Analysis
-
max time kernel
153s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 13:00
Static task
static1
Behavioral task
behavioral1
Sample
e0d2d9f20f52439359260206fac381a4475cf311d1a7f688531198a90d1db4f9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e0d2d9f20f52439359260206fac381a4475cf311d1a7f688531198a90d1db4f9.exe
Resource
win10v2004-20220901-en
General
-
Target
e0d2d9f20f52439359260206fac381a4475cf311d1a7f688531198a90d1db4f9.exe
-
Size
68KB
-
MD5
95f09326345b552a5d2430ff0fb8d88a
-
SHA1
23726288e522ce67060c2a941e7cc4fc789cd969
-
SHA256
e0d2d9f20f52439359260206fac381a4475cf311d1a7f688531198a90d1db4f9
-
SHA512
44ec9938ee00675b5d57cc76430e304593d00387cdcd1f25f77890df64924511f90262fc91c79daeb6d049a1e6e7e4f4d970f13d6921edd5f12bf6374ecc279d
-
SSDEEP
768:PcrliTduMAl+qOQSgFrhKo//WomvdfQXwYt1IEDIefZsK:krIxzAcqOK3qowgnt1d
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
e0d2d9f20f52439359260206fac381a4475cf311d1a7f688531198a90d1db4f9.exeAdmin.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" e0d2d9f20f52439359260206fac381a4475cf311d1a7f688531198a90d1db4f9.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Admin.exe -
Executes dropped EXE 1 IoCs
Processes:
Admin.exepid process 3168 Admin.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
e0d2d9f20f52439359260206fac381a4475cf311d1a7f688531198a90d1db4f9.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation e0d2d9f20f52439359260206fac381a4475cf311d1a7f688531198a90d1db4f9.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
Admin.exee0d2d9f20f52439359260206fac381a4475cf311d1a7f688531198a90d1db4f9.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Admin = "C:\\Users\\Admin\\Admin.exe" Admin.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run e0d2d9f20f52439359260206fac381a4475cf311d1a7f688531198a90d1db4f9.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Admin = "C:\\Users\\Admin\\Admin.exe" e0d2d9f20f52439359260206fac381a4475cf311d1a7f688531198a90d1db4f9.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Admin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
e0d2d9f20f52439359260206fac381a4475cf311d1a7f688531198a90d1db4f9.exeAdmin.exepid process 4708 e0d2d9f20f52439359260206fac381a4475cf311d1a7f688531198a90d1db4f9.exe 4708 e0d2d9f20f52439359260206fac381a4475cf311d1a7f688531198a90d1db4f9.exe 4708 e0d2d9f20f52439359260206fac381a4475cf311d1a7f688531198a90d1db4f9.exe 4708 e0d2d9f20f52439359260206fac381a4475cf311d1a7f688531198a90d1db4f9.exe 4708 e0d2d9f20f52439359260206fac381a4475cf311d1a7f688531198a90d1db4f9.exe 4708 e0d2d9f20f52439359260206fac381a4475cf311d1a7f688531198a90d1db4f9.exe 4708 e0d2d9f20f52439359260206fac381a4475cf311d1a7f688531198a90d1db4f9.exe 4708 e0d2d9f20f52439359260206fac381a4475cf311d1a7f688531198a90d1db4f9.exe 3168 Admin.exe 3168 Admin.exe 4708 e0d2d9f20f52439359260206fac381a4475cf311d1a7f688531198a90d1db4f9.exe 4708 e0d2d9f20f52439359260206fac381a4475cf311d1a7f688531198a90d1db4f9.exe 3168 Admin.exe 3168 Admin.exe 4708 e0d2d9f20f52439359260206fac381a4475cf311d1a7f688531198a90d1db4f9.exe 4708 e0d2d9f20f52439359260206fac381a4475cf311d1a7f688531198a90d1db4f9.exe 3168 Admin.exe 3168 Admin.exe 4708 e0d2d9f20f52439359260206fac381a4475cf311d1a7f688531198a90d1db4f9.exe 4708 e0d2d9f20f52439359260206fac381a4475cf311d1a7f688531198a90d1db4f9.exe 3168 Admin.exe 3168 Admin.exe 4708 e0d2d9f20f52439359260206fac381a4475cf311d1a7f688531198a90d1db4f9.exe 4708 e0d2d9f20f52439359260206fac381a4475cf311d1a7f688531198a90d1db4f9.exe 3168 Admin.exe 3168 Admin.exe 4708 e0d2d9f20f52439359260206fac381a4475cf311d1a7f688531198a90d1db4f9.exe 4708 e0d2d9f20f52439359260206fac381a4475cf311d1a7f688531198a90d1db4f9.exe 3168 Admin.exe 3168 Admin.exe 4708 e0d2d9f20f52439359260206fac381a4475cf311d1a7f688531198a90d1db4f9.exe 4708 e0d2d9f20f52439359260206fac381a4475cf311d1a7f688531198a90d1db4f9.exe 3168 Admin.exe 3168 Admin.exe 4708 e0d2d9f20f52439359260206fac381a4475cf311d1a7f688531198a90d1db4f9.exe 4708 e0d2d9f20f52439359260206fac381a4475cf311d1a7f688531198a90d1db4f9.exe 3168 Admin.exe 3168 Admin.exe 4708 e0d2d9f20f52439359260206fac381a4475cf311d1a7f688531198a90d1db4f9.exe 4708 e0d2d9f20f52439359260206fac381a4475cf311d1a7f688531198a90d1db4f9.exe 3168 Admin.exe 3168 Admin.exe 4708 e0d2d9f20f52439359260206fac381a4475cf311d1a7f688531198a90d1db4f9.exe 4708 e0d2d9f20f52439359260206fac381a4475cf311d1a7f688531198a90d1db4f9.exe 3168 Admin.exe 3168 Admin.exe 4708 e0d2d9f20f52439359260206fac381a4475cf311d1a7f688531198a90d1db4f9.exe 4708 e0d2d9f20f52439359260206fac381a4475cf311d1a7f688531198a90d1db4f9.exe 3168 Admin.exe 3168 Admin.exe 4708 e0d2d9f20f52439359260206fac381a4475cf311d1a7f688531198a90d1db4f9.exe 4708 e0d2d9f20f52439359260206fac381a4475cf311d1a7f688531198a90d1db4f9.exe 3168 Admin.exe 3168 Admin.exe 4708 e0d2d9f20f52439359260206fac381a4475cf311d1a7f688531198a90d1db4f9.exe 4708 e0d2d9f20f52439359260206fac381a4475cf311d1a7f688531198a90d1db4f9.exe 3168 Admin.exe 3168 Admin.exe 4708 e0d2d9f20f52439359260206fac381a4475cf311d1a7f688531198a90d1db4f9.exe 4708 e0d2d9f20f52439359260206fac381a4475cf311d1a7f688531198a90d1db4f9.exe 3168 Admin.exe 3168 Admin.exe 4708 e0d2d9f20f52439359260206fac381a4475cf311d1a7f688531198a90d1db4f9.exe 4708 e0d2d9f20f52439359260206fac381a4475cf311d1a7f688531198a90d1db4f9.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
e0d2d9f20f52439359260206fac381a4475cf311d1a7f688531198a90d1db4f9.exeAdmin.exepid process 4708 e0d2d9f20f52439359260206fac381a4475cf311d1a7f688531198a90d1db4f9.exe 3168 Admin.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
e0d2d9f20f52439359260206fac381a4475cf311d1a7f688531198a90d1db4f9.exedescription pid process target process PID 4708 wrote to memory of 3168 4708 e0d2d9f20f52439359260206fac381a4475cf311d1a7f688531198a90d1db4f9.exe Admin.exe PID 4708 wrote to memory of 3168 4708 e0d2d9f20f52439359260206fac381a4475cf311d1a7f688531198a90d1db4f9.exe Admin.exe PID 4708 wrote to memory of 3168 4708 e0d2d9f20f52439359260206fac381a4475cf311d1a7f688531198a90d1db4f9.exe Admin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0d2d9f20f52439359260206fac381a4475cf311d1a7f688531198a90d1db4f9.exe"C:\Users\Admin\AppData\Local\Temp\e0d2d9f20f52439359260206fac381a4475cf311d1a7f688531198a90d1db4f9.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Users\Admin\Admin.exe"C:\Users\Admin\Admin.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3168
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD5fff4c7b8dda7c9f64ef01580a8402b07
SHA1cb9e9b2477555ee830873fc7efefae87e0a19ec5
SHA25625209dbab0421a5efca52c590f62b65b712f5a17f8cec4c65a45e657a8d03763
SHA51227e708b523bc9da4a0e46eb935b9f401979801082dc14e52b70484cab697aee1edf9f59986e9c2a776c82c33ec353ef3e63320633d9719b5eb989b7f12ee03c9
-
Filesize
68KB
MD5fff4c7b8dda7c9f64ef01580a8402b07
SHA1cb9e9b2477555ee830873fc7efefae87e0a19ec5
SHA25625209dbab0421a5efca52c590f62b65b712f5a17f8cec4c65a45e657a8d03763
SHA51227e708b523bc9da4a0e46eb935b9f401979801082dc14e52b70484cab697aee1edf9f59986e9c2a776c82c33ec353ef3e63320633d9719b5eb989b7f12ee03c9