Analysis
-
max time kernel
126s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 15:39
Behavioral task
behavioral1
Sample
e391b549cc575755655802d16691c97d32d21519259300193ae41b14d2053893.exe
Resource
win7-20220901-en
General
-
Target
e391b549cc575755655802d16691c97d32d21519259300193ae41b14d2053893.exe
-
Size
48KB
-
MD5
8f1f6fe84252422b32490de26941667d
-
SHA1
aefdf7afc7f0127db015e9c5a5fba32764dcb65f
-
SHA256
e391b549cc575755655802d16691c97d32d21519259300193ae41b14d2053893
-
SHA512
82449e469044f4d82740dd803519444d064238f1d22af7c736333c8093268222e1831baf5314610a92fe95b727573be0f66a07abe142173c61511019e08092bd
-
SSDEEP
768:yqzAfdxZjz9oT1oOL0ysBj27/6nnnnnR5D70GlafPsA2XPa:BzAfdxZjz9oRoM0Jj27/6nnnnnR5DNGv
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Tempserver.exepid process 1612 Tempserver.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
e391b549cc575755655802d16691c97d32d21519259300193ae41b14d2053893.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation e391b549cc575755655802d16691c97d32d21519259300193ae41b14d2053893.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
dw20.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
dw20.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
dw20.exedescription pid process Token: SeRestorePrivilege 1884 dw20.exe Token: SeBackupPrivilege 1884 dw20.exe Token: SeBackupPrivilege 1884 dw20.exe Token: SeBackupPrivilege 1884 dw20.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
e391b549cc575755655802d16691c97d32d21519259300193ae41b14d2053893.exeTempserver.exedescription pid process target process PID 4980 wrote to memory of 1612 4980 e391b549cc575755655802d16691c97d32d21519259300193ae41b14d2053893.exe Tempserver.exe PID 4980 wrote to memory of 1612 4980 e391b549cc575755655802d16691c97d32d21519259300193ae41b14d2053893.exe Tempserver.exe PID 4980 wrote to memory of 1612 4980 e391b549cc575755655802d16691c97d32d21519259300193ae41b14d2053893.exe Tempserver.exe PID 1612 wrote to memory of 1884 1612 Tempserver.exe dw20.exe PID 1612 wrote to memory of 1884 1612 Tempserver.exe dw20.exe PID 1612 wrote to memory of 1884 1612 Tempserver.exe dw20.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e391b549cc575755655802d16691c97d32d21519259300193ae41b14d2053893.exe"C:\Users\Admin\AppData\Local\Temp\e391b549cc575755655802d16691c97d32d21519259300193ae41b14d2053893.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Users\Admin\AppData\Local\Tempserver.exe"C:\Users\Admin\AppData\Local\Tempserver.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 8003⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:1884
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27KB
MD5c32da36c0e20bbad858843583913cee0
SHA1e21483236d5f4a8df0f9f94eeecbc79b0838204b
SHA256bf14c34ac9e91ee9423dd622228806d18f8e0e2a4843ecc97711aab7771b483b
SHA51218457cc75078ca0637b234a35fe9719cb72da307b68a1a587f5998d0e32ed5ff08676eaa72b28958c1d4159e9e4bd371962af14d1f3ea28b1fcc3e074bba4ced
-
Filesize
27KB
MD5c32da36c0e20bbad858843583913cee0
SHA1e21483236d5f4a8df0f9f94eeecbc79b0838204b
SHA256bf14c34ac9e91ee9423dd622228806d18f8e0e2a4843ecc97711aab7771b483b
SHA51218457cc75078ca0637b234a35fe9719cb72da307b68a1a587f5998d0e32ed5ff08676eaa72b28958c1d4159e9e4bd371962af14d1f3ea28b1fcc3e074bba4ced