Analysis
-
max time kernel
152s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 14:09
Static task
static1
Behavioral task
behavioral1
Sample
625f73a66ea20b0cda772b887813f26948964ae7b2b902919cfbea82e68d1b1b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
625f73a66ea20b0cda772b887813f26948964ae7b2b902919cfbea82e68d1b1b.exe
Resource
win10v2004-20220812-en
General
-
Target
625f73a66ea20b0cda772b887813f26948964ae7b2b902919cfbea82e68d1b1b.exe
-
Size
1.1MB
-
MD5
3d3b34c9c744f181884b7b4b41c1af60
-
SHA1
39dc152d324d756d28417aa3ff36f5f3a5a4a796
-
SHA256
625f73a66ea20b0cda772b887813f26948964ae7b2b902919cfbea82e68d1b1b
-
SHA512
059da0608bbf11c14726f24f6fd99fec7a896171a0c86687874b7f87df4de9561f2e615ea7a7ac169aef3e0936afd24dfe63ca0fb4f3f2ed94d174f24b72a8a9
-
SSDEEP
3072:iyf8n+BnNpiXN5U+M/hQuaCA3VMxDJAQO7LN:i/+BnNpCqP/hQuavirOH
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
Processes:
winlogon.exewinlogon.exewinlogon.exewinlogon.exepid process 2700 winlogon.exe 4008 winlogon.exe 4444 winlogon.exe 3916 winlogon.exe -
Processes:
resource yara_rule behavioral2/memory/4704-134-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/4704-136-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/4704-137-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/4704-140-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/4704-149-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/4008-154-0x0000000000400000-0x000000000041C000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
625f73a66ea20b0cda772b887813f26948964ae7b2b902919cfbea82e68d1b1b.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 625f73a66ea20b0cda772b887813f26948964ae7b2b902919cfbea82e68d1b1b.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
625f73a66ea20b0cda772b887813f26948964ae7b2b902919cfbea82e68d1b1b.exewinlogon.exewinlogon.exedescription pid process target process PID 4056 set thread context of 4704 4056 625f73a66ea20b0cda772b887813f26948964ae7b2b902919cfbea82e68d1b1b.exe 625f73a66ea20b0cda772b887813f26948964ae7b2b902919cfbea82e68d1b1b.exe PID 2700 set thread context of 4008 2700 winlogon.exe winlogon.exe PID 4008 set thread context of 4444 4008 winlogon.exe winlogon.exe PID 4008 set thread context of 3916 4008 winlogon.exe winlogon.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3584 1152 WerFault.exe 4664 4444 WerFault.exe winlogon.exe 2200 3916 WerFault.exe winlogon.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
625f73a66ea20b0cda772b887813f26948964ae7b2b902919cfbea82e68d1b1b.exewinlogon.exepid process 4704 625f73a66ea20b0cda772b887813f26948964ae7b2b902919cfbea82e68d1b1b.exe 4008 winlogon.exe -
Suspicious use of WriteProcessMemory 41 IoCs
Processes:
625f73a66ea20b0cda772b887813f26948964ae7b2b902919cfbea82e68d1b1b.exe625f73a66ea20b0cda772b887813f26948964ae7b2b902919cfbea82e68d1b1b.exewinlogon.exewinlogon.exedescription pid process target process PID 4056 wrote to memory of 2280 4056 625f73a66ea20b0cda772b887813f26948964ae7b2b902919cfbea82e68d1b1b.exe svchost.exe PID 4056 wrote to memory of 2280 4056 625f73a66ea20b0cda772b887813f26948964ae7b2b902919cfbea82e68d1b1b.exe svchost.exe PID 4056 wrote to memory of 2280 4056 625f73a66ea20b0cda772b887813f26948964ae7b2b902919cfbea82e68d1b1b.exe svchost.exe PID 4056 wrote to memory of 4704 4056 625f73a66ea20b0cda772b887813f26948964ae7b2b902919cfbea82e68d1b1b.exe 625f73a66ea20b0cda772b887813f26948964ae7b2b902919cfbea82e68d1b1b.exe PID 4056 wrote to memory of 4704 4056 625f73a66ea20b0cda772b887813f26948964ae7b2b902919cfbea82e68d1b1b.exe 625f73a66ea20b0cda772b887813f26948964ae7b2b902919cfbea82e68d1b1b.exe PID 4056 wrote to memory of 4704 4056 625f73a66ea20b0cda772b887813f26948964ae7b2b902919cfbea82e68d1b1b.exe 625f73a66ea20b0cda772b887813f26948964ae7b2b902919cfbea82e68d1b1b.exe PID 4056 wrote to memory of 4704 4056 625f73a66ea20b0cda772b887813f26948964ae7b2b902919cfbea82e68d1b1b.exe 625f73a66ea20b0cda772b887813f26948964ae7b2b902919cfbea82e68d1b1b.exe PID 4056 wrote to memory of 4704 4056 625f73a66ea20b0cda772b887813f26948964ae7b2b902919cfbea82e68d1b1b.exe 625f73a66ea20b0cda772b887813f26948964ae7b2b902919cfbea82e68d1b1b.exe PID 4056 wrote to memory of 4704 4056 625f73a66ea20b0cda772b887813f26948964ae7b2b902919cfbea82e68d1b1b.exe 625f73a66ea20b0cda772b887813f26948964ae7b2b902919cfbea82e68d1b1b.exe PID 4056 wrote to memory of 4704 4056 625f73a66ea20b0cda772b887813f26948964ae7b2b902919cfbea82e68d1b1b.exe 625f73a66ea20b0cda772b887813f26948964ae7b2b902919cfbea82e68d1b1b.exe PID 4056 wrote to memory of 4704 4056 625f73a66ea20b0cda772b887813f26948964ae7b2b902919cfbea82e68d1b1b.exe 625f73a66ea20b0cda772b887813f26948964ae7b2b902919cfbea82e68d1b1b.exe PID 4704 wrote to memory of 2700 4704 625f73a66ea20b0cda772b887813f26948964ae7b2b902919cfbea82e68d1b1b.exe winlogon.exe PID 4704 wrote to memory of 2700 4704 625f73a66ea20b0cda772b887813f26948964ae7b2b902919cfbea82e68d1b1b.exe winlogon.exe PID 4704 wrote to memory of 2700 4704 625f73a66ea20b0cda772b887813f26948964ae7b2b902919cfbea82e68d1b1b.exe winlogon.exe PID 2700 wrote to memory of 4976 2700 winlogon.exe svchost.exe PID 2700 wrote to memory of 4976 2700 winlogon.exe svchost.exe PID 2700 wrote to memory of 4976 2700 winlogon.exe svchost.exe PID 2700 wrote to memory of 4008 2700 winlogon.exe winlogon.exe PID 2700 wrote to memory of 4008 2700 winlogon.exe winlogon.exe PID 2700 wrote to memory of 4008 2700 winlogon.exe winlogon.exe PID 2700 wrote to memory of 4008 2700 winlogon.exe winlogon.exe PID 2700 wrote to memory of 4008 2700 winlogon.exe winlogon.exe PID 2700 wrote to memory of 4008 2700 winlogon.exe winlogon.exe PID 2700 wrote to memory of 4008 2700 winlogon.exe winlogon.exe PID 2700 wrote to memory of 4008 2700 winlogon.exe winlogon.exe PID 4008 wrote to memory of 4444 4008 winlogon.exe winlogon.exe PID 4008 wrote to memory of 4444 4008 winlogon.exe winlogon.exe PID 4008 wrote to memory of 4444 4008 winlogon.exe winlogon.exe PID 4008 wrote to memory of 4444 4008 winlogon.exe winlogon.exe PID 4008 wrote to memory of 4444 4008 winlogon.exe winlogon.exe PID 4008 wrote to memory of 4444 4008 winlogon.exe winlogon.exe PID 4008 wrote to memory of 4444 4008 winlogon.exe winlogon.exe PID 4008 wrote to memory of 4444 4008 winlogon.exe winlogon.exe PID 4008 wrote to memory of 3916 4008 winlogon.exe winlogon.exe PID 4008 wrote to memory of 3916 4008 winlogon.exe winlogon.exe PID 4008 wrote to memory of 3916 4008 winlogon.exe winlogon.exe PID 4008 wrote to memory of 3916 4008 winlogon.exe winlogon.exe PID 4008 wrote to memory of 3916 4008 winlogon.exe winlogon.exe PID 4008 wrote to memory of 3916 4008 winlogon.exe winlogon.exe PID 4008 wrote to memory of 3916 4008 winlogon.exe winlogon.exe PID 4008 wrote to memory of 3916 4008 winlogon.exe winlogon.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\625f73a66ea20b0cda772b887813f26948964ae7b2b902919cfbea82e68d1b1b.exe"C:\Users\Admin\AppData\Local\Temp\625f73a66ea20b0cda772b887813f26948964ae7b2b902919cfbea82e68d1b1b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\\svchost.exe2⤵PID:2280
-
-
C:\Users\Admin\AppData\Local\Temp\625f73a66ea20b0cda772b887813f26948964ae7b2b902919cfbea82e68d1b1b.exe
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\\svchost.exe4⤵PID:4976
-
-
C:\Users\Admin\E696D64614\winlogon.exe
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"5⤵
- Executes dropped EXE
PID:4444 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4444 -s 126⤵
- Program crash
PID:4664
-
-
-
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"5⤵
- Executes dropped EXE
PID:3916 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3916 -s 126⤵
- Program crash
PID:2200
-
-
-
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 420 -p 1152 -ip 11521⤵PID:704
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1152 -s 17601⤵
- Program crash
PID:3584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4444 -ip 44441⤵PID:2336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3916 -ip 39161⤵PID:1832
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD53d3b34c9c744f181884b7b4b41c1af60
SHA139dc152d324d756d28417aa3ff36f5f3a5a4a796
SHA256625f73a66ea20b0cda772b887813f26948964ae7b2b902919cfbea82e68d1b1b
SHA512059da0608bbf11c14726f24f6fd99fec7a896171a0c86687874b7f87df4de9561f2e615ea7a7ac169aef3e0936afd24dfe63ca0fb4f3f2ed94d174f24b72a8a9
-
Filesize
1.1MB
MD53d3b34c9c744f181884b7b4b41c1af60
SHA139dc152d324d756d28417aa3ff36f5f3a5a4a796
SHA256625f73a66ea20b0cda772b887813f26948964ae7b2b902919cfbea82e68d1b1b
SHA512059da0608bbf11c14726f24f6fd99fec7a896171a0c86687874b7f87df4de9561f2e615ea7a7ac169aef3e0936afd24dfe63ca0fb4f3f2ed94d174f24b72a8a9
-
Filesize
1.1MB
MD53d3b34c9c744f181884b7b4b41c1af60
SHA139dc152d324d756d28417aa3ff36f5f3a5a4a796
SHA256625f73a66ea20b0cda772b887813f26948964ae7b2b902919cfbea82e68d1b1b
SHA512059da0608bbf11c14726f24f6fd99fec7a896171a0c86687874b7f87df4de9561f2e615ea7a7ac169aef3e0936afd24dfe63ca0fb4f3f2ed94d174f24b72a8a9
-
Filesize
1.1MB
MD53d3b34c9c744f181884b7b4b41c1af60
SHA139dc152d324d756d28417aa3ff36f5f3a5a4a796
SHA256625f73a66ea20b0cda772b887813f26948964ae7b2b902919cfbea82e68d1b1b
SHA512059da0608bbf11c14726f24f6fd99fec7a896171a0c86687874b7f87df4de9561f2e615ea7a7ac169aef3e0936afd24dfe63ca0fb4f3f2ed94d174f24b72a8a9
-
Filesize
1.1MB
MD53d3b34c9c744f181884b7b4b41c1af60
SHA139dc152d324d756d28417aa3ff36f5f3a5a4a796
SHA256625f73a66ea20b0cda772b887813f26948964ae7b2b902919cfbea82e68d1b1b
SHA512059da0608bbf11c14726f24f6fd99fec7a896171a0c86687874b7f87df4de9561f2e615ea7a7ac169aef3e0936afd24dfe63ca0fb4f3f2ed94d174f24b72a8a9