Analysis
-
max time kernel
190s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 00:30
Static task
static1
Behavioral task
behavioral1
Sample
4420fef87deee22a1ebda98c39da4aaa061da8a6068d7ff433ea7d1634c2f8be.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4420fef87deee22a1ebda98c39da4aaa061da8a6068d7ff433ea7d1634c2f8be.exe
Resource
win10v2004-20221111-en
General
-
Target
4420fef87deee22a1ebda98c39da4aaa061da8a6068d7ff433ea7d1634c2f8be.exe
-
Size
26KB
-
MD5
170841653a1dce31f784d13319210b50
-
SHA1
ee8b74a035fcba3cd3a2a5cb00f61179f604238d
-
SHA256
4420fef87deee22a1ebda98c39da4aaa061da8a6068d7ff433ea7d1634c2f8be
-
SHA512
f3a7ba7ec7ecc87e9de6969a5fddb1c10558150c3b2d6647b18e6b3e67e2b92b71986f3d27dd135f430b150c357447b6dc3eb94151f0f25051c895e12d04f965
-
SSDEEP
384:5VgGwfec5YzWUIN5JJO7ocuDg+nUHJg0tx0/PUxS20:wbWqYzpITPAKuHJg070Ux
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
winlogon.exepid process 3352 winlogon.exe -
Processes:
resource yara_rule behavioral2/memory/3408-140-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3408-142-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3408-143-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3408-146-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3408-147-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
4420fef87deee22a1ebda98c39da4aaa061da8a6068d7ff433ea7d1634c2f8be.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Control Panel\International\Geo\Nation 4420fef87deee22a1ebda98c39da4aaa061da8a6068d7ff433ea7d1634c2f8be.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Software\Microsoft\Windows\CurrentVersion\Run svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Logon Applicationedc = "C:\\Users\\Admin\\winlogon.exe" svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
winlogon.exedescription pid process target process PID 3352 set thread context of 3408 3352 winlogon.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
4420fef87deee22a1ebda98c39da4aaa061da8a6068d7ff433ea7d1634c2f8be.exewinlogon.exesvchost.exepid process 1152 4420fef87deee22a1ebda98c39da4aaa061da8a6068d7ff433ea7d1634c2f8be.exe 3352 winlogon.exe 3408 svchost.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
4420fef87deee22a1ebda98c39da4aaa061da8a6068d7ff433ea7d1634c2f8be.exewinlogon.exedescription pid process target process PID 1152 wrote to memory of 3352 1152 4420fef87deee22a1ebda98c39da4aaa061da8a6068d7ff433ea7d1634c2f8be.exe winlogon.exe PID 1152 wrote to memory of 3352 1152 4420fef87deee22a1ebda98c39da4aaa061da8a6068d7ff433ea7d1634c2f8be.exe winlogon.exe PID 1152 wrote to memory of 3352 1152 4420fef87deee22a1ebda98c39da4aaa061da8a6068d7ff433ea7d1634c2f8be.exe winlogon.exe PID 3352 wrote to memory of 3408 3352 winlogon.exe svchost.exe PID 3352 wrote to memory of 3408 3352 winlogon.exe svchost.exe PID 3352 wrote to memory of 3408 3352 winlogon.exe svchost.exe PID 3352 wrote to memory of 3408 3352 winlogon.exe svchost.exe PID 3352 wrote to memory of 3408 3352 winlogon.exe svchost.exe PID 3352 wrote to memory of 3408 3352 winlogon.exe svchost.exe PID 3352 wrote to memory of 3408 3352 winlogon.exe svchost.exe PID 3352 wrote to memory of 3408 3352 winlogon.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4420fef87deee22a1ebda98c39da4aaa061da8a6068d7ff433ea7d1634c2f8be.exe"C:\Users\Admin\AppData\Local\Temp\4420fef87deee22a1ebda98c39da4aaa061da8a6068d7ff433ea7d1634c2f8be.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Users\Admin\winlogon.exe"C:\Users\Admin\winlogon.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe3⤵
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:3408
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
26KB
MD5170841653a1dce31f784d13319210b50
SHA1ee8b74a035fcba3cd3a2a5cb00f61179f604238d
SHA2564420fef87deee22a1ebda98c39da4aaa061da8a6068d7ff433ea7d1634c2f8be
SHA512f3a7ba7ec7ecc87e9de6969a5fddb1c10558150c3b2d6647b18e6b3e67e2b92b71986f3d27dd135f430b150c357447b6dc3eb94151f0f25051c895e12d04f965
-
Filesize
26KB
MD5170841653a1dce31f784d13319210b50
SHA1ee8b74a035fcba3cd3a2a5cb00f61179f604238d
SHA2564420fef87deee22a1ebda98c39da4aaa061da8a6068d7ff433ea7d1634c2f8be
SHA512f3a7ba7ec7ecc87e9de6969a5fddb1c10558150c3b2d6647b18e6b3e67e2b92b71986f3d27dd135f430b150c357447b6dc3eb94151f0f25051c895e12d04f965