Analysis
-
max time kernel
155s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 00:50
Static task
static1
Behavioral task
behavioral1
Sample
5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe
Resource
win10v2004-20220812-en
General
-
Target
5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe
-
Size
333KB
-
MD5
42d46eff5421cbd0fee0bd839aea5c44
-
SHA1
beb999551d81a971a0adc7916e7c92ff0b95017a
-
SHA256
5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65
-
SHA512
74d9ce33a59f7ea1cd3d9fc45f11662758486f933656194289bfd2fa7adac14c5b7114ccd20d0fd8b747aba973b73a262cdaa75161bf4a124a07b4db99425803
-
SSDEEP
6144:K/hwKwOwi0jxGt/YYu0VQcc/qDOFMCVYFSTk4VdiUgvTGndEki1n:K/hvwLi0jxWYkQSz7oddnd01n
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 216 5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe 644 5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ApVmBRwQAE = "C:\\Users\\Admin\\AppData\\Roaming\\z7f9orJ8\\LFCuQMe.exe.lnk" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\90WUE80JFSD08JSDFS = "\\90WUE80JFSD08JSDFS\\loadem.exe" 5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\90WUE80JFSD08JSDFS = "C:\\Users\\Admin\\AppData\\Roaming\\90WUE80JFSD08JSDFS\\loadem.exe" 5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini 5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe File opened for modification C:\Windows\assembly\Desktop.ini 5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4088 set thread context of 2172 4088 5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe 85 PID 216 set thread context of 644 216 5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe 89 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly 5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe File created C:\Windows\assembly\Desktop.ini 5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe File opened for modification C:\Windows\assembly\Desktop.ini 5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3096 PING.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4088 5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe 4088 5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe 216 5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe 216 5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 644 5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4088 5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe Token: SeDebugPrivilege 2172 5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe Token: SeDebugPrivilege 216 5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe Token: SeDebugPrivilege 644 5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe Token: SeDebugPrivilege 644 5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 644 5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 4088 wrote to memory of 3112 4088 5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe 82 PID 4088 wrote to memory of 3112 4088 5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe 82 PID 4088 wrote to memory of 3112 4088 5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe 82 PID 3112 wrote to memory of 812 3112 cmd.exe 84 PID 3112 wrote to memory of 812 3112 cmd.exe 84 PID 3112 wrote to memory of 812 3112 cmd.exe 84 PID 4088 wrote to memory of 2172 4088 5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe 85 PID 4088 wrote to memory of 2172 4088 5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe 85 PID 4088 wrote to memory of 2172 4088 5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe 85 PID 4088 wrote to memory of 2172 4088 5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe 85 PID 4088 wrote to memory of 2172 4088 5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe 85 PID 4088 wrote to memory of 2172 4088 5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe 85 PID 4088 wrote to memory of 2172 4088 5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe 85 PID 4088 wrote to memory of 2172 4088 5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe 85 PID 2172 wrote to memory of 216 2172 5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe 86 PID 2172 wrote to memory of 216 2172 5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe 86 PID 2172 wrote to memory of 216 2172 5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe 86 PID 2172 wrote to memory of 700 2172 5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe 87 PID 2172 wrote to memory of 700 2172 5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe 87 PID 2172 wrote to memory of 700 2172 5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe 87 PID 216 wrote to memory of 644 216 5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe 89 PID 216 wrote to memory of 644 216 5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe 89 PID 216 wrote to memory of 644 216 5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe 89 PID 216 wrote to memory of 644 216 5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe 89 PID 216 wrote to memory of 644 216 5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe 89 PID 216 wrote to memory of 644 216 5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe 89 PID 216 wrote to memory of 644 216 5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe 89 PID 216 wrote to memory of 644 216 5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe 89 PID 700 wrote to memory of 3096 700 cmd.exe 90 PID 700 wrote to memory of 3096 700 cmd.exe 90 PID 700 wrote to memory of 3096 700 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe"C:\Users\Admin\AppData\Local\Temp\5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "ApVmBRwQAE" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\z7f9orJ8\LFCuQMe.exe.lnk"2⤵
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "ApVmBRwQAE" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\z7f9orJ8\LFCuQMe.exe.lnk"3⤵
- Adds Run key to start application
PID:812
-
-
-
C:\Users\Admin\AppData\Local\Temp\5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe"C:\Users\Admin\AppData\Local\Temp\5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe"2⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65\5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe"C:\Users\Admin\AppData\Local\Temp\5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65\5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Users\Admin\AppData\Local\Temp\5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65\5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe"C:\Users\Admin\AppData\Local\Temp\5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65\5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:644
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 10004⤵
- Runs ping.exe
PID:3096
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe.log
Filesize319B
MD5da4fafeffe21b7cb3a8c170ca7911976
SHA150ef77e2451ab60f93f4db88325b897d215be5ad
SHA2567341a4a13e81cbb5b7f39ec47bb45f84836b08b8d8e3ea231d2c7dad982094f7
SHA5120bc24b69460f31a0ebc0628b99908d818ee85feb7e4b663271d9375b30cced0cd55a0bbf8edff1281a4c886ddf4476ffc989c283069cdcb1235ffcb265580fc6
-
C:\Users\Admin\AppData\Local\Temp\5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65\5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe
Filesize333KB
MD542d46eff5421cbd0fee0bd839aea5c44
SHA1beb999551d81a971a0adc7916e7c92ff0b95017a
SHA2565fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65
SHA51274d9ce33a59f7ea1cd3d9fc45f11662758486f933656194289bfd2fa7adac14c5b7114ccd20d0fd8b747aba973b73a262cdaa75161bf4a124a07b4db99425803
-
C:\Users\Admin\AppData\Local\Temp\5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65\5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe
Filesize333KB
MD542d46eff5421cbd0fee0bd839aea5c44
SHA1beb999551d81a971a0adc7916e7c92ff0b95017a
SHA2565fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65
SHA51274d9ce33a59f7ea1cd3d9fc45f11662758486f933656194289bfd2fa7adac14c5b7114ccd20d0fd8b747aba973b73a262cdaa75161bf4a124a07b4db99425803
-
C:\Users\Admin\AppData\Local\Temp\5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65\5fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65.exe
Filesize333KB
MD542d46eff5421cbd0fee0bd839aea5c44
SHA1beb999551d81a971a0adc7916e7c92ff0b95017a
SHA2565fe54b81f3b2bcd7eb24e6307f51aceb99f531b1cab87e5705db3336ab80ba65
SHA51274d9ce33a59f7ea1cd3d9fc45f11662758486f933656194289bfd2fa7adac14c5b7114ccd20d0fd8b747aba973b73a262cdaa75161bf4a124a07b4db99425803