Analysis
-
max time kernel
152s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 14:10
Static task
static1
Behavioral task
behavioral1
Sample
603eb2a38b8787dfea085ffec4880027b11b42434a63449461a96ecfb01079cc.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
603eb2a38b8787dfea085ffec4880027b11b42434a63449461a96ecfb01079cc.exe
Resource
win10v2004-20221111-en
General
-
Target
603eb2a38b8787dfea085ffec4880027b11b42434a63449461a96ecfb01079cc.exe
-
Size
1.8MB
-
MD5
638c3aa984b07bd0e505aa7234730c89
-
SHA1
c1e8f9a2f66bb1211e7002e4ffe7e9615aa7beb8
-
SHA256
603eb2a38b8787dfea085ffec4880027b11b42434a63449461a96ecfb01079cc
-
SHA512
7655c701c8b4c428350a4ba795835328aa9079e189744adddb48cfe33e51e12e669a59dd1a151f33933e1df8decebda93e0fa759a99cafd547a4a339de754f81
-
SSDEEP
24576:zblFntFE3KQBJ6vw8sCD3XrtB2/UM/ibQ0pkbQcpeSSUPDb1bai65pzvcZKYcf:z3tFEhywKntB0GTwo2PDbFLQpOwf
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Protector-jttq.exepid process 1892 Protector-jttq.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
603eb2a38b8787dfea085ffec4880027b11b42434a63449461a96ecfb01079cc.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation 603eb2a38b8787dfea085ffec4880027b11b42434a63449461a96ecfb01079cc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
603eb2a38b8787dfea085ffec4880027b11b42434a63449461a96ecfb01079cc.exeProtector-jttq.exedescription pid process Token: SeDebugPrivilege 3364 603eb2a38b8787dfea085ffec4880027b11b42434a63449461a96ecfb01079cc.exe Token: SeDebugPrivilege 1892 Protector-jttq.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
603eb2a38b8787dfea085ffec4880027b11b42434a63449461a96ecfb01079cc.exeProtector-jttq.exepid process 3364 603eb2a38b8787dfea085ffec4880027b11b42434a63449461a96ecfb01079cc.exe 1892 Protector-jttq.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
603eb2a38b8787dfea085ffec4880027b11b42434a63449461a96ecfb01079cc.exedescription pid process target process PID 3364 wrote to memory of 1892 3364 603eb2a38b8787dfea085ffec4880027b11b42434a63449461a96ecfb01079cc.exe Protector-jttq.exe PID 3364 wrote to memory of 1892 3364 603eb2a38b8787dfea085ffec4880027b11b42434a63449461a96ecfb01079cc.exe Protector-jttq.exe PID 3364 wrote to memory of 1892 3364 603eb2a38b8787dfea085ffec4880027b11b42434a63449461a96ecfb01079cc.exe Protector-jttq.exe PID 3364 wrote to memory of 1140 3364 603eb2a38b8787dfea085ffec4880027b11b42434a63449461a96ecfb01079cc.exe cmd.exe PID 3364 wrote to memory of 1140 3364 603eb2a38b8787dfea085ffec4880027b11b42434a63449461a96ecfb01079cc.exe cmd.exe PID 3364 wrote to memory of 1140 3364 603eb2a38b8787dfea085ffec4880027b11b42434a63449461a96ecfb01079cc.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\603eb2a38b8787dfea085ffec4880027b11b42434a63449461a96ecfb01079cc.exe"C:\Users\Admin\AppData\Local\Temp\603eb2a38b8787dfea085ffec4880027b11b42434a63449461a96ecfb01079cc.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Users\Admin\AppData\Roaming\Protector-jttq.exeC:\Users\Admin\AppData\Roaming\Protector-jttq.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1892
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\603EB2~1.EXE" >> NUL2⤵PID:1140
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5638c3aa984b07bd0e505aa7234730c89
SHA1c1e8f9a2f66bb1211e7002e4ffe7e9615aa7beb8
SHA256603eb2a38b8787dfea085ffec4880027b11b42434a63449461a96ecfb01079cc
SHA5127655c701c8b4c428350a4ba795835328aa9079e189744adddb48cfe33e51e12e669a59dd1a151f33933e1df8decebda93e0fa759a99cafd547a4a339de754f81
-
Filesize
1.8MB
MD5638c3aa984b07bd0e505aa7234730c89
SHA1c1e8f9a2f66bb1211e7002e4ffe7e9615aa7beb8
SHA256603eb2a38b8787dfea085ffec4880027b11b42434a63449461a96ecfb01079cc
SHA5127655c701c8b4c428350a4ba795835328aa9079e189744adddb48cfe33e51e12e669a59dd1a151f33933e1df8decebda93e0fa759a99cafd547a4a339de754f81