Analysis
-
max time kernel
153s -
max time network
187s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 13:26
Static task
static1
Behavioral task
behavioral1
Sample
1239b8f51a235237132abf7dd82dc13284b56913debed7140e2cb4f80cd75aee.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1239b8f51a235237132abf7dd82dc13284b56913debed7140e2cb4f80cd75aee.exe
Resource
win10v2004-20220812-en
General
-
Target
1239b8f51a235237132abf7dd82dc13284b56913debed7140e2cb4f80cd75aee.exe
-
Size
1.1MB
-
MD5
02daff1e68eb29b7f4bbf6cf8254478a
-
SHA1
5a61f408b0e6a04f30735f7aa62f023781d6a6aa
-
SHA256
1239b8f51a235237132abf7dd82dc13284b56913debed7140e2cb4f80cd75aee
-
SHA512
87c61689accd3e114d99755a55cbac2755ca820ec775626edfb164bebfc69ef07e21fe44268696bece6f612e7c30ffc411f2d620dfcc95b2e82e61a1556d5cbb
-
SSDEEP
24576:m4lavt0LkLL9IMixoEgeahTPUQO7LbWp/Mq9MmCS:xkwkn9IMHeaxPOTWpkaPCS
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
movie.exepid process 2440 movie.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
1239b8f51a235237132abf7dd82dc13284b56913debed7140e2cb4f80cd75aee.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 1239b8f51a235237132abf7dd82dc13284b56913debed7140e2cb4f80cd75aee.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
movie.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run movie.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Roaming\\movie.exe" movie.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\movie.exe autoit_exe C:\Users\Admin\AppData\Roaming\movie.exe autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NTFS ADS 1 IoCs
Processes:
movie.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\movie.exe:Zone.Identifier:$DATA movie.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
movie.exepid process 2440 movie.exe 2440 movie.exe 2440 movie.exe 2440 movie.exe 2440 movie.exe 2440 movie.exe 2440 movie.exe 2440 movie.exe 2440 movie.exe 2440 movie.exe 2440 movie.exe 2440 movie.exe 2440 movie.exe 2440 movie.exe 2440 movie.exe 2440 movie.exe 2440 movie.exe 2440 movie.exe 2440 movie.exe 2440 movie.exe 2440 movie.exe 2440 movie.exe 2440 movie.exe 2440 movie.exe 2440 movie.exe 2440 movie.exe 2440 movie.exe 2440 movie.exe 2440 movie.exe 2440 movie.exe 2440 movie.exe 2440 movie.exe 2440 movie.exe 2440 movie.exe 2440 movie.exe 2440 movie.exe 2440 movie.exe 2440 movie.exe 2440 movie.exe 2440 movie.exe 2440 movie.exe 2440 movie.exe 2440 movie.exe 2440 movie.exe 2440 movie.exe 2440 movie.exe 2440 movie.exe 2440 movie.exe 2440 movie.exe 2440 movie.exe 2440 movie.exe 2440 movie.exe 2440 movie.exe 2440 movie.exe 2440 movie.exe 2440 movie.exe 2440 movie.exe 2440 movie.exe 2440 movie.exe 2440 movie.exe 2440 movie.exe 2440 movie.exe 2440 movie.exe 2440 movie.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
1239b8f51a235237132abf7dd82dc13284b56913debed7140e2cb4f80cd75aee.execmd.exedescription pid process target process PID 4768 wrote to memory of 2440 4768 1239b8f51a235237132abf7dd82dc13284b56913debed7140e2cb4f80cd75aee.exe movie.exe PID 4768 wrote to memory of 2440 4768 1239b8f51a235237132abf7dd82dc13284b56913debed7140e2cb4f80cd75aee.exe movie.exe PID 4768 wrote to memory of 2440 4768 1239b8f51a235237132abf7dd82dc13284b56913debed7140e2cb4f80cd75aee.exe movie.exe PID 4768 wrote to memory of 3988 4768 1239b8f51a235237132abf7dd82dc13284b56913debed7140e2cb4f80cd75aee.exe cmd.exe PID 4768 wrote to memory of 3988 4768 1239b8f51a235237132abf7dd82dc13284b56913debed7140e2cb4f80cd75aee.exe cmd.exe PID 4768 wrote to memory of 3988 4768 1239b8f51a235237132abf7dd82dc13284b56913debed7140e2cb4f80cd75aee.exe cmd.exe PID 3988 wrote to memory of 3340 3988 cmd.exe PING.EXE PID 3988 wrote to memory of 3340 3988 cmd.exe PING.EXE PID 3988 wrote to memory of 3340 3988 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\1239b8f51a235237132abf7dd82dc13284b56913debed7140e2cb4f80cd75aee.exe"C:\Users\Admin\AppData\Local\Temp\1239b8f51a235237132abf7dd82dc13284b56913debed7140e2cb4f80cd75aee.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Users\Admin\AppData\Roaming\movie.exe"C:\Users\Admin\AppData\Roaming\movie.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:2440 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\scratch.bat2⤵
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Windows\SysWOW64\PING.EXEping -n 0127.0.0.13⤵
- Runs ping.exe
PID:3340
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
317B
MD5290e6421f725ebe199c949e3760586f7
SHA12dc22f43ebd7d35b41198b8553d03645bc4f5c94
SHA2565aeb23fa1135cd110438674f3c666436a2e9055e4b3d2b23bbf7ed7acf5c2408
SHA51228431a28ce0f16a8135ecec8bcaa51951c605516b389aa5eddd8237c20b79faf40fc388ddbf7083f076ea758616ce41177ea1ba86a5969a8c9e32e40b699b455
-
Filesize
1.1MB
MD502daff1e68eb29b7f4bbf6cf8254478a
SHA15a61f408b0e6a04f30735f7aa62f023781d6a6aa
SHA2561239b8f51a235237132abf7dd82dc13284b56913debed7140e2cb4f80cd75aee
SHA51287c61689accd3e114d99755a55cbac2755ca820ec775626edfb164bebfc69ef07e21fe44268696bece6f612e7c30ffc411f2d620dfcc95b2e82e61a1556d5cbb
-
Filesize
1.1MB
MD502daff1e68eb29b7f4bbf6cf8254478a
SHA15a61f408b0e6a04f30735f7aa62f023781d6a6aa
SHA2561239b8f51a235237132abf7dd82dc13284b56913debed7140e2cb4f80cd75aee
SHA51287c61689accd3e114d99755a55cbac2755ca820ec775626edfb164bebfc69ef07e21fe44268696bece6f612e7c30ffc411f2d620dfcc95b2e82e61a1556d5cbb