d07bed058b1edf92db98ede0c.exe 66cbebbd63941908191fc300c5d2eb66cc76e27d07bed058b1edf92db98ede0c.exe PID 2056 wrote to memory of 3844 2056 66cbebbd63941908191fc300c5d2eb66cc76e27d07bed058b1edf92db98ede0c.exe 66cbebbd63941908191fc300c5d2eb66cc76e27d07bed058b1edf92db98ede0c.exe PID 2056 wrote to memory of 3844 2056 66cbebbd63941908191fc300c5d2eb66cc76e27d07bed058b1edf92db98ede0c.exe 66cbebbd63941908191fc300c5d2eb66cc76e27d07bed058b1edf92db98ede0c.exe PID 2056 wrote to memory of 3844 2056 66cbebbd63941908191fc300c5d2eb66cc76e27d07bed058b1edf92db98ede0c.exe 66cbebbd63941908191fc300c5d2eb66cc76e27d07bed058b1edf92db98ede0c.exe PID 2056 wrote to memory of 3844 2056 66cbebbd63941908191fc300c5d2eb66cc76e27d07bed058b1edf92db98ede0c.exe 66cbebbd63941908191fc300c5d2eb66cc76e27d07bed058b1edf92db98ede0c.exe PID 3844 wrote to memory of 4656 3844 66cbebbd63941908191fc300c5d2eb66cc76e27d07bed058b1edf92db98ede0c.exe winlogon.exe PID 3844 wrote to memory of 4656 3844 66cbebbd63941908191fc300c5d2eb66cc76e27d07bed058b1edf92db98ede0c.exe winlogon.exe PID 3844 wrote to memory of 4656 3844 66cbebbd63941908191fc300c5d2eb66cc76e27d07bed058b1edf92db98ede0c.exe winlogon.exe PID 4656 wrote to memory of 4940 4656 winlogon.exe winlogon.exe PID 4656 wrote to memory of 4940 4656 winlogon.exe winlogon.exe PID 4656 wrote to memory of 4940 4656 winlogon.exe winlogon.exe PID 4656 wrote to memory of 4940 4656 winlogon.exe winlogon.exe PID 4656 wrote to memory of 4940 4656 winlogon.exe winlogon.exe PID 4656 wrote to memory of 4940 4656 winlogon.exe winlogon.exe PID 4656 wrote to memory of 4940 4656 winlogon.exe winlogon.exe PID 4656 wrote to memory of 4940 4656 winlogon.exe winlogon.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\66cbebbd63941908191fc300c5d2eb66cc76e27d07bed058b1edf92db98ede0c.exe"C:\Users\Admin\AppData\Local\Temp\66cbebbd63941908191fc300c5d2eb66cc76e27d07bed058b1edf92db98ede0c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\66cbebbd63941908191fc300c5d2eb66cc76e27d07bed058b1edf92db98ede0c.exe"C:\Users\Admin\AppData\Local\Temp\66cbebbd63941908191fc300c5d2eb66cc76e27d07bed058b1edf92db98ede0c.exe"2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4940
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
399KB
MD5e05211a125aaa576aaea4d34784feeb7
SHA1a72fe7d8f9db241d478582797e3be33f47cf376d
SHA25666cbebbd63941908191fc300c5d2eb66cc76e27d07bed058b1edf92db98ede0c
SHA5128075da1e31d5eef99c062f16a6cff91607ffe2012a9253c369d8d71ab2c6834d13f0f54dfd19bc0722bc164d6a6239720dc46a3531d15d4ffe3c9192b5a94f1d
-
Filesize
399KB
MD5e05211a125aaa576aaea4d34784feeb7
SHA1a72fe7d8f9db241d478582797e3be33f47cf376d
SHA25666cbebbd63941908191fc300c5d2eb66cc76e27d07bed058b1edf92db98ede0c
SHA5128075da1e31d5eef99c062f16a6cff91607ffe2012a9253c369d8d71ab2c6834d13f0f54dfd19bc0722bc164d6a6239720dc46a3531d15d4ffe3c9192b5a94f1d
-
Filesize
399KB
MD5e05211a125aaa576aaea4d34784feeb7
SHA1a72fe7d8f9db241d478582797e3be33f47cf376d
SHA25666cbebbd63941908191fc300c5d2eb66cc76e27d07bed058b1edf92db98ede0c
SHA5128075da1e31d5eef99c062f16a6cff91607ffe2012a9253c369d8d71ab2c6834d13f0f54dfd19bc0722bc164d6a6239720dc46a3531d15d4ffe3c9192b5a94f1d