Analysis
-
max time kernel
251s -
max time network
297s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 17:03
Behavioral task
behavioral1
Sample
62f4505fcc2dc496eee01cfd8b092d4f66b4d107a6d52e887907647cc177c1f8.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
62f4505fcc2dc496eee01cfd8b092d4f66b4d107a6d52e887907647cc177c1f8.exe
Resource
win10v2004-20221111-en
General
-
Target
62f4505fcc2dc496eee01cfd8b092d4f66b4d107a6d52e887907647cc177c1f8.exe
-
Size
134KB
-
MD5
5d8b2924913d123783f8c9836a502894
-
SHA1
0701c16319677842d7c1a63efd0fce1a6e9f023b
-
SHA256
62f4505fcc2dc496eee01cfd8b092d4f66b4d107a6d52e887907647cc177c1f8
-
SHA512
8c5ed264db9a3042d7a09f64fba92df4949a5e77c005f95158624c63c6eddcc03fc9c770af1290f40781caee63c6703f6638123272b63ec263bdd4fadeac5e9b
-
SSDEEP
3072:Dxaw7lEvFCsE8uKqMJBrHnsAWNqubkdBytQlaVrAUdB1/:TlFstuKqMJ9Hn5WNqub/tpV841
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
trys.exetrys.exetrys.exepid process 1320 trys.exe 4532 trys.exe 3516 trys.exe -
Processes:
resource yara_rule behavioral2/memory/2704-134-0x0000000000400000-0x0000000000470000-memory.dmp upx behavioral2/memory/3244-136-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/2704-139-0x0000000000400000-0x0000000000470000-memory.dmp upx behavioral2/memory/3244-138-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3244-140-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3244-143-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3244-145-0x0000000000400000-0x000000000040B000-memory.dmp upx C:\Windows\trys.exe upx C:\Windows\trys.exe upx behavioral2/memory/1320-153-0x0000000000400000-0x0000000000470000-memory.dmp upx C:\Windows\trys.exe upx C:\Windows\trys.exe upx behavioral2/memory/3516-160-0x0000000013140000-0x0000000013162000-memory.dmp upx behavioral2/memory/1320-166-0x0000000000400000-0x0000000000470000-memory.dmp upx behavioral2/memory/4532-167-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3516-168-0x0000000000400000-0x0000000000470000-memory.dmp upx behavioral2/memory/4532-169-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3244-171-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3516-170-0x0000000013140000-0x0000000013162000-memory.dmp upx behavioral2/memory/3516-172-0x0000000013140000-0x0000000013162000-memory.dmp upx behavioral2/memory/3516-173-0x0000000013140000-0x0000000013162000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
62f4505fcc2dc496eee01cfd8b092d4f66b4d107a6d52e887907647cc177c1f8.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation 62f4505fcc2dc496eee01cfd8b092d4f66b4d107a6d52e887907647cc177c1f8.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ineter Mc = "C:\\Windows\\trys.exe" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
62f4505fcc2dc496eee01cfd8b092d4f66b4d107a6d52e887907647cc177c1f8.exetrys.exedescription pid process target process PID 2704 set thread context of 3244 2704 62f4505fcc2dc496eee01cfd8b092d4f66b4d107a6d52e887907647cc177c1f8.exe 62f4505fcc2dc496eee01cfd8b092d4f66b4d107a6d52e887907647cc177c1f8.exe PID 1320 set thread context of 4532 1320 trys.exe trys.exe PID 1320 set thread context of 3516 1320 trys.exe trys.exe -
Drops file in Windows directory 2 IoCs
Processes:
62f4505fcc2dc496eee01cfd8b092d4f66b4d107a6d52e887907647cc177c1f8.exedescription ioc process File created C:\Windows\trys.exe 62f4505fcc2dc496eee01cfd8b092d4f66b4d107a6d52e887907647cc177c1f8.exe File opened for modification C:\Windows\trys.exe 62f4505fcc2dc496eee01cfd8b092d4f66b4d107a6d52e887907647cc177c1f8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 53 IoCs
Processes:
trys.exedescription pid process Token: SeDebugPrivilege 4532 trys.exe Token: SeDebugPrivilege 4532 trys.exe Token: SeDebugPrivilege 4532 trys.exe Token: SeDebugPrivilege 4532 trys.exe Token: SeDebugPrivilege 4532 trys.exe Token: SeDebugPrivilege 4532 trys.exe Token: SeDebugPrivilege 4532 trys.exe Token: SeDebugPrivilege 4532 trys.exe Token: SeDebugPrivilege 4532 trys.exe Token: SeDebugPrivilege 4532 trys.exe Token: SeDebugPrivilege 4532 trys.exe Token: SeDebugPrivilege 4532 trys.exe Token: SeDebugPrivilege 4532 trys.exe Token: SeDebugPrivilege 4532 trys.exe Token: SeDebugPrivilege 4532 trys.exe Token: SeDebugPrivilege 4532 trys.exe Token: SeDebugPrivilege 4532 trys.exe Token: SeDebugPrivilege 4532 trys.exe Token: SeDebugPrivilege 4532 trys.exe Token: SeDebugPrivilege 4532 trys.exe Token: SeDebugPrivilege 4532 trys.exe Token: SeDebugPrivilege 4532 trys.exe Token: SeDebugPrivilege 4532 trys.exe Token: SeDebugPrivilege 4532 trys.exe Token: SeDebugPrivilege 4532 trys.exe Token: SeDebugPrivilege 4532 trys.exe Token: SeDebugPrivilege 4532 trys.exe Token: SeDebugPrivilege 4532 trys.exe Token: SeDebugPrivilege 4532 trys.exe Token: SeDebugPrivilege 4532 trys.exe Token: SeDebugPrivilege 4532 trys.exe Token: SeDebugPrivilege 4532 trys.exe Token: SeDebugPrivilege 4532 trys.exe Token: SeDebugPrivilege 4532 trys.exe Token: SeDebugPrivilege 4532 trys.exe Token: SeDebugPrivilege 4532 trys.exe Token: SeDebugPrivilege 4532 trys.exe Token: SeDebugPrivilege 4532 trys.exe Token: SeDebugPrivilege 4532 trys.exe Token: SeDebugPrivilege 4532 trys.exe Token: SeDebugPrivilege 4532 trys.exe Token: SeDebugPrivilege 4532 trys.exe Token: SeDebugPrivilege 4532 trys.exe Token: SeDebugPrivilege 4532 trys.exe Token: SeDebugPrivilege 4532 trys.exe Token: SeDebugPrivilege 4532 trys.exe Token: SeDebugPrivilege 4532 trys.exe Token: SeDebugPrivilege 4532 trys.exe Token: SeDebugPrivilege 4532 trys.exe Token: SeDebugPrivilege 4532 trys.exe Token: SeDebugPrivilege 4532 trys.exe Token: SeDebugPrivilege 4532 trys.exe Token: SeDebugPrivilege 4532 trys.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
62f4505fcc2dc496eee01cfd8b092d4f66b4d107a6d52e887907647cc177c1f8.exe62f4505fcc2dc496eee01cfd8b092d4f66b4d107a6d52e887907647cc177c1f8.exetrys.exetrys.exepid process 2704 62f4505fcc2dc496eee01cfd8b092d4f66b4d107a6d52e887907647cc177c1f8.exe 3244 62f4505fcc2dc496eee01cfd8b092d4f66b4d107a6d52e887907647cc177c1f8.exe 1320 trys.exe 1320 trys.exe 4532 trys.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
62f4505fcc2dc496eee01cfd8b092d4f66b4d107a6d52e887907647cc177c1f8.exe62f4505fcc2dc496eee01cfd8b092d4f66b4d107a6d52e887907647cc177c1f8.execmd.exetrys.exedescription pid process target process PID 2704 wrote to memory of 3244 2704 62f4505fcc2dc496eee01cfd8b092d4f66b4d107a6d52e887907647cc177c1f8.exe 62f4505fcc2dc496eee01cfd8b092d4f66b4d107a6d52e887907647cc177c1f8.exe PID 2704 wrote to memory of 3244 2704 62f4505fcc2dc496eee01cfd8b092d4f66b4d107a6d52e887907647cc177c1f8.exe 62f4505fcc2dc496eee01cfd8b092d4f66b4d107a6d52e887907647cc177c1f8.exe PID 2704 wrote to memory of 3244 2704 62f4505fcc2dc496eee01cfd8b092d4f66b4d107a6d52e887907647cc177c1f8.exe 62f4505fcc2dc496eee01cfd8b092d4f66b4d107a6d52e887907647cc177c1f8.exe PID 2704 wrote to memory of 3244 2704 62f4505fcc2dc496eee01cfd8b092d4f66b4d107a6d52e887907647cc177c1f8.exe 62f4505fcc2dc496eee01cfd8b092d4f66b4d107a6d52e887907647cc177c1f8.exe PID 2704 wrote to memory of 3244 2704 62f4505fcc2dc496eee01cfd8b092d4f66b4d107a6d52e887907647cc177c1f8.exe 62f4505fcc2dc496eee01cfd8b092d4f66b4d107a6d52e887907647cc177c1f8.exe PID 2704 wrote to memory of 3244 2704 62f4505fcc2dc496eee01cfd8b092d4f66b4d107a6d52e887907647cc177c1f8.exe 62f4505fcc2dc496eee01cfd8b092d4f66b4d107a6d52e887907647cc177c1f8.exe PID 2704 wrote to memory of 3244 2704 62f4505fcc2dc496eee01cfd8b092d4f66b4d107a6d52e887907647cc177c1f8.exe 62f4505fcc2dc496eee01cfd8b092d4f66b4d107a6d52e887907647cc177c1f8.exe PID 2704 wrote to memory of 3244 2704 62f4505fcc2dc496eee01cfd8b092d4f66b4d107a6d52e887907647cc177c1f8.exe 62f4505fcc2dc496eee01cfd8b092d4f66b4d107a6d52e887907647cc177c1f8.exe PID 3244 wrote to memory of 656 3244 62f4505fcc2dc496eee01cfd8b092d4f66b4d107a6d52e887907647cc177c1f8.exe cmd.exe PID 3244 wrote to memory of 656 3244 62f4505fcc2dc496eee01cfd8b092d4f66b4d107a6d52e887907647cc177c1f8.exe cmd.exe PID 3244 wrote to memory of 656 3244 62f4505fcc2dc496eee01cfd8b092d4f66b4d107a6d52e887907647cc177c1f8.exe cmd.exe PID 656 wrote to memory of 1664 656 cmd.exe reg.exe PID 656 wrote to memory of 1664 656 cmd.exe reg.exe PID 656 wrote to memory of 1664 656 cmd.exe reg.exe PID 3244 wrote to memory of 1320 3244 62f4505fcc2dc496eee01cfd8b092d4f66b4d107a6d52e887907647cc177c1f8.exe trys.exe PID 3244 wrote to memory of 1320 3244 62f4505fcc2dc496eee01cfd8b092d4f66b4d107a6d52e887907647cc177c1f8.exe trys.exe PID 3244 wrote to memory of 1320 3244 62f4505fcc2dc496eee01cfd8b092d4f66b4d107a6d52e887907647cc177c1f8.exe trys.exe PID 1320 wrote to memory of 4532 1320 trys.exe trys.exe PID 1320 wrote to memory of 4532 1320 trys.exe trys.exe PID 1320 wrote to memory of 4532 1320 trys.exe trys.exe PID 1320 wrote to memory of 4532 1320 trys.exe trys.exe PID 1320 wrote to memory of 4532 1320 trys.exe trys.exe PID 1320 wrote to memory of 4532 1320 trys.exe trys.exe PID 1320 wrote to memory of 4532 1320 trys.exe trys.exe PID 1320 wrote to memory of 4532 1320 trys.exe trys.exe PID 1320 wrote to memory of 3516 1320 trys.exe trys.exe PID 1320 wrote to memory of 3516 1320 trys.exe trys.exe PID 1320 wrote to memory of 3516 1320 trys.exe trys.exe PID 1320 wrote to memory of 3516 1320 trys.exe trys.exe PID 1320 wrote to memory of 3516 1320 trys.exe trys.exe PID 1320 wrote to memory of 3516 1320 trys.exe trys.exe PID 1320 wrote to memory of 3516 1320 trys.exe trys.exe PID 1320 wrote to memory of 3516 1320 trys.exe trys.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\62f4505fcc2dc496eee01cfd8b092d4f66b4d107a6d52e887907647cc177c1f8.exe"C:\Users\Admin\AppData\Local\Temp\62f4505fcc2dc496eee01cfd8b092d4f66b4d107a6d52e887907647cc177c1f8.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\62f4505fcc2dc496eee01cfd8b092d4f66b4d107a6d52e887907647cc177c1f8.exe"C:\Users\Admin\AppData\Local\Temp\62f4505fcc2dc496eee01cfd8b092d4f66b4d107a6d52e887907647cc177c1f8.exe"2⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ERHVR.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Ineter Mc" /t REG_SZ /d "C:\Windows\trys.exe" /f4⤵
- Adds Run key to start application
PID:1664 -
C:\Windows\trys.exe"C:\Windows\trys.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\trys.exe"C:\Windows\trys.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4532 -
C:\Windows\trys.exe"C:\Windows\trys.exe"4⤵
- Executes dropped EXE
PID:3516
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
115B
MD5721f40b829b989f3ed90feba41b75b51
SHA10bc3e723b65a94c6ffbb8e0b32c9aaa24d10fefd
SHA256641cbc8ccc1d7ffe1030ff40ea930cad57a855c5fa275bff57745b62d4545a15
SHA512d11fa35712baa83380b1515242d85c1ce84ade1bd3e62144906b40c6e2d42c748d7813faaf05e5514048be3ae47fb29986e0a808c93eabf7128f31300c4d972f
-
Filesize
134KB
MD560ba68e1f78a8359cf23155bf5ebc95e
SHA12c381cf92b1d7ecdfab3d2e1f721f292d3561e1a
SHA256adedccc90e0517226378302362daa3f7252ee29ab5b66e247688f3ccddea103e
SHA5123a06bfcc0160c6c533734aad6a399319e277a2c224779f36622aba398d156adb9f4bd2b962e26964a88d61f51916297eeaf677492d65cdea4c9d53f418e6280c
-
Filesize
134KB
MD560ba68e1f78a8359cf23155bf5ebc95e
SHA12c381cf92b1d7ecdfab3d2e1f721f292d3561e1a
SHA256adedccc90e0517226378302362daa3f7252ee29ab5b66e247688f3ccddea103e
SHA5123a06bfcc0160c6c533734aad6a399319e277a2c224779f36622aba398d156adb9f4bd2b962e26964a88d61f51916297eeaf677492d65cdea4c9d53f418e6280c
-
Filesize
134KB
MD560ba68e1f78a8359cf23155bf5ebc95e
SHA12c381cf92b1d7ecdfab3d2e1f721f292d3561e1a
SHA256adedccc90e0517226378302362daa3f7252ee29ab5b66e247688f3ccddea103e
SHA5123a06bfcc0160c6c533734aad6a399319e277a2c224779f36622aba398d156adb9f4bd2b962e26964a88d61f51916297eeaf677492d65cdea4c9d53f418e6280c
-
Filesize
134KB
MD560ba68e1f78a8359cf23155bf5ebc95e
SHA12c381cf92b1d7ecdfab3d2e1f721f292d3561e1a
SHA256adedccc90e0517226378302362daa3f7252ee29ab5b66e247688f3ccddea103e
SHA5123a06bfcc0160c6c533734aad6a399319e277a2c224779f36622aba398d156adb9f4bd2b962e26964a88d61f51916297eeaf677492d65cdea4c9d53f418e6280c