Analysis

  • max time kernel
    153s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 11:01

General

  • Target

    af9b9586beab6e4bd73ddc22da4e7619561b3a9d452a1e9ba498784ea32e7eb9.exe

  • Size

    100KB

  • MD5

    8ca303c4eb9cfbcd3b93f583511abfdf

  • SHA1

    33fe4b8e965724143302b499934f1b5379b615a5

  • SHA256

    af9b9586beab6e4bd73ddc22da4e7619561b3a9d452a1e9ba498784ea32e7eb9

  • SHA512

    c5cb024a8e52eeb99b554f798b683fb1603ca5fe09470c671a817c544dcbc443ef6d88d588804e11a961ab25c8453a34ddaeb335892252f2ed4abf79b354c30e

  • SSDEEP

    1536:9QxqcQu0yvmgEUs1rARbX/CJ+zsxm90BUNvE6V01Deo/k7:y/0gEUcr6bvvzsKp66oc7

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:632
    • C:\Users\Admin\AppData\Local\Temp\af9b9586beab6e4bd73ddc22da4e7619561b3a9d452a1e9ba498784ea32e7eb9.exe
      "C:\Users\Admin\AppData\Local\Temp\af9b9586beab6e4bd73ddc22da4e7619561b3a9d452a1e9ba498784ea32e7eb9.exe"
      1⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:4816
      • C:\Users\Admin\AppData\Local\Temp\5er9B5A.exe
        "C:\Users\Admin\AppData\Local\Temp\5er9B5A.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4724
        • C:\Users\Admin\AppData\Local\Temp\5er9B5A.exe
          "C:\Users\Admin\AppData\Local\Temp\5er9B5A.exe"
          3⤵
          • Modifies WinLogon for persistence
          • Executes dropped EXE
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2192

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\5er9B5A.exe

      Filesize

      74KB

      MD5

      0297a68fc6f338ad45d7eaaa8bdb6886

      SHA1

      e068b521fe13f8cda438d8eec25daee194b88953

      SHA256

      26fe9606b7ec84a0e0448ed34f008c65c6be01607ffec4c3d76871a695af7956

      SHA512

      7980aa95887bad3925a48c40e9735799f6c628cb3ea0615ad5b34900a23cf6d94ca26b5ca10cc5b2239744a69a082276edeb632877c41d862cd06633d2e6107b

    • C:\Users\Admin\AppData\Local\Temp\5er9B5A.exe

      Filesize

      74KB

      MD5

      0297a68fc6f338ad45d7eaaa8bdb6886

      SHA1

      e068b521fe13f8cda438d8eec25daee194b88953

      SHA256

      26fe9606b7ec84a0e0448ed34f008c65c6be01607ffec4c3d76871a695af7956

      SHA512

      7980aa95887bad3925a48c40e9735799f6c628cb3ea0615ad5b34900a23cf6d94ca26b5ca10cc5b2239744a69a082276edeb632877c41d862cd06633d2e6107b

    • C:\Users\Admin\AppData\Local\Temp\5er9B5A.exe

      Filesize

      74KB

      MD5

      0297a68fc6f338ad45d7eaaa8bdb6886

      SHA1

      e068b521fe13f8cda438d8eec25daee194b88953

      SHA256

      26fe9606b7ec84a0e0448ed34f008c65c6be01607ffec4c3d76871a695af7956

      SHA512

      7980aa95887bad3925a48c40e9735799f6c628cb3ea0615ad5b34900a23cf6d94ca26b5ca10cc5b2239744a69a082276edeb632877c41d862cd06633d2e6107b

    • memory/632-198-0x000000000CD90000-0x000000000CDB6000-memory.dmp

      Filesize

      152KB

    • memory/632-203-0x000000000CDC0000-0x000000000CDE6000-memory.dmp

      Filesize

      152KB

    • memory/632-243-0x000000000CF40000-0x000000000CF66000-memory.dmp

      Filesize

      152KB

    • memory/632-238-0x000000000CF10000-0x000000000CF36000-memory.dmp

      Filesize

      152KB

    • memory/632-233-0x000000000CEE0000-0x000000000CF06000-memory.dmp

      Filesize

      152KB

    • memory/632-228-0x000000000CEB0000-0x000000000CED6000-memory.dmp

      Filesize

      152KB

    • memory/632-223-0x000000000CE80000-0x000000000CEA6000-memory.dmp

      Filesize

      152KB

    • memory/632-218-0x000000000CE50000-0x000000000CE76000-memory.dmp

      Filesize

      152KB

    • memory/632-213-0x000000000CE20000-0x000000000CE46000-memory.dmp

      Filesize

      152KB

    • memory/632-208-0x000000000CDF0000-0x000000000CE16000-memory.dmp

      Filesize

      152KB

    • memory/632-158-0x000000000CC10000-0x000000000CC36000-memory.dmp

      Filesize

      152KB

    • memory/632-163-0x000000000CC40000-0x000000000CC66000-memory.dmp

      Filesize

      152KB

    • memory/632-168-0x000000000CC70000-0x000000000CC96000-memory.dmp

      Filesize

      152KB

    • memory/632-173-0x000000000CCA0000-0x000000000CCC6000-memory.dmp

      Filesize

      152KB

    • memory/632-178-0x000000000CCD0000-0x000000000CCF6000-memory.dmp

      Filesize

      152KB

    • memory/632-183-0x000000000CD00000-0x000000000CD26000-memory.dmp

      Filesize

      152KB

    • memory/632-188-0x000000000CD30000-0x000000000CD56000-memory.dmp

      Filesize

      152KB

    • memory/632-193-0x000000000CD60000-0x000000000CD86000-memory.dmp

      Filesize

      152KB

    • memory/2192-138-0x0000000000400000-0x0000000000426000-memory.dmp

      Filesize

      152KB

    • memory/2192-148-0x0000000000400000-0x0000000000426000-memory.dmp

      Filesize

      152KB

    • memory/2192-147-0x0000000000410000-0x0000000000412000-memory.dmp

      Filesize

      8KB

    • memory/2192-145-0x0000000000400000-0x0000000000426000-memory.dmp

      Filesize

      152KB

    • memory/2192-137-0x0000000000000000-mapping.dmp

    • memory/2192-144-0x0000000000400000-0x0000000000426000-memory.dmp

      Filesize

      152KB

    • memory/2192-141-0x0000000000400000-0x0000000000426000-memory.dmp

      Filesize

      152KB

    • memory/2192-140-0x0000000000400000-0x0000000000426000-memory.dmp

      Filesize

      152KB

    • memory/2192-139-0x0000000000400000-0x0000000000426000-memory.dmp

      Filesize

      152KB

    • memory/4724-132-0x0000000000000000-mapping.dmp