Analysis
-
max time kernel
165s -
max time network
187s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 05:17
Static task
static1
Behavioral task
behavioral1
Sample
07b36cc43d646b523b44731a6086fb72b7599c916e4e55d812fc0fea70edd1db.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
07b36cc43d646b523b44731a6086fb72b7599c916e4e55d812fc0fea70edd1db.exe
Resource
win10v2004-20220812-en
General
-
Target
07b36cc43d646b523b44731a6086fb72b7599c916e4e55d812fc0fea70edd1db.exe
-
Size
1.3MB
-
MD5
3802dee56cbab0201a2d08c8d52aeaed
-
SHA1
de7c198c5c581c058caf8c401fd4df56050fce97
-
SHA256
07b36cc43d646b523b44731a6086fb72b7599c916e4e55d812fc0fea70edd1db
-
SHA512
24f6e8ffae00ed27e80421ab2800e580e298d067be48d84d4c4a3c643636e873ee4030cc7b09ef094a4b45df1ad2c59e1690b2d825f13161dad31b601b0959da
-
SSDEEP
3072:iyf8n+BnNpiXN5U+M/hQuaCA3VMxDJAQO7LN:i/+BnNpCqP/hQuavirOH
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
Processes:
winlogon.exewinlogon.exewinlogon.exewinlogon.exepid process 4092 winlogon.exe 4128 winlogon.exe 4084 winlogon.exe 4728 winlogon.exe -
Processes:
resource yara_rule behavioral2/memory/1596-134-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/1596-136-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/1596-137-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/1596-140-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/1596-149-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/4128-157-0x0000000000400000-0x000000000041C000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
07b36cc43d646b523b44731a6086fb72b7599c916e4e55d812fc0fea70edd1db.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 07b36cc43d646b523b44731a6086fb72b7599c916e4e55d812fc0fea70edd1db.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
07b36cc43d646b523b44731a6086fb72b7599c916e4e55d812fc0fea70edd1db.exewinlogon.exewinlogon.exedescription pid process target process PID 5028 set thread context of 1596 5028 07b36cc43d646b523b44731a6086fb72b7599c916e4e55d812fc0fea70edd1db.exe 07b36cc43d646b523b44731a6086fb72b7599c916e4e55d812fc0fea70edd1db.exe PID 4092 set thread context of 4128 4092 winlogon.exe winlogon.exe PID 4128 set thread context of 4084 4128 winlogon.exe winlogon.exe PID 4128 set thread context of 4728 4128 winlogon.exe winlogon.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3304 4084 WerFault.exe winlogon.exe 3936 4728 WerFault.exe winlogon.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
07b36cc43d646b523b44731a6086fb72b7599c916e4e55d812fc0fea70edd1db.exewinlogon.exepid process 1596 07b36cc43d646b523b44731a6086fb72b7599c916e4e55d812fc0fea70edd1db.exe 4128 winlogon.exe -
Suspicious use of WriteProcessMemory 41 IoCs
Processes:
07b36cc43d646b523b44731a6086fb72b7599c916e4e55d812fc0fea70edd1db.exe07b36cc43d646b523b44731a6086fb72b7599c916e4e55d812fc0fea70edd1db.exewinlogon.exewinlogon.exedescription pid process target process PID 5028 wrote to memory of 864 5028 07b36cc43d646b523b44731a6086fb72b7599c916e4e55d812fc0fea70edd1db.exe svchost.exe PID 5028 wrote to memory of 864 5028 07b36cc43d646b523b44731a6086fb72b7599c916e4e55d812fc0fea70edd1db.exe svchost.exe PID 5028 wrote to memory of 864 5028 07b36cc43d646b523b44731a6086fb72b7599c916e4e55d812fc0fea70edd1db.exe svchost.exe PID 5028 wrote to memory of 1596 5028 07b36cc43d646b523b44731a6086fb72b7599c916e4e55d812fc0fea70edd1db.exe 07b36cc43d646b523b44731a6086fb72b7599c916e4e55d812fc0fea70edd1db.exe PID 5028 wrote to memory of 1596 5028 07b36cc43d646b523b44731a6086fb72b7599c916e4e55d812fc0fea70edd1db.exe 07b36cc43d646b523b44731a6086fb72b7599c916e4e55d812fc0fea70edd1db.exe PID 5028 wrote to memory of 1596 5028 07b36cc43d646b523b44731a6086fb72b7599c916e4e55d812fc0fea70edd1db.exe 07b36cc43d646b523b44731a6086fb72b7599c916e4e55d812fc0fea70edd1db.exe PID 5028 wrote to memory of 1596 5028 07b36cc43d646b523b44731a6086fb72b7599c916e4e55d812fc0fea70edd1db.exe 07b36cc43d646b523b44731a6086fb72b7599c916e4e55d812fc0fea70edd1db.exe PID 5028 wrote to memory of 1596 5028 07b36cc43d646b523b44731a6086fb72b7599c916e4e55d812fc0fea70edd1db.exe 07b36cc43d646b523b44731a6086fb72b7599c916e4e55d812fc0fea70edd1db.exe PID 5028 wrote to memory of 1596 5028 07b36cc43d646b523b44731a6086fb72b7599c916e4e55d812fc0fea70edd1db.exe 07b36cc43d646b523b44731a6086fb72b7599c916e4e55d812fc0fea70edd1db.exe PID 5028 wrote to memory of 1596 5028 07b36cc43d646b523b44731a6086fb72b7599c916e4e55d812fc0fea70edd1db.exe 07b36cc43d646b523b44731a6086fb72b7599c916e4e55d812fc0fea70edd1db.exe PID 5028 wrote to memory of 1596 5028 07b36cc43d646b523b44731a6086fb72b7599c916e4e55d812fc0fea70edd1db.exe 07b36cc43d646b523b44731a6086fb72b7599c916e4e55d812fc0fea70edd1db.exe PID 1596 wrote to memory of 4092 1596 07b36cc43d646b523b44731a6086fb72b7599c916e4e55d812fc0fea70edd1db.exe winlogon.exe PID 1596 wrote to memory of 4092 1596 07b36cc43d646b523b44731a6086fb72b7599c916e4e55d812fc0fea70edd1db.exe winlogon.exe PID 1596 wrote to memory of 4092 1596 07b36cc43d646b523b44731a6086fb72b7599c916e4e55d812fc0fea70edd1db.exe winlogon.exe PID 4092 wrote to memory of 2200 4092 winlogon.exe svchost.exe PID 4092 wrote to memory of 2200 4092 winlogon.exe svchost.exe PID 4092 wrote to memory of 2200 4092 winlogon.exe svchost.exe PID 4092 wrote to memory of 4128 4092 winlogon.exe winlogon.exe PID 4092 wrote to memory of 4128 4092 winlogon.exe winlogon.exe PID 4092 wrote to memory of 4128 4092 winlogon.exe winlogon.exe PID 4092 wrote to memory of 4128 4092 winlogon.exe winlogon.exe PID 4092 wrote to memory of 4128 4092 winlogon.exe winlogon.exe PID 4092 wrote to memory of 4128 4092 winlogon.exe winlogon.exe PID 4092 wrote to memory of 4128 4092 winlogon.exe winlogon.exe PID 4092 wrote to memory of 4128 4092 winlogon.exe winlogon.exe PID 4128 wrote to memory of 4084 4128 winlogon.exe winlogon.exe PID 4128 wrote to memory of 4084 4128 winlogon.exe winlogon.exe PID 4128 wrote to memory of 4084 4128 winlogon.exe winlogon.exe PID 4128 wrote to memory of 4084 4128 winlogon.exe winlogon.exe PID 4128 wrote to memory of 4084 4128 winlogon.exe winlogon.exe PID 4128 wrote to memory of 4084 4128 winlogon.exe winlogon.exe PID 4128 wrote to memory of 4084 4128 winlogon.exe winlogon.exe PID 4128 wrote to memory of 4084 4128 winlogon.exe winlogon.exe PID 4128 wrote to memory of 4728 4128 winlogon.exe winlogon.exe PID 4128 wrote to memory of 4728 4128 winlogon.exe winlogon.exe PID 4128 wrote to memory of 4728 4128 winlogon.exe winlogon.exe PID 4128 wrote to memory of 4728 4128 winlogon.exe winlogon.exe PID 4128 wrote to memory of 4728 4128 winlogon.exe winlogon.exe PID 4128 wrote to memory of 4728 4128 winlogon.exe winlogon.exe PID 4128 wrote to memory of 4728 4128 winlogon.exe winlogon.exe PID 4128 wrote to memory of 4728 4128 winlogon.exe winlogon.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\07b36cc43d646b523b44731a6086fb72b7599c916e4e55d812fc0fea70edd1db.exe"C:\Users\Admin\AppData\Local\Temp\07b36cc43d646b523b44731a6086fb72b7599c916e4e55d812fc0fea70edd1db.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\\svchost.exe2⤵PID:864
-
C:\Users\Admin\AppData\Local\Temp\07b36cc43d646b523b44731a6086fb72b7599c916e4e55d812fc0fea70edd1db.exe
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\\svchost.exe4⤵PID:2200
-
C:\Users\Admin\E696D64614\winlogon.exe
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"5⤵
- Executes dropped EXE
PID:4084 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 126⤵
- Program crash
PID:3304 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"5⤵
- Executes dropped EXE
PID:4728 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4728 -s 126⤵
- Program crash
PID:3936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4084 -ip 40841⤵PID:2476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4728 -ip 47281⤵PID:4524
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD53802dee56cbab0201a2d08c8d52aeaed
SHA1de7c198c5c581c058caf8c401fd4df56050fce97
SHA25607b36cc43d646b523b44731a6086fb72b7599c916e4e55d812fc0fea70edd1db
SHA51224f6e8ffae00ed27e80421ab2800e580e298d067be48d84d4c4a3c643636e873ee4030cc7b09ef094a4b45df1ad2c59e1690b2d825f13161dad31b601b0959da
-
Filesize
1.3MB
MD53802dee56cbab0201a2d08c8d52aeaed
SHA1de7c198c5c581c058caf8c401fd4df56050fce97
SHA25607b36cc43d646b523b44731a6086fb72b7599c916e4e55d812fc0fea70edd1db
SHA51224f6e8ffae00ed27e80421ab2800e580e298d067be48d84d4c4a3c643636e873ee4030cc7b09ef094a4b45df1ad2c59e1690b2d825f13161dad31b601b0959da
-
Filesize
1.3MB
MD53802dee56cbab0201a2d08c8d52aeaed
SHA1de7c198c5c581c058caf8c401fd4df56050fce97
SHA25607b36cc43d646b523b44731a6086fb72b7599c916e4e55d812fc0fea70edd1db
SHA51224f6e8ffae00ed27e80421ab2800e580e298d067be48d84d4c4a3c643636e873ee4030cc7b09ef094a4b45df1ad2c59e1690b2d825f13161dad31b601b0959da
-
Filesize
1.3MB
MD53802dee56cbab0201a2d08c8d52aeaed
SHA1de7c198c5c581c058caf8c401fd4df56050fce97
SHA25607b36cc43d646b523b44731a6086fb72b7599c916e4e55d812fc0fea70edd1db
SHA51224f6e8ffae00ed27e80421ab2800e580e298d067be48d84d4c4a3c643636e873ee4030cc7b09ef094a4b45df1ad2c59e1690b2d825f13161dad31b601b0959da
-
Filesize
1.3MB
MD53802dee56cbab0201a2d08c8d52aeaed
SHA1de7c198c5c581c058caf8c401fd4df56050fce97
SHA25607b36cc43d646b523b44731a6086fb72b7599c916e4e55d812fc0fea70edd1db
SHA51224f6e8ffae00ed27e80421ab2800e580e298d067be48d84d4c4a3c643636e873ee4030cc7b09ef094a4b45df1ad2c59e1690b2d825f13161dad31b601b0959da