Analysis
-
max time kernel
82s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 07:45
Static task
static1
Behavioral task
behavioral1
Sample
312dc64ddf1f9b7dd57dd1f7c9bb68e47f094d5babe1edea60f0ecebf1af1159.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
312dc64ddf1f9b7dd57dd1f7c9bb68e47f094d5babe1edea60f0ecebf1af1159.exe
Resource
win10v2004-20220901-en
General
-
Target
312dc64ddf1f9b7dd57dd1f7c9bb68e47f094d5babe1edea60f0ecebf1af1159.exe
-
Size
276KB
-
MD5
1472d2c071f3910d0903031bfa2caa6f
-
SHA1
aec323f98975dd67ea19abe7bb326b68383f7a53
-
SHA256
312dc64ddf1f9b7dd57dd1f7c9bb68e47f094d5babe1edea60f0ecebf1af1159
-
SHA512
98983a99e28d02816a4b37260752ef45a745af9b582a8b8e84d7921f22e7d51630a8bb4212ff642f39b6295d878c5122237d1507e2c5561299033380351f96c2
-
SSDEEP
3072:F2bJpL5h2uohvgCGjNfz6MP8jkxpYu0LITAvjgFSirJsTV8Y67ETzR4Wigb5jAbR:FeL5h5WfGhfuMEPpITS8tJOWETCWigb
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
java.exepid process 4648 java.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
312dc64ddf1f9b7dd57dd1f7c9bb68e47f094d5babe1edea60f0ecebf1af1159.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 312dc64ddf1f9b7dd57dd1f7c9bb68e47f094d5babe1edea60f0ecebf1af1159.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
312dc64ddf1f9b7dd57dd1f7c9bb68e47f094d5babe1edea60f0ecebf1af1159.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fdsds45454fsd4f4d = "C:\\Users\\Admin\\AppData\\Roaming\\Program Files\\java.exe" 312dc64ddf1f9b7dd57dd1f7c9bb68e47f094d5babe1edea60f0ecebf1af1159.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
312dc64ddf1f9b7dd57dd1f7c9bb68e47f094d5babe1edea60f0ecebf1af1159.exejava.exepid process 4564 312dc64ddf1f9b7dd57dd1f7c9bb68e47f094d5babe1edea60f0ecebf1af1159.exe 4648 java.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
312dc64ddf1f9b7dd57dd1f7c9bb68e47f094d5babe1edea60f0ecebf1af1159.exejava.exedescription pid process target process PID 4564 wrote to memory of 4648 4564 312dc64ddf1f9b7dd57dd1f7c9bb68e47f094d5babe1edea60f0ecebf1af1159.exe java.exe PID 4564 wrote to memory of 4648 4564 312dc64ddf1f9b7dd57dd1f7c9bb68e47f094d5babe1edea60f0ecebf1af1159.exe java.exe PID 4564 wrote to memory of 4648 4564 312dc64ddf1f9b7dd57dd1f7c9bb68e47f094d5babe1edea60f0ecebf1af1159.exe java.exe PID 4648 wrote to memory of 4656 4648 java.exe iexplore.exe PID 4648 wrote to memory of 4656 4648 java.exe iexplore.exe PID 4648 wrote to memory of 4656 4648 java.exe iexplore.exe PID 4648 wrote to memory of 4656 4648 java.exe iexplore.exe PID 4648 wrote to memory of 4656 4648 java.exe iexplore.exe PID 4648 wrote to memory of 4656 4648 java.exe iexplore.exe PID 4648 wrote to memory of 4656 4648 java.exe iexplore.exe PID 4648 wrote to memory of 448 4648 java.exe iexplore.exe PID 4648 wrote to memory of 448 4648 java.exe iexplore.exe PID 4648 wrote to memory of 448 4648 java.exe iexplore.exe PID 4648 wrote to memory of 448 4648 java.exe iexplore.exe PID 4648 wrote to memory of 448 4648 java.exe iexplore.exe PID 4648 wrote to memory of 448 4648 java.exe iexplore.exe PID 4648 wrote to memory of 448 4648 java.exe iexplore.exe PID 4648 wrote to memory of 4392 4648 java.exe iexplore.exe PID 4648 wrote to memory of 4392 4648 java.exe iexplore.exe PID 4648 wrote to memory of 4392 4648 java.exe iexplore.exe PID 4648 wrote to memory of 4392 4648 java.exe iexplore.exe PID 4648 wrote to memory of 4392 4648 java.exe iexplore.exe PID 4648 wrote to memory of 4392 4648 java.exe iexplore.exe PID 4648 wrote to memory of 4392 4648 java.exe iexplore.exe PID 4648 wrote to memory of 4088 4648 java.exe iexplore.exe PID 4648 wrote to memory of 4088 4648 java.exe iexplore.exe PID 4648 wrote to memory of 4088 4648 java.exe iexplore.exe PID 4648 wrote to memory of 4088 4648 java.exe iexplore.exe PID 4648 wrote to memory of 4088 4648 java.exe iexplore.exe PID 4648 wrote to memory of 4088 4648 java.exe iexplore.exe PID 4648 wrote to memory of 4088 4648 java.exe iexplore.exe PID 4648 wrote to memory of 4172 4648 java.exe iexplore.exe PID 4648 wrote to memory of 4172 4648 java.exe iexplore.exe PID 4648 wrote to memory of 4172 4648 java.exe iexplore.exe PID 4648 wrote to memory of 4172 4648 java.exe iexplore.exe PID 4648 wrote to memory of 4172 4648 java.exe iexplore.exe PID 4648 wrote to memory of 4172 4648 java.exe iexplore.exe PID 4648 wrote to memory of 4172 4648 java.exe iexplore.exe PID 4648 wrote to memory of 2700 4648 java.exe iexplore.exe PID 4648 wrote to memory of 2700 4648 java.exe iexplore.exe PID 4648 wrote to memory of 2700 4648 java.exe iexplore.exe PID 4648 wrote to memory of 2700 4648 java.exe iexplore.exe PID 4648 wrote to memory of 2700 4648 java.exe iexplore.exe PID 4648 wrote to memory of 2700 4648 java.exe iexplore.exe PID 4648 wrote to memory of 2700 4648 java.exe iexplore.exe PID 4648 wrote to memory of 2632 4648 java.exe iexplore.exe PID 4648 wrote to memory of 2632 4648 java.exe iexplore.exe PID 4648 wrote to memory of 2632 4648 java.exe iexplore.exe PID 4648 wrote to memory of 2632 4648 java.exe iexplore.exe PID 4648 wrote to memory of 2632 4648 java.exe iexplore.exe PID 4648 wrote to memory of 2632 4648 java.exe iexplore.exe PID 4648 wrote to memory of 2632 4648 java.exe iexplore.exe PID 4648 wrote to memory of 4112 4648 java.exe iexplore.exe PID 4648 wrote to memory of 4112 4648 java.exe iexplore.exe PID 4648 wrote to memory of 4112 4648 java.exe iexplore.exe PID 4648 wrote to memory of 4112 4648 java.exe iexplore.exe PID 4648 wrote to memory of 4112 4648 java.exe iexplore.exe PID 4648 wrote to memory of 4112 4648 java.exe iexplore.exe PID 4648 wrote to memory of 4112 4648 java.exe iexplore.exe PID 4648 wrote to memory of 432 4648 java.exe iexplore.exe PID 4648 wrote to memory of 432 4648 java.exe iexplore.exe PID 4648 wrote to memory of 432 4648 java.exe iexplore.exe PID 4648 wrote to memory of 432 4648 java.exe iexplore.exe PID 4648 wrote to memory of 432 4648 java.exe iexplore.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\312dc64ddf1f9b7dd57dd1f7c9bb68e47f094d5babe1edea60f0ecebf1af1159.exe"C:\Users\Admin\AppData\Local\Temp\312dc64ddf1f9b7dd57dd1f7c9bb68e47f094d5babe1edea60f0ecebf1af1159.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Users\Admin\AppData\Roaming\Program Files\java.exe"C:\Users\Admin\AppData\Roaming\Program Files\java.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\Program Files\java.exe"3⤵PID:4656
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\Program Files\java.exe"3⤵PID:4392
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\Program Files\java.exe"3⤵PID:448
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\Program Files\java.exe"3⤵PID:4088
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\Program Files\java.exe"3⤵PID:4172
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\Program Files\java.exe"3⤵PID:2700
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\Program Files\java.exe"3⤵PID:2632
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\Program Files\java.exe"3⤵PID:4112
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\Program Files\java.exe"3⤵PID:432
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\Program Files\java.exe"3⤵PID:832
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\Program Files\java.exe"3⤵PID:4360
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\Program Files\java.exe"3⤵PID:3976
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\Program Files\java.exe"3⤵PID:1500
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\Program Files\java.exe"3⤵PID:1288
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\Program Files\java.exe"3⤵PID:4812
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\Program Files\java.exe"3⤵PID:3452
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\Program Files\java.exe"3⤵PID:4460
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\Program Files\java.exe"3⤵PID:4688
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\Program Files\java.exe"3⤵PID:4840
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\Program Files\java.exe"3⤵PID:1356
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\Program Files\java.exe"3⤵PID:4976
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\Program Files\java.exe"3⤵PID:3704
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\Program Files\java.exe"3⤵PID:1016
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\Program Files\java.exe"3⤵PID:944
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\Program Files\java.exe"3⤵PID:1652
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\Program Files\java.exe"3⤵PID:1152
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\Program Files\java.exe"3⤵PID:4928
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\Program Files\java.exe"3⤵PID:3908
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\Program Files\java.exe"3⤵PID:3500
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\Program Files\java.exe"3⤵PID:3788
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\Program Files\java.exe"3⤵PID:3928
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\Program Files\java.exe"3⤵PID:3280
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\Program Files\java.exe"3⤵PID:1360
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\Program Files\java.exe"3⤵PID:4420
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\Program Files\java.exe"3⤵PID:1420
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\Program Files\java.exe"3⤵PID:1116
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\Program Files\java.exe"3⤵PID:3888
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\Program Files\java.exe"3⤵PID:4052
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\Program Files\java.exe"3⤵PID:4176
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\Program Files\java.exe"3⤵PID:4516
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\Program Files\java.exe"3⤵PID:1720
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\Program Files\java.exe"3⤵PID:2860
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\Program Files\java.exe"3⤵PID:4024
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\Program Files\java.exe"3⤵PID:376
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\Program Files\java.exe"3⤵PID:3940
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\Program Files\java.exe"3⤵PID:3896
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\Program Files\java.exe"3⤵PID:3488
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\Program Files\java.exe"3⤵PID:2548
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\Program Files\java.exe"3⤵PID:4756
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\Program Files\java.exe"3⤵PID:2716
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\Program Files\java.exe"3⤵PID:1188
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\Program Files\java.exe"3⤵PID:4632
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\Program Files\java.exe"3⤵PID:4608
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\Program Files\java.exe"3⤵PID:3316
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\Program Files\java.exe"3⤵PID:4404
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\Program Files\java.exe"3⤵PID:4596
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\Program Files\java.exe"3⤵PID:4304
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\Program Files\java.exe"3⤵PID:4108
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\Program Files\java.exe"3⤵PID:4804
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Users\Admin\AppData\Roaming\Program Files\java.exe"3⤵PID:3736
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
276KB
MD5bd503014e0f29cdf385cd7f60357d787
SHA10100e54c3f06018721168bbe467387f19be7cb95
SHA256f623f83097fb6251d34521cee1a7335f617327747d912b481bd00ec69cbc37dc
SHA512b282ae3548d4b40bc14e48cf15405eec86130d1d0377d2d64d78db131eff1b89026c725a9dbb33ddeb582fd7a40f7979d07d3994a9638134dcafbe2e2e0b6dcb
-
Filesize
276KB
MD5bd503014e0f29cdf385cd7f60357d787
SHA10100e54c3f06018721168bbe467387f19be7cb95
SHA256f623f83097fb6251d34521cee1a7335f617327747d912b481bd00ec69cbc37dc
SHA512b282ae3548d4b40bc14e48cf15405eec86130d1d0377d2d64d78db131eff1b89026c725a9dbb33ddeb582fd7a40f7979d07d3994a9638134dcafbe2e2e0b6dcb