Analysis
-
max time kernel
186s -
max time network
184s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 13:56
Static task
static1
Behavioral task
behavioral1
Sample
4a1125f52eb460597d912fb581a078013e97c6d9515bcbf2f63a85603662b6c9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4a1125f52eb460597d912fb581a078013e97c6d9515bcbf2f63a85603662b6c9.exe
Resource
win10v2004-20220812-en
General
-
Target
4a1125f52eb460597d912fb581a078013e97c6d9515bcbf2f63a85603662b6c9.exe
-
Size
101KB
-
MD5
d48e3c2058035bc083d90bb7685fe09f
-
SHA1
bd14f31338cacf23586c65d7ce35fe3fe7f5968a
-
SHA256
4a1125f52eb460597d912fb581a078013e97c6d9515bcbf2f63a85603662b6c9
-
SHA512
185fe4121a0c78bc21e3fe57f03b3bfd11d47ab4a86475015633668294bb4eb4a8beb9c89839e2b75433d4f327bcfe94596e89989fee442064a6d3bad783aef8
-
SSDEEP
1536:9QxqcQu0XPmEmEcYUpEjCTfaAIW1EvqTlrxtPpFAXF9N/6Sy:y/03mEcppEjCTfaAIWSqTlrbPLEz4
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
6ty31D.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\twext.exe," 6ty31D.exe -
Executes dropped EXE 2 IoCs
Processes:
6ty31D.exe6ty31D.exepid process 4972 6ty31D.exe 4712 6ty31D.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
4a1125f52eb460597d912fb581a078013e97c6d9515bcbf2f63a85603662b6c9.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 4a1125f52eb460597d912fb581a078013e97c6d9515bcbf2f63a85603662b6c9.exe -
Drops file in System32 directory 2 IoCs
Processes:
6ty31D.exedescription ioc process File opened for modification C:\Windows\SysWOW64\twext.exe 6ty31D.exe File created C:\Windows\SysWOW64\twext.exe 6ty31D.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
6ty31D.exedescription pid process target process PID 4972 set thread context of 4712 4972 6ty31D.exe 6ty31D.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
6ty31D.exepid process 4712 6ty31D.exe 4712 6ty31D.exe 4712 6ty31D.exe 4712 6ty31D.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
6ty31D.exedescription pid process Token: SeDebugPrivilege 4712 6ty31D.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
6ty31D.exepid process 4972 6ty31D.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
4a1125f52eb460597d912fb581a078013e97c6d9515bcbf2f63a85603662b6c9.exe6ty31D.exe6ty31D.exedescription pid process target process PID 2076 wrote to memory of 4972 2076 4a1125f52eb460597d912fb581a078013e97c6d9515bcbf2f63a85603662b6c9.exe 6ty31D.exe PID 2076 wrote to memory of 4972 2076 4a1125f52eb460597d912fb581a078013e97c6d9515bcbf2f63a85603662b6c9.exe 6ty31D.exe PID 2076 wrote to memory of 4972 2076 4a1125f52eb460597d912fb581a078013e97c6d9515bcbf2f63a85603662b6c9.exe 6ty31D.exe PID 4972 wrote to memory of 4712 4972 6ty31D.exe 6ty31D.exe PID 4972 wrote to memory of 4712 4972 6ty31D.exe 6ty31D.exe PID 4972 wrote to memory of 4712 4972 6ty31D.exe 6ty31D.exe PID 4972 wrote to memory of 4712 4972 6ty31D.exe 6ty31D.exe PID 4972 wrote to memory of 4712 4972 6ty31D.exe 6ty31D.exe PID 4972 wrote to memory of 4712 4972 6ty31D.exe 6ty31D.exe PID 4972 wrote to memory of 4712 4972 6ty31D.exe 6ty31D.exe PID 4972 wrote to memory of 4712 4972 6ty31D.exe 6ty31D.exe PID 4972 wrote to memory of 4712 4972 6ty31D.exe 6ty31D.exe PID 4712 wrote to memory of 580 4712 6ty31D.exe winlogon.exe PID 4712 wrote to memory of 580 4712 6ty31D.exe winlogon.exe PID 4712 wrote to memory of 580 4712 6ty31D.exe winlogon.exe PID 4712 wrote to memory of 580 4712 6ty31D.exe winlogon.exe PID 4712 wrote to memory of 580 4712 6ty31D.exe winlogon.exe PID 4712 wrote to memory of 580 4712 6ty31D.exe winlogon.exe PID 4712 wrote to memory of 580 4712 6ty31D.exe winlogon.exe PID 4712 wrote to memory of 580 4712 6ty31D.exe winlogon.exe PID 4712 wrote to memory of 580 4712 6ty31D.exe winlogon.exe PID 4712 wrote to memory of 580 4712 6ty31D.exe winlogon.exe PID 4712 wrote to memory of 580 4712 6ty31D.exe winlogon.exe PID 4712 wrote to memory of 580 4712 6ty31D.exe winlogon.exe PID 4712 wrote to memory of 580 4712 6ty31D.exe winlogon.exe PID 4712 wrote to memory of 580 4712 6ty31D.exe winlogon.exe PID 4712 wrote to memory of 580 4712 6ty31D.exe winlogon.exe PID 4712 wrote to memory of 580 4712 6ty31D.exe winlogon.exe PID 4712 wrote to memory of 580 4712 6ty31D.exe winlogon.exe PID 4712 wrote to memory of 580 4712 6ty31D.exe winlogon.exe PID 4712 wrote to memory of 580 4712 6ty31D.exe winlogon.exe PID 4712 wrote to memory of 580 4712 6ty31D.exe winlogon.exe PID 4712 wrote to memory of 580 4712 6ty31D.exe winlogon.exe PID 4712 wrote to memory of 580 4712 6ty31D.exe winlogon.exe PID 4712 wrote to memory of 580 4712 6ty31D.exe winlogon.exe PID 4712 wrote to memory of 580 4712 6ty31D.exe winlogon.exe PID 4712 wrote to memory of 580 4712 6ty31D.exe winlogon.exe PID 4712 wrote to memory of 580 4712 6ty31D.exe winlogon.exe PID 4712 wrote to memory of 580 4712 6ty31D.exe winlogon.exe PID 4712 wrote to memory of 580 4712 6ty31D.exe winlogon.exe PID 4712 wrote to memory of 580 4712 6ty31D.exe winlogon.exe PID 4712 wrote to memory of 580 4712 6ty31D.exe winlogon.exe PID 4712 wrote to memory of 580 4712 6ty31D.exe winlogon.exe PID 4712 wrote to memory of 580 4712 6ty31D.exe winlogon.exe PID 4712 wrote to memory of 580 4712 6ty31D.exe winlogon.exe PID 4712 wrote to memory of 580 4712 6ty31D.exe winlogon.exe PID 4712 wrote to memory of 580 4712 6ty31D.exe winlogon.exe PID 4712 wrote to memory of 580 4712 6ty31D.exe winlogon.exe PID 4712 wrote to memory of 580 4712 6ty31D.exe winlogon.exe PID 4712 wrote to memory of 580 4712 6ty31D.exe winlogon.exe PID 4712 wrote to memory of 580 4712 6ty31D.exe winlogon.exe PID 4712 wrote to memory of 580 4712 6ty31D.exe winlogon.exe PID 4712 wrote to memory of 580 4712 6ty31D.exe winlogon.exe PID 4712 wrote to memory of 580 4712 6ty31D.exe winlogon.exe PID 4712 wrote to memory of 580 4712 6ty31D.exe winlogon.exe PID 4712 wrote to memory of 580 4712 6ty31D.exe winlogon.exe PID 4712 wrote to memory of 580 4712 6ty31D.exe winlogon.exe PID 4712 wrote to memory of 580 4712 6ty31D.exe winlogon.exe PID 4712 wrote to memory of 580 4712 6ty31D.exe winlogon.exe PID 4712 wrote to memory of 580 4712 6ty31D.exe winlogon.exe PID 4712 wrote to memory of 580 4712 6ty31D.exe winlogon.exe PID 4712 wrote to memory of 580 4712 6ty31D.exe winlogon.exe PID 4712 wrote to memory of 580 4712 6ty31D.exe winlogon.exe PID 4712 wrote to memory of 580 4712 6ty31D.exe winlogon.exe
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:580
-
C:\Users\Admin\AppData\Local\Temp\4a1125f52eb460597d912fb581a078013e97c6d9515bcbf2f63a85603662b6c9.exe"C:\Users\Admin\AppData\Local\Temp\4a1125f52eb460597d912fb581a078013e97c6d9515bcbf2f63a85603662b6c9.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\6ty31D.exe"C:\Users\Admin\AppData\Local\Temp\6ty31D.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Users\Admin\AppData\Local\Temp\6ty31D.exe"C:\Users\Admin\AppData\Local\Temp\6ty31D.exe"3⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4712
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74KB
MD55b1a85d948bd7a075ebd0df2296ae9d5
SHA12b7cab4c68ca6c0fa28b360f9eb4673e7b075a24
SHA2568cfb09392dd6cf7042c9aa9c98fbc9ef5969441d9cbf9d142fd5cbb9d70cd121
SHA51246f05ba3117297faab0a7279d0791fd2e1daebcf9dbcbffaa17c2ee34ac3a68b4b8a40d4d73431a9da7e4a4c293aaf7a9f4bde2d4c93aa4f883c57fb6b2c0575
-
Filesize
74KB
MD55b1a85d948bd7a075ebd0df2296ae9d5
SHA12b7cab4c68ca6c0fa28b360f9eb4673e7b075a24
SHA2568cfb09392dd6cf7042c9aa9c98fbc9ef5969441d9cbf9d142fd5cbb9d70cd121
SHA51246f05ba3117297faab0a7279d0791fd2e1daebcf9dbcbffaa17c2ee34ac3a68b4b8a40d4d73431a9da7e4a4c293aaf7a9f4bde2d4c93aa4f883c57fb6b2c0575
-
Filesize
74KB
MD55b1a85d948bd7a075ebd0df2296ae9d5
SHA12b7cab4c68ca6c0fa28b360f9eb4673e7b075a24
SHA2568cfb09392dd6cf7042c9aa9c98fbc9ef5969441d9cbf9d142fd5cbb9d70cd121
SHA51246f05ba3117297faab0a7279d0791fd2e1daebcf9dbcbffaa17c2ee34ac3a68b4b8a40d4d73431a9da7e4a4c293aaf7a9f4bde2d4c93aa4f883c57fb6b2c0575