Analysis
-
max time kernel
186s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 14:24
Static task
static1
Behavioral task
behavioral1
Sample
49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe
Resource
win10v2004-20220812-en
General
-
Target
49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe
-
Size
60KB
-
MD5
be57bf494559581a52e67b35a994eee4
-
SHA1
8784613380e22a72cf9e8404cf2562a4b5b36f1e
-
SHA256
49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102
-
SHA512
f6cbdacad846794a44449b0e858baf7a0befb5a7f8d47eba40474b9013955ade77d6080241cf18a899ad0e639f2badfd73f1402210a2706cd425d3ce5ff00a01
-
SSDEEP
1536:Q/GRyei2Bso+gU7aG57rZifwFODTnF/w12TFZ9jDSN:bi2Bs0U7ZZ0wFch/w12TzgN
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" .exe -
Executes dropped EXE 1 IoCs
Processes:
.exepid process 4916 .exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\.exe" .exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ .exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
.exepid process 4916 .exe 4916 .exe 4916 .exe 4916 .exe 4916 .exe 4916 .exe 4916 .exe 4916 .exe 4916 .exe 4916 .exe 4916 .exe 4916 .exe 4916 .exe 4916 .exe 4916 .exe 4916 .exe 4916 .exe 4916 .exe 4916 .exe 4916 .exe 4916 .exe 4916 .exe 4916 .exe 4916 .exe 4916 .exe 4916 .exe 4916 .exe 4916 .exe 4916 .exe 4916 .exe 4916 .exe 4916 .exe 4916 .exe 4916 .exe 4916 .exe 4916 .exe 4916 .exe 4916 .exe 4916 .exe 4916 .exe 4916 .exe 4916 .exe 4916 .exe 4916 .exe 4916 .exe 4916 .exe 4916 .exe 4916 .exe 4916 .exe 4916 .exe 4916 .exe 4916 .exe 4916 .exe 4916 .exe 4916 .exe 4916 .exe 4916 .exe 4916 .exe 4916 .exe 4916 .exe 4916 .exe 4916 .exe 4916 .exe 4916 .exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe.exepid process 1952 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe 4916 .exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe.exedescription pid process target process PID 1952 wrote to memory of 4916 1952 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe .exe PID 1952 wrote to memory of 4916 1952 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe .exe PID 1952 wrote to memory of 4916 1952 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe .exe PID 4916 wrote to memory of 1952 4916 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 4916 wrote to memory of 1952 4916 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 4916 wrote to memory of 1952 4916 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 4916 wrote to memory of 1952 4916 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 4916 wrote to memory of 1952 4916 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 4916 wrote to memory of 1952 4916 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 4916 wrote to memory of 1952 4916 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 4916 wrote to memory of 1952 4916 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 4916 wrote to memory of 1952 4916 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 4916 wrote to memory of 1952 4916 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 4916 wrote to memory of 1952 4916 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 4916 wrote to memory of 1952 4916 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 4916 wrote to memory of 1952 4916 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 4916 wrote to memory of 1952 4916 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 4916 wrote to memory of 1952 4916 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 4916 wrote to memory of 1952 4916 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 4916 wrote to memory of 1952 4916 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 4916 wrote to memory of 1952 4916 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 4916 wrote to memory of 1952 4916 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 4916 wrote to memory of 1952 4916 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 4916 wrote to memory of 1952 4916 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 4916 wrote to memory of 1952 4916 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 4916 wrote to memory of 1952 4916 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 4916 wrote to memory of 1952 4916 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 4916 wrote to memory of 1952 4916 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 4916 wrote to memory of 1952 4916 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 4916 wrote to memory of 1952 4916 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 4916 wrote to memory of 1952 4916 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 4916 wrote to memory of 1952 4916 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 4916 wrote to memory of 1952 4916 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 4916 wrote to memory of 1952 4916 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 4916 wrote to memory of 1952 4916 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 4916 wrote to memory of 1952 4916 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 4916 wrote to memory of 1952 4916 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 4916 wrote to memory of 1952 4916 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 4916 wrote to memory of 1952 4916 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 4916 wrote to memory of 1952 4916 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 4916 wrote to memory of 1952 4916 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 4916 wrote to memory of 1952 4916 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 4916 wrote to memory of 1952 4916 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 4916 wrote to memory of 1952 4916 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 4916 wrote to memory of 1952 4916 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 4916 wrote to memory of 1952 4916 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 4916 wrote to memory of 1952 4916 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 4916 wrote to memory of 1952 4916 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 4916 wrote to memory of 1952 4916 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 4916 wrote to memory of 1952 4916 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 4916 wrote to memory of 1952 4916 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 4916 wrote to memory of 1952 4916 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 4916 wrote to memory of 1952 4916 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 4916 wrote to memory of 1952 4916 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 4916 wrote to memory of 1952 4916 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 4916 wrote to memory of 1952 4916 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 4916 wrote to memory of 1952 4916 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 4916 wrote to memory of 1952 4916 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 4916 wrote to memory of 1952 4916 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 4916 wrote to memory of 1952 4916 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 4916 wrote to memory of 1952 4916 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 4916 wrote to memory of 1952 4916 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 4916 wrote to memory of 1952 4916 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 4916 wrote to memory of 1952 4916 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe"C:\Users\Admin\AppData\Local\Temp\49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\.exe"C:\Users\Admin\.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4916
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD504515d8289148d2f124db2edc5ab02fd
SHA14b5531958db615006771976173e868b185010a77
SHA25699d083513ef8dceb97abed81b4141ab274b50d9eecf4468dddf66461b38cf12e
SHA5126676feda0889ba9f42c1c1219a77989a02db1b6f385be61a134306e95e979f52f9910a5a4e2c6e6e780eedd9cbd0a463c1983e682e42a70ce7ccc290f6b705a1
-
Filesize
60KB
MD504515d8289148d2f124db2edc5ab02fd
SHA14b5531958db615006771976173e868b185010a77
SHA25699d083513ef8dceb97abed81b4141ab274b50d9eecf4468dddf66461b38cf12e
SHA5126676feda0889ba9f42c1c1219a77989a02db1b6f385be61a134306e95e979f52f9910a5a4e2c6e6e780eedd9cbd0a463c1983e682e42a70ce7ccc290f6b705a1