Analysis
-
max time kernel
145s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 03:04
Static task
static1
Behavioral task
behavioral1
Sample
32a8606658fdaad1bf63ad2ec4fca8c1acb23bb424e6516b98acd98af043d85f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
32a8606658fdaad1bf63ad2ec4fca8c1acb23bb424e6516b98acd98af043d85f.exe
Resource
win10v2004-20221111-en
General
-
Target
32a8606658fdaad1bf63ad2ec4fca8c1acb23bb424e6516b98acd98af043d85f.exe
-
Size
521KB
-
MD5
a1b89dc6328584521be91c0ce72d3d87
-
SHA1
aab7aea67283b50c69e00c15db7ef922680b3d50
-
SHA256
32a8606658fdaad1bf63ad2ec4fca8c1acb23bb424e6516b98acd98af043d85f
-
SHA512
4a60116f47032a15edde0fa3ea61a909c336a825c703b87de8249602302b54809d2cccf0806e407ec6646289d088432530203de9cbea16c76b618385b023ad56
-
SSDEEP
6144:zuRqBr74bS/QTjhUqBfxrwEnuNcSsm7IoYGW0VvBXCAt6kihwE+VDpJYWmlwnx9N:974QtqB5urTIoYWBQk1E+VF9mOx9Mi
Malware Config
Signatures
-
NirSoft MailPassView 2 IoCs
Password recovery tool for various email clients
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Windows Update.exe MailPassView C:\Users\Admin\AppData\Roaming\Windows Update.exe MailPassView -
NirSoft WebBrowserPassView 2 IoCs
Password recovery tool for various web browsers
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Windows Update.exe WebBrowserPassView C:\Users\Admin\AppData\Roaming\Windows Update.exe WebBrowserPassView -
Nirsoft 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Windows Update.exe Nirsoft C:\Users\Admin\AppData\Roaming\Windows Update.exe Nirsoft -
Executes dropped EXE 1 IoCs
Processes:
Windows Update.exepid process 4156 Windows Update.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
32a8606658fdaad1bf63ad2ec4fca8c1acb23bb424e6516b98acd98af043d85f.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Control Panel\International\Geo\Nation 32a8606658fdaad1bf63ad2ec4fca8c1acb23bb424e6516b98acd98af043d85f.exe -
Drops file in Windows directory 1 IoCs
Processes:
dw20.exedescription ioc process File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp dw20.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
dw20.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
dw20.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
dw20.exedescription pid process Token: SeRestorePrivilege 1136 dw20.exe Token: SeBackupPrivilege 1136 dw20.exe Token: SeBackupPrivilege 1136 dw20.exe Token: SeBackupPrivilege 1136 dw20.exe Token: SeBackupPrivilege 1136 dw20.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
32a8606658fdaad1bf63ad2ec4fca8c1acb23bb424e6516b98acd98af043d85f.exeWindows Update.exedescription pid process target process PID 2168 wrote to memory of 4156 2168 32a8606658fdaad1bf63ad2ec4fca8c1acb23bb424e6516b98acd98af043d85f.exe Windows Update.exe PID 2168 wrote to memory of 4156 2168 32a8606658fdaad1bf63ad2ec4fca8c1acb23bb424e6516b98acd98af043d85f.exe Windows Update.exe PID 2168 wrote to memory of 4156 2168 32a8606658fdaad1bf63ad2ec4fca8c1acb23bb424e6516b98acd98af043d85f.exe Windows Update.exe PID 4156 wrote to memory of 1136 4156 Windows Update.exe dw20.exe PID 4156 wrote to memory of 1136 4156 Windows Update.exe dw20.exe PID 4156 wrote to memory of 1136 4156 Windows Update.exe dw20.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\32a8606658fdaad1bf63ad2ec4fca8c1acb23bb424e6516b98acd98af043d85f.exe"C:\Users\Admin\AppData\Local\Temp\32a8606658fdaad1bf63ad2ec4fca8c1acb23bb424e6516b98acd98af043d85f.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Roaming\Windows Update.exe"C:\Users\Admin\AppData\Roaming\Windows Update.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 11043⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:1136
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
521KB
MD5a1b89dc6328584521be91c0ce72d3d87
SHA1aab7aea67283b50c69e00c15db7ef922680b3d50
SHA25632a8606658fdaad1bf63ad2ec4fca8c1acb23bb424e6516b98acd98af043d85f
SHA5124a60116f47032a15edde0fa3ea61a909c336a825c703b87de8249602302b54809d2cccf0806e407ec6646289d088432530203de9cbea16c76b618385b023ad56
-
Filesize
521KB
MD5a1b89dc6328584521be91c0ce72d3d87
SHA1aab7aea67283b50c69e00c15db7ef922680b3d50
SHA25632a8606658fdaad1bf63ad2ec4fca8c1acb23bb424e6516b98acd98af043d85f
SHA5124a60116f47032a15edde0fa3ea61a909c336a825c703b87de8249602302b54809d2cccf0806e407ec6646289d088432530203de9cbea16c76b618385b023ad56