Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 13:41
Static task
static1
Behavioral task
behavioral1
Sample
8e05202bc36b4823c49063de29834b15f8cb6d267496bff68c151c625324224f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8e05202bc36b4823c49063de29834b15f8cb6d267496bff68c151c625324224f.exe
Resource
win10v2004-20220901-en
General
-
Target
8e05202bc36b4823c49063de29834b15f8cb6d267496bff68c151c625324224f.exe
-
Size
1.4MB
-
MD5
baf24ad6e9cdf465368546b37bec7feb
-
SHA1
74452619896ebd654bb1c2c501de9a0bf8266056
-
SHA256
8e05202bc36b4823c49063de29834b15f8cb6d267496bff68c151c625324224f
-
SHA512
5b9403dbe0e784f9ed081d94131127b9a9e265c99ab072012f9f8bf8f32382105347f8b1d3ca2d6767122c541d6c7cc6601b04782c6331862722c5046cdc8176
-
SSDEEP
3072:iyf8n+BnNpiXN5U+M/hQuaCA3VMxDJAQO7LN:i/+BnNpCqP/hQuavirOH
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
Processes:
winlogon.exewinlogon.exewinlogon.exewinlogon.exepid process 4884 winlogon.exe 4952 winlogon.exe 2064 winlogon.exe 4448 winlogon.exe -
Processes:
resource yara_rule behavioral2/memory/1500-134-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/1500-136-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/1500-137-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/1500-144-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/4952-156-0x0000000000400000-0x000000000041C000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
8e05202bc36b4823c49063de29834b15f8cb6d267496bff68c151c625324224f.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 8e05202bc36b4823c49063de29834b15f8cb6d267496bff68c151c625324224f.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
8e05202bc36b4823c49063de29834b15f8cb6d267496bff68c151c625324224f.exewinlogon.exewinlogon.exedescription pid process target process PID 644 set thread context of 1500 644 8e05202bc36b4823c49063de29834b15f8cb6d267496bff68c151c625324224f.exe 8e05202bc36b4823c49063de29834b15f8cb6d267496bff68c151c625324224f.exe PID 4884 set thread context of 4952 4884 winlogon.exe winlogon.exe PID 4952 set thread context of 2064 4952 winlogon.exe winlogon.exe PID 4952 set thread context of 4448 4952 winlogon.exe winlogon.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3624 2064 WerFault.exe winlogon.exe 976 4448 WerFault.exe winlogon.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
8e05202bc36b4823c49063de29834b15f8cb6d267496bff68c151c625324224f.exewinlogon.exepid process 1500 8e05202bc36b4823c49063de29834b15f8cb6d267496bff68c151c625324224f.exe 4952 winlogon.exe -
Suspicious use of WriteProcessMemory 41 IoCs
Processes:
8e05202bc36b4823c49063de29834b15f8cb6d267496bff68c151c625324224f.exe8e05202bc36b4823c49063de29834b15f8cb6d267496bff68c151c625324224f.exewinlogon.exewinlogon.exedescription pid process target process PID 644 wrote to memory of 360 644 8e05202bc36b4823c49063de29834b15f8cb6d267496bff68c151c625324224f.exe svchost.exe PID 644 wrote to memory of 360 644 8e05202bc36b4823c49063de29834b15f8cb6d267496bff68c151c625324224f.exe svchost.exe PID 644 wrote to memory of 360 644 8e05202bc36b4823c49063de29834b15f8cb6d267496bff68c151c625324224f.exe svchost.exe PID 644 wrote to memory of 1500 644 8e05202bc36b4823c49063de29834b15f8cb6d267496bff68c151c625324224f.exe 8e05202bc36b4823c49063de29834b15f8cb6d267496bff68c151c625324224f.exe PID 644 wrote to memory of 1500 644 8e05202bc36b4823c49063de29834b15f8cb6d267496bff68c151c625324224f.exe 8e05202bc36b4823c49063de29834b15f8cb6d267496bff68c151c625324224f.exe PID 644 wrote to memory of 1500 644 8e05202bc36b4823c49063de29834b15f8cb6d267496bff68c151c625324224f.exe 8e05202bc36b4823c49063de29834b15f8cb6d267496bff68c151c625324224f.exe PID 644 wrote to memory of 1500 644 8e05202bc36b4823c49063de29834b15f8cb6d267496bff68c151c625324224f.exe 8e05202bc36b4823c49063de29834b15f8cb6d267496bff68c151c625324224f.exe PID 644 wrote to memory of 1500 644 8e05202bc36b4823c49063de29834b15f8cb6d267496bff68c151c625324224f.exe 8e05202bc36b4823c49063de29834b15f8cb6d267496bff68c151c625324224f.exe PID 644 wrote to memory of 1500 644 8e05202bc36b4823c49063de29834b15f8cb6d267496bff68c151c625324224f.exe 8e05202bc36b4823c49063de29834b15f8cb6d267496bff68c151c625324224f.exe PID 644 wrote to memory of 1500 644 8e05202bc36b4823c49063de29834b15f8cb6d267496bff68c151c625324224f.exe 8e05202bc36b4823c49063de29834b15f8cb6d267496bff68c151c625324224f.exe PID 644 wrote to memory of 1500 644 8e05202bc36b4823c49063de29834b15f8cb6d267496bff68c151c625324224f.exe 8e05202bc36b4823c49063de29834b15f8cb6d267496bff68c151c625324224f.exe PID 1500 wrote to memory of 4884 1500 8e05202bc36b4823c49063de29834b15f8cb6d267496bff68c151c625324224f.exe winlogon.exe PID 1500 wrote to memory of 4884 1500 8e05202bc36b4823c49063de29834b15f8cb6d267496bff68c151c625324224f.exe winlogon.exe PID 1500 wrote to memory of 4884 1500 8e05202bc36b4823c49063de29834b15f8cb6d267496bff68c151c625324224f.exe winlogon.exe PID 4884 wrote to memory of 4872 4884 winlogon.exe svchost.exe PID 4884 wrote to memory of 4872 4884 winlogon.exe svchost.exe PID 4884 wrote to memory of 4872 4884 winlogon.exe svchost.exe PID 4884 wrote to memory of 4952 4884 winlogon.exe winlogon.exe PID 4884 wrote to memory of 4952 4884 winlogon.exe winlogon.exe PID 4884 wrote to memory of 4952 4884 winlogon.exe winlogon.exe PID 4884 wrote to memory of 4952 4884 winlogon.exe winlogon.exe PID 4884 wrote to memory of 4952 4884 winlogon.exe winlogon.exe PID 4884 wrote to memory of 4952 4884 winlogon.exe winlogon.exe PID 4884 wrote to memory of 4952 4884 winlogon.exe winlogon.exe PID 4884 wrote to memory of 4952 4884 winlogon.exe winlogon.exe PID 4952 wrote to memory of 2064 4952 winlogon.exe winlogon.exe PID 4952 wrote to memory of 2064 4952 winlogon.exe winlogon.exe PID 4952 wrote to memory of 2064 4952 winlogon.exe winlogon.exe PID 4952 wrote to memory of 2064 4952 winlogon.exe winlogon.exe PID 4952 wrote to memory of 2064 4952 winlogon.exe winlogon.exe PID 4952 wrote to memory of 2064 4952 winlogon.exe winlogon.exe PID 4952 wrote to memory of 2064 4952 winlogon.exe winlogon.exe PID 4952 wrote to memory of 2064 4952 winlogon.exe winlogon.exe PID 4952 wrote to memory of 4448 4952 winlogon.exe winlogon.exe PID 4952 wrote to memory of 4448 4952 winlogon.exe winlogon.exe PID 4952 wrote to memory of 4448 4952 winlogon.exe winlogon.exe PID 4952 wrote to memory of 4448 4952 winlogon.exe winlogon.exe PID 4952 wrote to memory of 4448 4952 winlogon.exe winlogon.exe PID 4952 wrote to memory of 4448 4952 winlogon.exe winlogon.exe PID 4952 wrote to memory of 4448 4952 winlogon.exe winlogon.exe PID 4952 wrote to memory of 4448 4952 winlogon.exe winlogon.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e05202bc36b4823c49063de29834b15f8cb6d267496bff68c151c625324224f.exe"C:\Users\Admin\AppData\Local\Temp\8e05202bc36b4823c49063de29834b15f8cb6d267496bff68c151c625324224f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\\svchost.exe2⤵PID:360
-
C:\Users\Admin\AppData\Local\Temp\8e05202bc36b4823c49063de29834b15f8cb6d267496bff68c151c625324224f.exe
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\\svchost.exe4⤵PID:4872
-
C:\Users\Admin\E696D64614\winlogon.exe
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"5⤵
- Executes dropped EXE
PID:2064 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2064 -s 126⤵
- Program crash
PID:3624 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"5⤵
- Executes dropped EXE
PID:4448 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4448 -s 126⤵
- Program crash
PID:976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2064 -ip 20641⤵PID:4804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4448 -ip 44481⤵PID:4288
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5baf24ad6e9cdf465368546b37bec7feb
SHA174452619896ebd654bb1c2c501de9a0bf8266056
SHA2568e05202bc36b4823c49063de29834b15f8cb6d267496bff68c151c625324224f
SHA5125b9403dbe0e784f9ed081d94131127b9a9e265c99ab072012f9f8bf8f32382105347f8b1d3ca2d6767122c541d6c7cc6601b04782c6331862722c5046cdc8176
-
Filesize
1.4MB
MD5baf24ad6e9cdf465368546b37bec7feb
SHA174452619896ebd654bb1c2c501de9a0bf8266056
SHA2568e05202bc36b4823c49063de29834b15f8cb6d267496bff68c151c625324224f
SHA5125b9403dbe0e784f9ed081d94131127b9a9e265c99ab072012f9f8bf8f32382105347f8b1d3ca2d6767122c541d6c7cc6601b04782c6331862722c5046cdc8176
-
Filesize
1.4MB
MD5baf24ad6e9cdf465368546b37bec7feb
SHA174452619896ebd654bb1c2c501de9a0bf8266056
SHA2568e05202bc36b4823c49063de29834b15f8cb6d267496bff68c151c625324224f
SHA5125b9403dbe0e784f9ed081d94131127b9a9e265c99ab072012f9f8bf8f32382105347f8b1d3ca2d6767122c541d6c7cc6601b04782c6331862722c5046cdc8176
-
Filesize
1.4MB
MD5baf24ad6e9cdf465368546b37bec7feb
SHA174452619896ebd654bb1c2c501de9a0bf8266056
SHA2568e05202bc36b4823c49063de29834b15f8cb6d267496bff68c151c625324224f
SHA5125b9403dbe0e784f9ed081d94131127b9a9e265c99ab072012f9f8bf8f32382105347f8b1d3ca2d6767122c541d6c7cc6601b04782c6331862722c5046cdc8176
-
Filesize
1.4MB
MD5baf24ad6e9cdf465368546b37bec7feb
SHA174452619896ebd654bb1c2c501de9a0bf8266056
SHA2568e05202bc36b4823c49063de29834b15f8cb6d267496bff68c151c625324224f
SHA5125b9403dbe0e784f9ed081d94131127b9a9e265c99ab072012f9f8bf8f32382105347f8b1d3ca2d6767122c541d6c7cc6601b04782c6331862722c5046cdc8176