Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 04:22
Static task
static1
Behavioral task
behavioral1
Sample
8202bf15241572d97e69284a49e93f767b9a4e3353dad0ca8229e96970342ded.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8202bf15241572d97e69284a49e93f767b9a4e3353dad0ca8229e96970342ded.exe
Resource
win10v2004-20220901-en
General
-
Target
8202bf15241572d97e69284a49e93f767b9a4e3353dad0ca8229e96970342ded.exe
-
Size
63KB
-
MD5
f4d951691263d76bba6b791af761487a
-
SHA1
5ba092de55213130d45453ce70569b6d8f67e65e
-
SHA256
8202bf15241572d97e69284a49e93f767b9a4e3353dad0ca8229e96970342ded
-
SHA512
f3d330788086ba96bf65bbc1498bf3cb83cb79f9088fa1ebd6c3a140b7a98192bc7c821c7207fcebb47c7dbdba00a062c84039239ed4a5ae1e37d19db3453e15
-
SSDEEP
1536:8dDFXXwqEcPpa+54aNEIaYnmGN6eyA37VXy:8dDFXXwWhaU4aGxYpN6HALVXy
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
server.exepid process 2164 server.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
8202bf15241572d97e69284a49e93f767b9a4e3353dad0ca8229e96970342ded.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 8202bf15241572d97e69284a49e93f767b9a4e3353dad0ca8229e96970342ded.exe -
Drops startup file 2 IoCs
Processes:
server.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\c89c5661f15916f1fe92e1e20c377061.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\c89c5661f15916f1fe92e1e20c377061.exe server.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
server.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c89c5661f15916f1fe92e1e20c377061 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\server.exe\" .." server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c89c5661f15916f1fe92e1e20c377061 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\server.exe\" .." server.exe -
Drops file in Windows directory 2 IoCs
Processes:
8202bf15241572d97e69284a49e93f767b9a4e3353dad0ca8229e96970342ded.exedescription ioc process File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new 8202bf15241572d97e69284a49e93f767b9a4e3353dad0ca8229e96970342ded.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new 8202bf15241572d97e69284a49e93f767b9a4e3353dad0ca8229e96970342ded.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 33 IoCs
Processes:
server.exedescription pid process Token: SeDebugPrivilege 2164 server.exe Token: 33 2164 server.exe Token: SeIncBasePriorityPrivilege 2164 server.exe Token: 33 2164 server.exe Token: SeIncBasePriorityPrivilege 2164 server.exe Token: 33 2164 server.exe Token: SeIncBasePriorityPrivilege 2164 server.exe Token: 33 2164 server.exe Token: SeIncBasePriorityPrivilege 2164 server.exe Token: 33 2164 server.exe Token: SeIncBasePriorityPrivilege 2164 server.exe Token: 33 2164 server.exe Token: SeIncBasePriorityPrivilege 2164 server.exe Token: 33 2164 server.exe Token: SeIncBasePriorityPrivilege 2164 server.exe Token: 33 2164 server.exe Token: SeIncBasePriorityPrivilege 2164 server.exe Token: 33 2164 server.exe Token: SeIncBasePriorityPrivilege 2164 server.exe Token: 33 2164 server.exe Token: SeIncBasePriorityPrivilege 2164 server.exe Token: 33 2164 server.exe Token: SeIncBasePriorityPrivilege 2164 server.exe Token: 33 2164 server.exe Token: SeIncBasePriorityPrivilege 2164 server.exe Token: 33 2164 server.exe Token: SeIncBasePriorityPrivilege 2164 server.exe Token: 33 2164 server.exe Token: SeIncBasePriorityPrivilege 2164 server.exe Token: 33 2164 server.exe Token: SeIncBasePriorityPrivilege 2164 server.exe Token: 33 2164 server.exe Token: SeIncBasePriorityPrivilege 2164 server.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
8202bf15241572d97e69284a49e93f767b9a4e3353dad0ca8229e96970342ded.exeserver.exedescription pid process target process PID 4848 wrote to memory of 2164 4848 8202bf15241572d97e69284a49e93f767b9a4e3353dad0ca8229e96970342ded.exe server.exe PID 4848 wrote to memory of 2164 4848 8202bf15241572d97e69284a49e93f767b9a4e3353dad0ca8229e96970342ded.exe server.exe PID 2164 wrote to memory of 368 2164 server.exe netsh.exe PID 2164 wrote to memory of 368 2164 server.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8202bf15241572d97e69284a49e93f767b9a4e3353dad0ca8229e96970342ded.exe"C:\Users\Admin\AppData\Local\Temp\8202bf15241572d97e69284a49e93f767b9a4e3353dad0ca8229e96970342ded.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE3⤵
- Modifies Windows Firewall
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\server.exeFilesize
63KB
MD5f4d951691263d76bba6b791af761487a
SHA15ba092de55213130d45453ce70569b6d8f67e65e
SHA2568202bf15241572d97e69284a49e93f767b9a4e3353dad0ca8229e96970342ded
SHA512f3d330788086ba96bf65bbc1498bf3cb83cb79f9088fa1ebd6c3a140b7a98192bc7c821c7207fcebb47c7dbdba00a062c84039239ed4a5ae1e37d19db3453e15
-
C:\Users\Admin\AppData\Local\Temp\server.exeFilesize
63KB
MD5f4d951691263d76bba6b791af761487a
SHA15ba092de55213130d45453ce70569b6d8f67e65e
SHA2568202bf15241572d97e69284a49e93f767b9a4e3353dad0ca8229e96970342ded
SHA512f3d330788086ba96bf65bbc1498bf3cb83cb79f9088fa1ebd6c3a140b7a98192bc7c821c7207fcebb47c7dbdba00a062c84039239ed4a5ae1e37d19db3453e15
-
memory/368-137-0x0000000000000000-mapping.dmp
-
memory/2164-133-0x0000000000000000-mapping.dmp
-
memory/2164-136-0x00007FFB84BE0000-0x00007FFB85616000-memory.dmpFilesize
10.2MB
-
memory/4848-132-0x00007FFB84BE0000-0x00007FFB85616000-memory.dmpFilesize
10.2MB