Analysis
-
max time kernel
181s -
max time network
205s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 17:18
Static task
static1
Behavioral task
behavioral1
Sample
ff49b00b01057c6effc71e75ccefcded580ed896a41120a532422200a72be1b4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ff49b00b01057c6effc71e75ccefcded580ed896a41120a532422200a72be1b4.exe
Resource
win10v2004-20221111-en
General
-
Target
ff49b00b01057c6effc71e75ccefcded580ed896a41120a532422200a72be1b4.exe
-
Size
2.4MB
-
MD5
54a7c19c3978126a1120de7b6af5d48c
-
SHA1
bf8ca5950b9f0ccb64a15a192c718c5e0fab9f5b
-
SHA256
ff49b00b01057c6effc71e75ccefcded580ed896a41120a532422200a72be1b4
-
SHA512
28c7ff438a3b02098bb6d85ea4eabd4ce0a678ca933c5f2b7d380ed88e634677f6dbca2c0a9ede366ece329b7809029e339bb50d4444d2ac1877898c3412e1f0
-
SSDEEP
49152:WxoIUFS2336KoEBCGCdJzjUxnC+EnvAhezw9o+ZZ7hGeJ3TuzcC4:PIUFSbK1C7/zYxCXhzw9o+DMmyzcL
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
END 4 IDM.exeend.exepid process 2564 END 4 IDM.exe 1676 end.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ff49b00b01057c6effc71e75ccefcded580ed896a41120a532422200a72be1b4.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Control Panel\International\Geo\Nation ff49b00b01057c6effc71e75ccefcded580ed896a41120a532422200a72be1b4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
ff49b00b01057c6effc71e75ccefcded580ed896a41120a532422200a72be1b4.exeEND 4 IDM.execmd.execmd.exedescription pid process target process PID 876 wrote to memory of 2564 876 ff49b00b01057c6effc71e75ccefcded580ed896a41120a532422200a72be1b4.exe END 4 IDM.exe PID 876 wrote to memory of 2564 876 ff49b00b01057c6effc71e75ccefcded580ed896a41120a532422200a72be1b4.exe END 4 IDM.exe PID 876 wrote to memory of 2564 876 ff49b00b01057c6effc71e75ccefcded580ed896a41120a532422200a72be1b4.exe END 4 IDM.exe PID 2564 wrote to memory of 3356 2564 END 4 IDM.exe cmd.exe PID 2564 wrote to memory of 3356 2564 END 4 IDM.exe cmd.exe PID 2564 wrote to memory of 3356 2564 END 4 IDM.exe cmd.exe PID 2564 wrote to memory of 3588 2564 END 4 IDM.exe cmd.exe PID 2564 wrote to memory of 3588 2564 END 4 IDM.exe cmd.exe PID 2564 wrote to memory of 3588 2564 END 4 IDM.exe cmd.exe PID 2564 wrote to memory of 4700 2564 END 4 IDM.exe cmd.exe PID 2564 wrote to memory of 4700 2564 END 4 IDM.exe cmd.exe PID 2564 wrote to memory of 4700 2564 END 4 IDM.exe cmd.exe PID 4700 wrote to memory of 4704 4700 cmd.exe attrib.exe PID 4700 wrote to memory of 4704 4700 cmd.exe attrib.exe PID 4700 wrote to memory of 4704 4700 cmd.exe attrib.exe PID 2564 wrote to memory of 2640 2564 END 4 IDM.exe cmd.exe PID 2564 wrote to memory of 2640 2564 END 4 IDM.exe cmd.exe PID 2564 wrote to memory of 2640 2564 END 4 IDM.exe cmd.exe PID 2564 wrote to memory of 4352 2564 END 4 IDM.exe cmd.exe PID 2564 wrote to memory of 4352 2564 END 4 IDM.exe cmd.exe PID 2564 wrote to memory of 4352 2564 END 4 IDM.exe cmd.exe PID 2564 wrote to memory of 4712 2564 END 4 IDM.exe cmd.exe PID 2564 wrote to memory of 4712 2564 END 4 IDM.exe cmd.exe PID 2564 wrote to memory of 4712 2564 END 4 IDM.exe cmd.exe PID 4712 wrote to memory of 4764 4712 cmd.exe mode.com PID 4712 wrote to memory of 4764 4712 cmd.exe mode.com PID 4712 wrote to memory of 4764 4712 cmd.exe mode.com PID 4712 wrote to memory of 1676 4712 cmd.exe end.exe PID 4712 wrote to memory of 1676 4712 cmd.exe end.exe PID 4712 wrote to memory of 1676 4712 cmd.exe end.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff49b00b01057c6effc71e75ccefcded580ed896a41120a532422200a72be1b4.exe"C:\Users\Admin\AppData\Local\Temp\ff49b00b01057c6effc71e75ccefcded580ed896a41120a532422200a72be1b4.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Temp\END 4 IDM.exe"C:\Temp\END 4 IDM.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c if not exist "C:\Users\Admin\AppData\Local\Temp\afolder" mkdir "C:\Users\Admin\AppData\Local\Temp\afolder"3⤵PID:3356
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c if not exist "C:\Users\Admin\AppData\Local\Temp\ztmp" mkdir "C:\Users\Admin\AppData\Local\Temp\ztmp"3⤵PID:3588
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c attrib +h C:\Users\Admin\AppData\Local\Temp\ztmp3⤵
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Windows\SysWOW64\attrib.exeattrib +h C:\Users\Admin\AppData\Local\Temp\ztmp4⤵
- Views/modifies file attributes
PID:4704 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c if exist "C:\Users\Admin\AppData\Local\Temp\ztmp\tmp5046.bat" del "C:\Users\Admin\AppData\Local\Temp\ztmp\tmp5046.bat"3⤵PID:2640
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c if exist "C:\Users\Admin\AppData\Local\Temp\ztmp\tmp4578.exe" del "C:\Users\Admin\AppData\Local\Temp\ztmp\tmp4578.exe"3⤵PID:4352
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\ztmp\tmp5046.bat "C:\Temp\END 4 IDM.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Windows\SysWOW64\mode.commode 13,14⤵PID:4764
-
C:\Temp\end.exeend.exe4⤵
- Executes dropped EXE
PID:1676
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD5944712b001e1a9eed533069a032e6509
SHA1854d21eb7c2637da1a26c2e92666c572cb62c903
SHA256f8454f89e87391e3076f0ca77edf41007bf3e6c2fc2810f37e016b3126ad589f
SHA512f57d31ba445c8cd234dca7db2492b3df360cb5678691f5968d457c9d735775eed74a893c5b09abf9558d8cbbf6acce715b6c60fa935264da68e27301c7d5ad81
-
Filesize
76KB
MD5944712b001e1a9eed533069a032e6509
SHA1854d21eb7c2637da1a26c2e92666c572cb62c903
SHA256f8454f89e87391e3076f0ca77edf41007bf3e6c2fc2810f37e016b3126ad589f
SHA512f57d31ba445c8cd234dca7db2492b3df360cb5678691f5968d457c9d735775eed74a893c5b09abf9558d8cbbf6acce715b6c60fa935264da68e27301c7d5ad81
-
Filesize
849KB
MD5607598876e9dc8bcb7afb6ad25b88f10
SHA1530cd0b31445c7a436025842dfecd10c1fccd83e
SHA256dab4f5ba7f100ce986be92c6129534223ca700c1828509e2f456a533e56d400f
SHA5128116fa7d887e1193a621f67069624a772be5b60978fb2e3851767813f3a63ee99a2bba27fc0a0a321180d73f1554dce9ba14159ad420463a7dbb6cca0fd71191
-
Filesize
849KB
MD5607598876e9dc8bcb7afb6ad25b88f10
SHA1530cd0b31445c7a436025842dfecd10c1fccd83e
SHA256dab4f5ba7f100ce986be92c6129534223ca700c1828509e2f456a533e56d400f
SHA5128116fa7d887e1193a621f67069624a772be5b60978fb2e3851767813f3a63ee99a2bba27fc0a0a321180d73f1554dce9ba14159ad420463a7dbb6cca0fd71191
-
Filesize
464B
MD52da3c9433c40fd56aa43cfc7991d9cc4
SHA1d641f84b872e149ca4d7b30ac54c5284b7fe500b
SHA256fbe7efd2bb72681d3040ed298bd390956b5e59cdcd166754daf740c299915bf3
SHA51254597432839914a3ad33197a1d8c6cb5cd025a49f281296c07a8cdfee6df5cb67580f91d459bbfab29a232aac08d1f843a3eab2798e5971ec8ec3f0316009c1a