Analysis
-
max time kernel
174s -
max time network
194s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 14:43
Static task
static1
Behavioral task
behavioral1
Sample
28c78b79dbd42cf8c1e6d8170c3b257246af1fa0ce52fd8e4af741f2d2fd5e95.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
28c78b79dbd42cf8c1e6d8170c3b257246af1fa0ce52fd8e4af741f2d2fd5e95.exe
Resource
win10v2004-20221111-en
General
-
Target
28c78b79dbd42cf8c1e6d8170c3b257246af1fa0ce52fd8e4af741f2d2fd5e95.exe
-
Size
509KB
-
MD5
2d59e22e6944200d8608b02d3e94f23b
-
SHA1
7fa019f86180014abc5a3c8521bcbc883b5fff24
-
SHA256
28c78b79dbd42cf8c1e6d8170c3b257246af1fa0ce52fd8e4af741f2d2fd5e95
-
SHA512
32b66dc06b511ce0b188685967b9179eb39dbff7f20a30737ee034e2402dbe606f6372a6bb2a64b236a1b41a65253a29a1de1f1882b33e0cb46d3bf25462db31
-
SSDEEP
6144:6rQFs7bn4vk9O8NZ9rev5CqMYKeSVjWpr/kUmcB1SrKSo0HZM:6vO+URmW8KycBMpZS
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Users\\Admin\\AppData\\Roaming\\WinUpdate\\WinUpdate.exe,explorer.exe" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
28c78b79dbd42cf8c1e6d8170c3b257246af1fa0ce52fd8e4af741f2d2fd5e95.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 28c78b79dbd42cf8c1e6d8170c3b257246af1fa0ce52fd8e4af741f2d2fd5e95.exe -
Drops desktop.ini file(s) 2 IoCs
Processes:
28c78b79dbd42cf8c1e6d8170c3b257246af1fa0ce52fd8e4af741f2d2fd5e95.exedescription ioc process File created C:\Windows\assembly\Desktop.ini 28c78b79dbd42cf8c1e6d8170c3b257246af1fa0ce52fd8e4af741f2d2fd5e95.exe File opened for modification C:\Windows\assembly\Desktop.ini 28c78b79dbd42cf8c1e6d8170c3b257246af1fa0ce52fd8e4af741f2d2fd5e95.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
28c78b79dbd42cf8c1e6d8170c3b257246af1fa0ce52fd8e4af741f2d2fd5e95.exedescription pid process target process PID 1504 set thread context of 4128 1504 28c78b79dbd42cf8c1e6d8170c3b257246af1fa0ce52fd8e4af741f2d2fd5e95.exe 28c78b79dbd42cf8c1e6d8170c3b257246af1fa0ce52fd8e4af741f2d2fd5e95.exe -
Drops file in Windows directory 3 IoCs
Processes:
28c78b79dbd42cf8c1e6d8170c3b257246af1fa0ce52fd8e4af741f2d2fd5e95.exedescription ioc process File opened for modification C:\Windows\assembly 28c78b79dbd42cf8c1e6d8170c3b257246af1fa0ce52fd8e4af741f2d2fd5e95.exe File created C:\Windows\assembly\Desktop.ini 28c78b79dbd42cf8c1e6d8170c3b257246af1fa0ce52fd8e4af741f2d2fd5e95.exe File opened for modification C:\Windows\assembly\Desktop.ini 28c78b79dbd42cf8c1e6d8170c3b257246af1fa0ce52fd8e4af741f2d2fd5e95.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
28c78b79dbd42cf8c1e6d8170c3b257246af1fa0ce52fd8e4af741f2d2fd5e95.exepid process 1504 28c78b79dbd42cf8c1e6d8170c3b257246af1fa0ce52fd8e4af741f2d2fd5e95.exe 1504 28c78b79dbd42cf8c1e6d8170c3b257246af1fa0ce52fd8e4af741f2d2fd5e95.exe 1504 28c78b79dbd42cf8c1e6d8170c3b257246af1fa0ce52fd8e4af741f2d2fd5e95.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
28c78b79dbd42cf8c1e6d8170c3b257246af1fa0ce52fd8e4af741f2d2fd5e95.exepid process 4128 28c78b79dbd42cf8c1e6d8170c3b257246af1fa0ce52fd8e4af741f2d2fd5e95.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
28c78b79dbd42cf8c1e6d8170c3b257246af1fa0ce52fd8e4af741f2d2fd5e95.exe28c78b79dbd42cf8c1e6d8170c3b257246af1fa0ce52fd8e4af741f2d2fd5e95.exedescription pid process Token: SeDebugPrivilege 1504 28c78b79dbd42cf8c1e6d8170c3b257246af1fa0ce52fd8e4af741f2d2fd5e95.exe Token: SeDebugPrivilege 4128 28c78b79dbd42cf8c1e6d8170c3b257246af1fa0ce52fd8e4af741f2d2fd5e95.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
28c78b79dbd42cf8c1e6d8170c3b257246af1fa0ce52fd8e4af741f2d2fd5e95.exepid process 4128 28c78b79dbd42cf8c1e6d8170c3b257246af1fa0ce52fd8e4af741f2d2fd5e95.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
28c78b79dbd42cf8c1e6d8170c3b257246af1fa0ce52fd8e4af741f2d2fd5e95.execmd.exedescription pid process target process PID 1504 wrote to memory of 3180 1504 28c78b79dbd42cf8c1e6d8170c3b257246af1fa0ce52fd8e4af741f2d2fd5e95.exe cmd.exe PID 1504 wrote to memory of 3180 1504 28c78b79dbd42cf8c1e6d8170c3b257246af1fa0ce52fd8e4af741f2d2fd5e95.exe cmd.exe PID 1504 wrote to memory of 3180 1504 28c78b79dbd42cf8c1e6d8170c3b257246af1fa0ce52fd8e4af741f2d2fd5e95.exe cmd.exe PID 3180 wrote to memory of 4952 3180 cmd.exe reg.exe PID 3180 wrote to memory of 4952 3180 cmd.exe reg.exe PID 3180 wrote to memory of 4952 3180 cmd.exe reg.exe PID 1504 wrote to memory of 4128 1504 28c78b79dbd42cf8c1e6d8170c3b257246af1fa0ce52fd8e4af741f2d2fd5e95.exe 28c78b79dbd42cf8c1e6d8170c3b257246af1fa0ce52fd8e4af741f2d2fd5e95.exe PID 1504 wrote to memory of 4128 1504 28c78b79dbd42cf8c1e6d8170c3b257246af1fa0ce52fd8e4af741f2d2fd5e95.exe 28c78b79dbd42cf8c1e6d8170c3b257246af1fa0ce52fd8e4af741f2d2fd5e95.exe PID 1504 wrote to memory of 4128 1504 28c78b79dbd42cf8c1e6d8170c3b257246af1fa0ce52fd8e4af741f2d2fd5e95.exe 28c78b79dbd42cf8c1e6d8170c3b257246af1fa0ce52fd8e4af741f2d2fd5e95.exe PID 1504 wrote to memory of 4128 1504 28c78b79dbd42cf8c1e6d8170c3b257246af1fa0ce52fd8e4af741f2d2fd5e95.exe 28c78b79dbd42cf8c1e6d8170c3b257246af1fa0ce52fd8e4af741f2d2fd5e95.exe PID 1504 wrote to memory of 4128 1504 28c78b79dbd42cf8c1e6d8170c3b257246af1fa0ce52fd8e4af741f2d2fd5e95.exe 28c78b79dbd42cf8c1e6d8170c3b257246af1fa0ce52fd8e4af741f2d2fd5e95.exe PID 1504 wrote to memory of 4128 1504 28c78b79dbd42cf8c1e6d8170c3b257246af1fa0ce52fd8e4af741f2d2fd5e95.exe 28c78b79dbd42cf8c1e6d8170c3b257246af1fa0ce52fd8e4af741f2d2fd5e95.exe PID 1504 wrote to memory of 4128 1504 28c78b79dbd42cf8c1e6d8170c3b257246af1fa0ce52fd8e4af741f2d2fd5e95.exe 28c78b79dbd42cf8c1e6d8170c3b257246af1fa0ce52fd8e4af741f2d2fd5e95.exe PID 1504 wrote to memory of 4128 1504 28c78b79dbd42cf8c1e6d8170c3b257246af1fa0ce52fd8e4af741f2d2fd5e95.exe 28c78b79dbd42cf8c1e6d8170c3b257246af1fa0ce52fd8e4af741f2d2fd5e95.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\28c78b79dbd42cf8c1e6d8170c3b257246af1fa0ce52fd8e4af741f2d2fd5e95.exe"C:\Users\Admin\AppData\Local\Temp\28c78b79dbd42cf8c1e6d8170c3b257246af1fa0ce52fd8e4af741f2d2fd5e95.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v shell /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\WinUpdate\WinUpdate.exe,explorer.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v shell /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\WinUpdate\WinUpdate.exe,explorer.exe"3⤵
- Modifies WinLogon for persistence
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\28c78b79dbd42cf8c1e6d8170c3b257246af1fa0ce52fd8e4af741f2d2fd5e95.exe"C:\Users\Admin\AppData\Local\Temp\28c78b79dbd42cf8c1e6d8170c3b257246af1fa0ce52fd8e4af741f2d2fd5e95.exe"2⤵
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4128