Analysis
-
max time kernel
239s -
max time network
261s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 12:44
Static task
static1
Behavioral task
behavioral1
Sample
f1fdc6b05605137aabff3b59e49b489866673a93706d52247a74f1c6441ed333.exe
Resource
win7-20221111-en
General
-
Target
f1fdc6b05605137aabff3b59e49b489866673a93706d52247a74f1c6441ed333.exe
-
Size
220KB
-
MD5
31a3abe2824e6e4cce48e207df6b3aa5
-
SHA1
cd1466b5c1e964c53ade0acdcd3ad6ecf2fc8505
-
SHA256
f1fdc6b05605137aabff3b59e49b489866673a93706d52247a74f1c6441ed333
-
SHA512
c93a1310ebcfe3472e68a4db45d1dabfabaa18711997286d9f2986bae1d63d66f3e09a397c6bde3c12d11e4669b6e9a699fa6ad09a657d603c1749e45971e7e2
-
SSDEEP
3072:xKNQHcGBMVpXUxRVE+FXeRiD1zuO9T1eRp7VFtJW6uVRK0q/3/v:xK5+MVpWRVyR6uI1eP7VFtJkwv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
f1fdc6b05605137aabff3b59e49b489866673a93706d52247a74f1c6441ed333.exewinlogon.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation f1fdc6b05605137aabff3b59e49b489866673a93706d52247a74f1c6441ed333.exe Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation winlogon.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
winlogon.exewinlogon.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Winlogon = "C:\\Users\\Admin\\AppData\\Roaming\\SubFolder\\SubFolder\\winlogon.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Winlogon = "C:\\Users\\Admin\\AppData\\Roaming\\SubFolder\\SubFolder\\winlogon.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\TCP Subsystem = "C:\\Program Files (x86)\\TCP Subsystem\\tcpss.exe" winlogon.exe -
Processes:
winlogon.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA winlogon.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
winlogon.exedescription pid process target process PID 4604 set thread context of 3912 4604 winlogon.exe winlogon.exe -
Drops file in Program Files directory 2 IoCs
Processes:
winlogon.exedescription ioc process File created C:\Program Files (x86)\TCP Subsystem\tcpss.exe winlogon.exe File opened for modification C:\Program Files (x86)\TCP Subsystem\tcpss.exe winlogon.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
winlogon.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winlogon.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
f1fdc6b05605137aabff3b59e49b489866673a93706d52247a74f1c6441ed333.exewinlogon.exepid process 4620 f1fdc6b05605137aabff3b59e49b489866673a93706d52247a74f1c6441ed333.exe 4620 f1fdc6b05605137aabff3b59e49b489866673a93706d52247a74f1c6441ed333.exe 4604 winlogon.exe 4604 winlogon.exe 4604 winlogon.exe 4604 winlogon.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
f1fdc6b05605137aabff3b59e49b489866673a93706d52247a74f1c6441ed333.exepid process 4620 f1fdc6b05605137aabff3b59e49b489866673a93706d52247a74f1c6441ed333.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
f1fdc6b05605137aabff3b59e49b489866673a93706d52247a74f1c6441ed333.exewinlogon.exedescription pid process Token: SeDebugPrivilege 4620 f1fdc6b05605137aabff3b59e49b489866673a93706d52247a74f1c6441ed333.exe Token: SeDebugPrivilege 4604 winlogon.exe Token: SeDebugPrivilege 4604 winlogon.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
f1fdc6b05605137aabff3b59e49b489866673a93706d52247a74f1c6441ed333.exewinlogon.exedescription pid process target process PID 4620 wrote to memory of 4604 4620 f1fdc6b05605137aabff3b59e49b489866673a93706d52247a74f1c6441ed333.exe winlogon.exe PID 4620 wrote to memory of 4604 4620 f1fdc6b05605137aabff3b59e49b489866673a93706d52247a74f1c6441ed333.exe winlogon.exe PID 4620 wrote to memory of 4604 4620 f1fdc6b05605137aabff3b59e49b489866673a93706d52247a74f1c6441ed333.exe winlogon.exe PID 4604 wrote to memory of 1976 4604 winlogon.exe winlogon.exe PID 4604 wrote to memory of 1976 4604 winlogon.exe winlogon.exe PID 4604 wrote to memory of 1976 4604 winlogon.exe winlogon.exe PID 4604 wrote to memory of 3912 4604 winlogon.exe winlogon.exe PID 4604 wrote to memory of 3912 4604 winlogon.exe winlogon.exe PID 4604 wrote to memory of 3912 4604 winlogon.exe winlogon.exe PID 4604 wrote to memory of 3912 4604 winlogon.exe winlogon.exe PID 4604 wrote to memory of 3912 4604 winlogon.exe winlogon.exe PID 4604 wrote to memory of 3912 4604 winlogon.exe winlogon.exe PID 4604 wrote to memory of 3912 4604 winlogon.exe winlogon.exe PID 4604 wrote to memory of 3912 4604 winlogon.exe winlogon.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f1fdc6b05605137aabff3b59e49b489866673a93706d52247a74f1c6441ed333.exe"C:\Users\Admin\AppData\Local\Temp\f1fdc6b05605137aabff3b59e49b489866673a93706d52247a74f1c6441ed333.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Users\Admin\AppData\Roaming\SubFolder\SubFolder\winlogon.exe"C:\Users\Admin\AppData\Roaming\SubFolder\SubFolder\winlogon.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Users\Admin\AppData\Roaming\SubFolder\SubFolder\winlogon.exe"C:\Users\Admin\AppData\Roaming\SubFolder\SubFolder\winlogon.exe"3⤵PID:1976
-
C:\Users\Admin\AppData\Roaming\SubFolder\SubFolder\winlogon.exe"C:\Users\Admin\AppData\Roaming\SubFolder\SubFolder\winlogon.exe"3⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
PID:3912