Analysis
-
max time kernel
203s -
max time network
215s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 18:58
Static task
static1
Behavioral task
behavioral1
Sample
78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe
Resource
win10v2004-20221111-en
General
-
Target
78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe
-
Size
246KB
-
MD5
45128efe493234906ecc0d34392b87fb
-
SHA1
614cd3f781aced63f9cbfb2d1134d193d5f917ee
-
SHA256
78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e
-
SHA512
5121c218c49fb4b862ce2a0baa85d392169fdb1d09f2a7473ff171c40610b279a2dd92a51674162b36e1583d0cfa68281c67e5728613fab1b6facd61b1239bc9
-
SSDEEP
3072:DxoVC/AFLxIu1v+Xq9EzmTpjeG/9Q04Smo5HaeD91knKkaY6l6l1GLcSf:DiQAFFJB+Xq9BTpag94SFt1Qj1Gx
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
svchosts.exesvchosts.exepid process 4032 svchosts.exe 4844 svchosts.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
svchosts.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\crawl = "C:\\Users\\Admin\\AppData\\Roaming\\svchosts.exe" svchosts.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run svchosts.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\crawls = "C:\\Users\\Admin\\AppData\\Roaming\\svchosts.exe" svchosts.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows\CurrentVersion\Run svchosts.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exesvchosts.exedescription pid process target process PID 1440 set thread context of 3400 1440 78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe 78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe PID 4032 set thread context of 4844 4032 svchosts.exe svchosts.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exesvchosts.exepid process 1440 78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe 1440 78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe 4032 svchosts.exe 4032 svchosts.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exesvchosts.exedescription pid process target process PID 1440 wrote to memory of 3400 1440 78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe 78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe PID 1440 wrote to memory of 3400 1440 78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe 78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe PID 1440 wrote to memory of 3400 1440 78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe 78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe PID 1440 wrote to memory of 3400 1440 78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe 78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe PID 1440 wrote to memory of 3400 1440 78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe 78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe PID 1440 wrote to memory of 3400 1440 78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe 78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe PID 1440 wrote to memory of 3400 1440 78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe 78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe PID 1440 wrote to memory of 3400 1440 78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe 78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe PID 1440 wrote to memory of 3400 1440 78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe 78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe PID 3400 wrote to memory of 4032 3400 78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe svchosts.exe PID 3400 wrote to memory of 4032 3400 78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe svchosts.exe PID 3400 wrote to memory of 4032 3400 78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe svchosts.exe PID 4032 wrote to memory of 4844 4032 svchosts.exe svchosts.exe PID 4032 wrote to memory of 4844 4032 svchosts.exe svchosts.exe PID 4032 wrote to memory of 4844 4032 svchosts.exe svchosts.exe PID 4032 wrote to memory of 4844 4032 svchosts.exe svchosts.exe PID 4032 wrote to memory of 4844 4032 svchosts.exe svchosts.exe PID 4032 wrote to memory of 4844 4032 svchosts.exe svchosts.exe PID 4032 wrote to memory of 4844 4032 svchosts.exe svchosts.exe PID 4032 wrote to memory of 4844 4032 svchosts.exe svchosts.exe PID 4032 wrote to memory of 4844 4032 svchosts.exe svchosts.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe"C:\Users\Admin\AppData\Local\Temp\78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Users\Admin\AppData\Local\Temp\78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Users\Admin\AppData\Roaming\svchosts.exe"C:\Users\Admin\AppData\Roaming\svchosts.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Users\Admin\AppData\Roaming\svchosts.exe
- Executes dropped EXE
- Adds Run key to start application
PID:4844
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
246KB
MD545128efe493234906ecc0d34392b87fb
SHA1614cd3f781aced63f9cbfb2d1134d193d5f917ee
SHA25678c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e
SHA5125121c218c49fb4b862ce2a0baa85d392169fdb1d09f2a7473ff171c40610b279a2dd92a51674162b36e1583d0cfa68281c67e5728613fab1b6facd61b1239bc9
-
Filesize
246KB
MD545128efe493234906ecc0d34392b87fb
SHA1614cd3f781aced63f9cbfb2d1134d193d5f917ee
SHA25678c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e
SHA5125121c218c49fb4b862ce2a0baa85d392169fdb1d09f2a7473ff171c40610b279a2dd92a51674162b36e1583d0cfa68281c67e5728613fab1b6facd61b1239bc9
-
Filesize
246KB
MD545128efe493234906ecc0d34392b87fb
SHA1614cd3f781aced63f9cbfb2d1134d193d5f917ee
SHA25678c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e
SHA5125121c218c49fb4b862ce2a0baa85d392169fdb1d09f2a7473ff171c40610b279a2dd92a51674162b36e1583d0cfa68281c67e5728613fab1b6facd61b1239bc9