Analysis
-
max time kernel
153s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 11:01
Static task
static1
Behavioral task
behavioral1
Sample
af9b9586beab6e4bd73ddc22da4e7619561b3a9d452a1e9ba498784ea32e7eb9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
af9b9586beab6e4bd73ddc22da4e7619561b3a9d452a1e9ba498784ea32e7eb9.exe
Resource
win10v2004-20220812-en
General
-
Target
af9b9586beab6e4bd73ddc22da4e7619561b3a9d452a1e9ba498784ea32e7eb9.exe
-
Size
100KB
-
MD5
8ca303c4eb9cfbcd3b93f583511abfdf
-
SHA1
33fe4b8e965724143302b499934f1b5379b615a5
-
SHA256
af9b9586beab6e4bd73ddc22da4e7619561b3a9d452a1e9ba498784ea32e7eb9
-
SHA512
c5cb024a8e52eeb99b554f798b683fb1603ca5fe09470c671a817c544dcbc443ef6d88d588804e11a961ab25c8453a34ddaeb335892252f2ed4abf79b354c30e
-
SSDEEP
1536:9QxqcQu0yvmgEUs1rARbX/CJ+zsxm90BUNvE6V01Deo/k7:y/0gEUcr6bvvzsKp66oc7
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
5er9B5A.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\twext.exe," 5er9B5A.exe -
Executes dropped EXE 2 IoCs
Processes:
5er9B5A.exe5er9B5A.exepid process 4724 5er9B5A.exe 2192 5er9B5A.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
af9b9586beab6e4bd73ddc22da4e7619561b3a9d452a1e9ba498784ea32e7eb9.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation af9b9586beab6e4bd73ddc22da4e7619561b3a9d452a1e9ba498784ea32e7eb9.exe -
Drops file in System32 directory 2 IoCs
Processes:
5er9B5A.exedescription ioc process File opened for modification C:\Windows\SysWOW64\twext.exe 5er9B5A.exe File created C:\Windows\SysWOW64\twext.exe 5er9B5A.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
5er9B5A.exedescription pid process target process PID 4724 set thread context of 2192 4724 5er9B5A.exe 5er9B5A.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
5er9B5A.exepid process 2192 5er9B5A.exe 2192 5er9B5A.exe 2192 5er9B5A.exe 2192 5er9B5A.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
5er9B5A.exedescription pid process Token: SeDebugPrivilege 2192 5er9B5A.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
5er9B5A.exepid process 4724 5er9B5A.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
af9b9586beab6e4bd73ddc22da4e7619561b3a9d452a1e9ba498784ea32e7eb9.exe5er9B5A.exe5er9B5A.exedescription pid process target process PID 4816 wrote to memory of 4724 4816 af9b9586beab6e4bd73ddc22da4e7619561b3a9d452a1e9ba498784ea32e7eb9.exe 5er9B5A.exe PID 4816 wrote to memory of 4724 4816 af9b9586beab6e4bd73ddc22da4e7619561b3a9d452a1e9ba498784ea32e7eb9.exe 5er9B5A.exe PID 4816 wrote to memory of 4724 4816 af9b9586beab6e4bd73ddc22da4e7619561b3a9d452a1e9ba498784ea32e7eb9.exe 5er9B5A.exe PID 4724 wrote to memory of 2192 4724 5er9B5A.exe 5er9B5A.exe PID 4724 wrote to memory of 2192 4724 5er9B5A.exe 5er9B5A.exe PID 4724 wrote to memory of 2192 4724 5er9B5A.exe 5er9B5A.exe PID 4724 wrote to memory of 2192 4724 5er9B5A.exe 5er9B5A.exe PID 4724 wrote to memory of 2192 4724 5er9B5A.exe 5er9B5A.exe PID 4724 wrote to memory of 2192 4724 5er9B5A.exe 5er9B5A.exe PID 4724 wrote to memory of 2192 4724 5er9B5A.exe 5er9B5A.exe PID 4724 wrote to memory of 2192 4724 5er9B5A.exe 5er9B5A.exe PID 4724 wrote to memory of 2192 4724 5er9B5A.exe 5er9B5A.exe PID 2192 wrote to memory of 632 2192 5er9B5A.exe winlogon.exe PID 2192 wrote to memory of 632 2192 5er9B5A.exe winlogon.exe PID 2192 wrote to memory of 632 2192 5er9B5A.exe winlogon.exe PID 2192 wrote to memory of 632 2192 5er9B5A.exe winlogon.exe PID 2192 wrote to memory of 632 2192 5er9B5A.exe winlogon.exe PID 2192 wrote to memory of 632 2192 5er9B5A.exe winlogon.exe PID 2192 wrote to memory of 632 2192 5er9B5A.exe winlogon.exe PID 2192 wrote to memory of 632 2192 5er9B5A.exe winlogon.exe PID 2192 wrote to memory of 632 2192 5er9B5A.exe winlogon.exe PID 2192 wrote to memory of 632 2192 5er9B5A.exe winlogon.exe PID 2192 wrote to memory of 632 2192 5er9B5A.exe winlogon.exe PID 2192 wrote to memory of 632 2192 5er9B5A.exe winlogon.exe PID 2192 wrote to memory of 632 2192 5er9B5A.exe winlogon.exe PID 2192 wrote to memory of 632 2192 5er9B5A.exe winlogon.exe PID 2192 wrote to memory of 632 2192 5er9B5A.exe winlogon.exe PID 2192 wrote to memory of 632 2192 5er9B5A.exe winlogon.exe PID 2192 wrote to memory of 632 2192 5er9B5A.exe winlogon.exe PID 2192 wrote to memory of 632 2192 5er9B5A.exe winlogon.exe PID 2192 wrote to memory of 632 2192 5er9B5A.exe winlogon.exe PID 2192 wrote to memory of 632 2192 5er9B5A.exe winlogon.exe PID 2192 wrote to memory of 632 2192 5er9B5A.exe winlogon.exe PID 2192 wrote to memory of 632 2192 5er9B5A.exe winlogon.exe PID 2192 wrote to memory of 632 2192 5er9B5A.exe winlogon.exe PID 2192 wrote to memory of 632 2192 5er9B5A.exe winlogon.exe PID 2192 wrote to memory of 632 2192 5er9B5A.exe winlogon.exe PID 2192 wrote to memory of 632 2192 5er9B5A.exe winlogon.exe PID 2192 wrote to memory of 632 2192 5er9B5A.exe winlogon.exe PID 2192 wrote to memory of 632 2192 5er9B5A.exe winlogon.exe PID 2192 wrote to memory of 632 2192 5er9B5A.exe winlogon.exe PID 2192 wrote to memory of 632 2192 5er9B5A.exe winlogon.exe PID 2192 wrote to memory of 632 2192 5er9B5A.exe winlogon.exe PID 2192 wrote to memory of 632 2192 5er9B5A.exe winlogon.exe PID 2192 wrote to memory of 632 2192 5er9B5A.exe winlogon.exe PID 2192 wrote to memory of 632 2192 5er9B5A.exe winlogon.exe PID 2192 wrote to memory of 632 2192 5er9B5A.exe winlogon.exe PID 2192 wrote to memory of 632 2192 5er9B5A.exe winlogon.exe PID 2192 wrote to memory of 632 2192 5er9B5A.exe winlogon.exe PID 2192 wrote to memory of 632 2192 5er9B5A.exe winlogon.exe PID 2192 wrote to memory of 632 2192 5er9B5A.exe winlogon.exe PID 2192 wrote to memory of 632 2192 5er9B5A.exe winlogon.exe PID 2192 wrote to memory of 632 2192 5er9B5A.exe winlogon.exe PID 2192 wrote to memory of 632 2192 5er9B5A.exe winlogon.exe PID 2192 wrote to memory of 632 2192 5er9B5A.exe winlogon.exe PID 2192 wrote to memory of 632 2192 5er9B5A.exe winlogon.exe PID 2192 wrote to memory of 632 2192 5er9B5A.exe winlogon.exe PID 2192 wrote to memory of 632 2192 5er9B5A.exe winlogon.exe PID 2192 wrote to memory of 632 2192 5er9B5A.exe winlogon.exe PID 2192 wrote to memory of 632 2192 5er9B5A.exe winlogon.exe PID 2192 wrote to memory of 632 2192 5er9B5A.exe winlogon.exe PID 2192 wrote to memory of 632 2192 5er9B5A.exe winlogon.exe PID 2192 wrote to memory of 632 2192 5er9B5A.exe winlogon.exe PID 2192 wrote to memory of 632 2192 5er9B5A.exe winlogon.exe
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:632
-
C:\Users\Admin\AppData\Local\Temp\af9b9586beab6e4bd73ddc22da4e7619561b3a9d452a1e9ba498784ea32e7eb9.exe"C:\Users\Admin\AppData\Local\Temp\af9b9586beab6e4bd73ddc22da4e7619561b3a9d452a1e9ba498784ea32e7eb9.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Users\Admin\AppData\Local\Temp\5er9B5A.exe"C:\Users\Admin\AppData\Local\Temp\5er9B5A.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Users\Admin\AppData\Local\Temp\5er9B5A.exe"C:\Users\Admin\AppData\Local\Temp\5er9B5A.exe"3⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2192
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74KB
MD50297a68fc6f338ad45d7eaaa8bdb6886
SHA1e068b521fe13f8cda438d8eec25daee194b88953
SHA25626fe9606b7ec84a0e0448ed34f008c65c6be01607ffec4c3d76871a695af7956
SHA5127980aa95887bad3925a48c40e9735799f6c628cb3ea0615ad5b34900a23cf6d94ca26b5ca10cc5b2239744a69a082276edeb632877c41d862cd06633d2e6107b
-
Filesize
74KB
MD50297a68fc6f338ad45d7eaaa8bdb6886
SHA1e068b521fe13f8cda438d8eec25daee194b88953
SHA25626fe9606b7ec84a0e0448ed34f008c65c6be01607ffec4c3d76871a695af7956
SHA5127980aa95887bad3925a48c40e9735799f6c628cb3ea0615ad5b34900a23cf6d94ca26b5ca10cc5b2239744a69a082276edeb632877c41d862cd06633d2e6107b
-
Filesize
74KB
MD50297a68fc6f338ad45d7eaaa8bdb6886
SHA1e068b521fe13f8cda438d8eec25daee194b88953
SHA25626fe9606b7ec84a0e0448ed34f008c65c6be01607ffec4c3d76871a695af7956
SHA5127980aa95887bad3925a48c40e9735799f6c628cb3ea0615ad5b34900a23cf6d94ca26b5ca10cc5b2239744a69a082276edeb632877c41d862cd06633d2e6107b