Analysis
-
max time kernel
151s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 11:09
Static task
static1
Behavioral task
behavioral1
Sample
25235495fd6c467c26f70e23514035d884fa169cb7a0a4d60548364f7718aa8a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
25235495fd6c467c26f70e23514035d884fa169cb7a0a4d60548364f7718aa8a.exe
Resource
win10v2004-20221111-en
General
-
Target
25235495fd6c467c26f70e23514035d884fa169cb7a0a4d60548364f7718aa8a.exe
-
Size
116KB
-
MD5
7fdf1177ae26859ce367d4cd76a712d1
-
SHA1
3410dbe2e502ccd791b05bb919bc2814d1275bca
-
SHA256
25235495fd6c467c26f70e23514035d884fa169cb7a0a4d60548364f7718aa8a
-
SHA512
a4ea6c2dcc05e72ec62b4c8c98b9560e1608e447cb36cb7e6a15cf7a36044bae3cbaea6f7daac56ee8f757e1e08c98ccc8f5fb9fb7d6431f38d2c3c7c361a88c
-
SSDEEP
3072:gtuA/sk2uoYzVzSeQ7fFcO73V+cQhkv3NhF:gtTogSztD738cQhQ9hF
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
SdTr.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = ",C:\\Users\\Admin\\AppData\\Roaming\\SdTr.exe" SdTr.exe -
Executes dropped EXE 2 IoCs
Processes:
SdTr.exeSdTr.exepid process 2364 SdTr.exe 4548 SdTr.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
25235495fd6c467c26f70e23514035d884fa169cb7a0a4d60548364f7718aa8a.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Control Panel\International\Geo\Nation 25235495fd6c467c26f70e23514035d884fa169cb7a0a4d60548364f7718aa8a.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
SdTr.exedescription pid process target process PID 2364 set thread context of 4548 2364 SdTr.exe SdTr.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4104 4548 WerFault.exe SdTr.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 668 -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
25235495fd6c467c26f70e23514035d884fa169cb7a0a4d60548364f7718aa8a.exeSdTr.exepid process 2224 25235495fd6c467c26f70e23514035d884fa169cb7a0a4d60548364f7718aa8a.exe 2364 SdTr.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
25235495fd6c467c26f70e23514035d884fa169cb7a0a4d60548364f7718aa8a.exeSdTr.exedescription pid process target process PID 2224 wrote to memory of 2364 2224 25235495fd6c467c26f70e23514035d884fa169cb7a0a4d60548364f7718aa8a.exe SdTr.exe PID 2224 wrote to memory of 2364 2224 25235495fd6c467c26f70e23514035d884fa169cb7a0a4d60548364f7718aa8a.exe SdTr.exe PID 2224 wrote to memory of 2364 2224 25235495fd6c467c26f70e23514035d884fa169cb7a0a4d60548364f7718aa8a.exe SdTr.exe PID 2364 wrote to memory of 4548 2364 SdTr.exe SdTr.exe PID 2364 wrote to memory of 4548 2364 SdTr.exe SdTr.exe PID 2364 wrote to memory of 4548 2364 SdTr.exe SdTr.exe PID 2364 wrote to memory of 4548 2364 SdTr.exe SdTr.exe PID 2364 wrote to memory of 4548 2364 SdTr.exe SdTr.exe PID 2364 wrote to memory of 4548 2364 SdTr.exe SdTr.exe PID 2364 wrote to memory of 4548 2364 SdTr.exe SdTr.exe PID 2364 wrote to memory of 4548 2364 SdTr.exe SdTr.exe PID 2364 wrote to memory of 4548 2364 SdTr.exe SdTr.exe PID 2364 wrote to memory of 4548 2364 SdTr.exe SdTr.exe PID 2364 wrote to memory of 4548 2364 SdTr.exe SdTr.exe PID 2364 wrote to memory of 4548 2364 SdTr.exe SdTr.exe PID 2364 wrote to memory of 4548 2364 SdTr.exe SdTr.exe PID 2364 wrote to memory of 4548 2364 SdTr.exe SdTr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\25235495fd6c467c26f70e23514035d884fa169cb7a0a4d60548364f7718aa8a.exe"C:\Users\Admin\AppData\Local\Temp\25235495fd6c467c26f70e23514035d884fa169cb7a0a4d60548364f7718aa8a.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Roaming\SdTr.exe"C:\Users\Admin\AppData\Roaming\SdTr.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Roaming\SdTr.exe"C:\Users\Admin\AppData\Roaming\SdTr.exe"3⤵
- Executes dropped EXE
PID:4548 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4548 -s 3524⤵
- Program crash
PID:4104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4548 -ip 45481⤵PID:3840
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
116KB
MD57fdf1177ae26859ce367d4cd76a712d1
SHA13410dbe2e502ccd791b05bb919bc2814d1275bca
SHA25625235495fd6c467c26f70e23514035d884fa169cb7a0a4d60548364f7718aa8a
SHA512a4ea6c2dcc05e72ec62b4c8c98b9560e1608e447cb36cb7e6a15cf7a36044bae3cbaea6f7daac56ee8f757e1e08c98ccc8f5fb9fb7d6431f38d2c3c7c361a88c
-
Filesize
116KB
MD57fdf1177ae26859ce367d4cd76a712d1
SHA13410dbe2e502ccd791b05bb919bc2814d1275bca
SHA25625235495fd6c467c26f70e23514035d884fa169cb7a0a4d60548364f7718aa8a
SHA512a4ea6c2dcc05e72ec62b4c8c98b9560e1608e447cb36cb7e6a15cf7a36044bae3cbaea6f7daac56ee8f757e1e08c98ccc8f5fb9fb7d6431f38d2c3c7c361a88c
-
Filesize
116KB
MD57fdf1177ae26859ce367d4cd76a712d1
SHA13410dbe2e502ccd791b05bb919bc2814d1275bca
SHA25625235495fd6c467c26f70e23514035d884fa169cb7a0a4d60548364f7718aa8a
SHA512a4ea6c2dcc05e72ec62b4c8c98b9560e1608e447cb36cb7e6a15cf7a36044bae3cbaea6f7daac56ee8f757e1e08c98ccc8f5fb9fb7d6431f38d2c3c7c361a88c