Analysis
-
max time kernel
155s -
max time network
177s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 07:48
Static task
static1
Behavioral task
behavioral1
Sample
60fc6ebe7a7c8c1b44977f169e4dfa9a36aae132a3406dd5f4ca298b1e15bece.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
60fc6ebe7a7c8c1b44977f169e4dfa9a36aae132a3406dd5f4ca298b1e15bece.exe
Resource
win10v2004-20220812-en
General
-
Target
60fc6ebe7a7c8c1b44977f169e4dfa9a36aae132a3406dd5f4ca298b1e15bece.exe
-
Size
1.4MB
-
MD5
cc12ec67eab006a43338a10951daa7bb
-
SHA1
72ef2f5b4572d1efa8d7c0f29be89e4873e8c541
-
SHA256
60fc6ebe7a7c8c1b44977f169e4dfa9a36aae132a3406dd5f4ca298b1e15bece
-
SHA512
24136b20415c05eda8ec8efdd75ae3c5b046f8163b93085d19929a4f02178ee88595432d39ceeb6d2db08d6e35a8322c676c6212f7eeb9c5a905ab43cf8bccac
-
SSDEEP
3072:iyf8n+BnNpiXN5U+M/hQuaCA3VMxDJAQO7LN:i/+BnNpCqP/hQuavirOH
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
Processes:
winlogon.exewinlogon.exewinlogon.exewinlogon.exepid process 4808 winlogon.exe 1004 winlogon.exe 3740 winlogon.exe 3812 winlogon.exe -
Processes:
resource yara_rule behavioral2/memory/4696-134-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/4696-136-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/4696-137-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/4696-140-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/4696-144-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/1004-154-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/1004-158-0x0000000000400000-0x000000000041C000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
60fc6ebe7a7c8c1b44977f169e4dfa9a36aae132a3406dd5f4ca298b1e15bece.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 60fc6ebe7a7c8c1b44977f169e4dfa9a36aae132a3406dd5f4ca298b1e15bece.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
60fc6ebe7a7c8c1b44977f169e4dfa9a36aae132a3406dd5f4ca298b1e15bece.exewinlogon.exewinlogon.exedescription pid process target process PID 2140 set thread context of 4696 2140 60fc6ebe7a7c8c1b44977f169e4dfa9a36aae132a3406dd5f4ca298b1e15bece.exe 60fc6ebe7a7c8c1b44977f169e4dfa9a36aae132a3406dd5f4ca298b1e15bece.exe PID 4808 set thread context of 1004 4808 winlogon.exe winlogon.exe PID 1004 set thread context of 3740 1004 winlogon.exe winlogon.exe PID 1004 set thread context of 3812 1004 winlogon.exe winlogon.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3472 3740 WerFault.exe winlogon.exe 3600 3812 WerFault.exe winlogon.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
60fc6ebe7a7c8c1b44977f169e4dfa9a36aae132a3406dd5f4ca298b1e15bece.exewinlogon.exepid process 4696 60fc6ebe7a7c8c1b44977f169e4dfa9a36aae132a3406dd5f4ca298b1e15bece.exe 1004 winlogon.exe -
Suspicious use of WriteProcessMemory 41 IoCs
Processes:
60fc6ebe7a7c8c1b44977f169e4dfa9a36aae132a3406dd5f4ca298b1e15bece.exe60fc6ebe7a7c8c1b44977f169e4dfa9a36aae132a3406dd5f4ca298b1e15bece.exewinlogon.exewinlogon.exedescription pid process target process PID 2140 wrote to memory of 1396 2140 60fc6ebe7a7c8c1b44977f169e4dfa9a36aae132a3406dd5f4ca298b1e15bece.exe svchost.exe PID 2140 wrote to memory of 1396 2140 60fc6ebe7a7c8c1b44977f169e4dfa9a36aae132a3406dd5f4ca298b1e15bece.exe svchost.exe PID 2140 wrote to memory of 1396 2140 60fc6ebe7a7c8c1b44977f169e4dfa9a36aae132a3406dd5f4ca298b1e15bece.exe svchost.exe PID 2140 wrote to memory of 4696 2140 60fc6ebe7a7c8c1b44977f169e4dfa9a36aae132a3406dd5f4ca298b1e15bece.exe 60fc6ebe7a7c8c1b44977f169e4dfa9a36aae132a3406dd5f4ca298b1e15bece.exe PID 2140 wrote to memory of 4696 2140 60fc6ebe7a7c8c1b44977f169e4dfa9a36aae132a3406dd5f4ca298b1e15bece.exe 60fc6ebe7a7c8c1b44977f169e4dfa9a36aae132a3406dd5f4ca298b1e15bece.exe PID 2140 wrote to memory of 4696 2140 60fc6ebe7a7c8c1b44977f169e4dfa9a36aae132a3406dd5f4ca298b1e15bece.exe 60fc6ebe7a7c8c1b44977f169e4dfa9a36aae132a3406dd5f4ca298b1e15bece.exe PID 2140 wrote to memory of 4696 2140 60fc6ebe7a7c8c1b44977f169e4dfa9a36aae132a3406dd5f4ca298b1e15bece.exe 60fc6ebe7a7c8c1b44977f169e4dfa9a36aae132a3406dd5f4ca298b1e15bece.exe PID 2140 wrote to memory of 4696 2140 60fc6ebe7a7c8c1b44977f169e4dfa9a36aae132a3406dd5f4ca298b1e15bece.exe 60fc6ebe7a7c8c1b44977f169e4dfa9a36aae132a3406dd5f4ca298b1e15bece.exe PID 2140 wrote to memory of 4696 2140 60fc6ebe7a7c8c1b44977f169e4dfa9a36aae132a3406dd5f4ca298b1e15bece.exe 60fc6ebe7a7c8c1b44977f169e4dfa9a36aae132a3406dd5f4ca298b1e15bece.exe PID 2140 wrote to memory of 4696 2140 60fc6ebe7a7c8c1b44977f169e4dfa9a36aae132a3406dd5f4ca298b1e15bece.exe 60fc6ebe7a7c8c1b44977f169e4dfa9a36aae132a3406dd5f4ca298b1e15bece.exe PID 2140 wrote to memory of 4696 2140 60fc6ebe7a7c8c1b44977f169e4dfa9a36aae132a3406dd5f4ca298b1e15bece.exe 60fc6ebe7a7c8c1b44977f169e4dfa9a36aae132a3406dd5f4ca298b1e15bece.exe PID 4696 wrote to memory of 4808 4696 60fc6ebe7a7c8c1b44977f169e4dfa9a36aae132a3406dd5f4ca298b1e15bece.exe winlogon.exe PID 4696 wrote to memory of 4808 4696 60fc6ebe7a7c8c1b44977f169e4dfa9a36aae132a3406dd5f4ca298b1e15bece.exe winlogon.exe PID 4696 wrote to memory of 4808 4696 60fc6ebe7a7c8c1b44977f169e4dfa9a36aae132a3406dd5f4ca298b1e15bece.exe winlogon.exe PID 4808 wrote to memory of 3404 4808 winlogon.exe svchost.exe PID 4808 wrote to memory of 3404 4808 winlogon.exe svchost.exe PID 4808 wrote to memory of 3404 4808 winlogon.exe svchost.exe PID 4808 wrote to memory of 1004 4808 winlogon.exe winlogon.exe PID 4808 wrote to memory of 1004 4808 winlogon.exe winlogon.exe PID 4808 wrote to memory of 1004 4808 winlogon.exe winlogon.exe PID 4808 wrote to memory of 1004 4808 winlogon.exe winlogon.exe PID 4808 wrote to memory of 1004 4808 winlogon.exe winlogon.exe PID 4808 wrote to memory of 1004 4808 winlogon.exe winlogon.exe PID 4808 wrote to memory of 1004 4808 winlogon.exe winlogon.exe PID 4808 wrote to memory of 1004 4808 winlogon.exe winlogon.exe PID 1004 wrote to memory of 3740 1004 winlogon.exe winlogon.exe PID 1004 wrote to memory of 3740 1004 winlogon.exe winlogon.exe PID 1004 wrote to memory of 3740 1004 winlogon.exe winlogon.exe PID 1004 wrote to memory of 3740 1004 winlogon.exe winlogon.exe PID 1004 wrote to memory of 3740 1004 winlogon.exe winlogon.exe PID 1004 wrote to memory of 3740 1004 winlogon.exe winlogon.exe PID 1004 wrote to memory of 3740 1004 winlogon.exe winlogon.exe PID 1004 wrote to memory of 3740 1004 winlogon.exe winlogon.exe PID 1004 wrote to memory of 3812 1004 winlogon.exe winlogon.exe PID 1004 wrote to memory of 3812 1004 winlogon.exe winlogon.exe PID 1004 wrote to memory of 3812 1004 winlogon.exe winlogon.exe PID 1004 wrote to memory of 3812 1004 winlogon.exe winlogon.exe PID 1004 wrote to memory of 3812 1004 winlogon.exe winlogon.exe PID 1004 wrote to memory of 3812 1004 winlogon.exe winlogon.exe PID 1004 wrote to memory of 3812 1004 winlogon.exe winlogon.exe PID 1004 wrote to memory of 3812 1004 winlogon.exe winlogon.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\60fc6ebe7a7c8c1b44977f169e4dfa9a36aae132a3406dd5f4ca298b1e15bece.exe"C:\Users\Admin\AppData\Local\Temp\60fc6ebe7a7c8c1b44977f169e4dfa9a36aae132a3406dd5f4ca298b1e15bece.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\\svchost.exe2⤵
-
C:\Users\Admin\AppData\Local\Temp\60fc6ebe7a7c8c1b44977f169e4dfa9a36aae132a3406dd5f4ca298b1e15bece.exe
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\\svchost.exe4⤵
-
C:\Users\Admin\E696D64614\winlogon.exe
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3740 -s 126⤵
- Program crash
-
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3812 -s 126⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3740 -ip 37401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3812 -ip 38121⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\E696D64614\winlogon.exeFilesize
1.4MB
MD5cc12ec67eab006a43338a10951daa7bb
SHA172ef2f5b4572d1efa8d7c0f29be89e4873e8c541
SHA25660fc6ebe7a7c8c1b44977f169e4dfa9a36aae132a3406dd5f4ca298b1e15bece
SHA51224136b20415c05eda8ec8efdd75ae3c5b046f8163b93085d19929a4f02178ee88595432d39ceeb6d2db08d6e35a8322c676c6212f7eeb9c5a905ab43cf8bccac
-
C:\Users\Admin\E696D64614\winlogon.exeFilesize
1.4MB
MD5cc12ec67eab006a43338a10951daa7bb
SHA172ef2f5b4572d1efa8d7c0f29be89e4873e8c541
SHA25660fc6ebe7a7c8c1b44977f169e4dfa9a36aae132a3406dd5f4ca298b1e15bece
SHA51224136b20415c05eda8ec8efdd75ae3c5b046f8163b93085d19929a4f02178ee88595432d39ceeb6d2db08d6e35a8322c676c6212f7eeb9c5a905ab43cf8bccac
-
C:\Users\Admin\E696D64614\winlogon.exeFilesize
1.4MB
MD5cc12ec67eab006a43338a10951daa7bb
SHA172ef2f5b4572d1efa8d7c0f29be89e4873e8c541
SHA25660fc6ebe7a7c8c1b44977f169e4dfa9a36aae132a3406dd5f4ca298b1e15bece
SHA51224136b20415c05eda8ec8efdd75ae3c5b046f8163b93085d19929a4f02178ee88595432d39ceeb6d2db08d6e35a8322c676c6212f7eeb9c5a905ab43cf8bccac
-
C:\Users\Admin\E696D64614\winlogon.exeFilesize
1.4MB
MD5cc12ec67eab006a43338a10951daa7bb
SHA172ef2f5b4572d1efa8d7c0f29be89e4873e8c541
SHA25660fc6ebe7a7c8c1b44977f169e4dfa9a36aae132a3406dd5f4ca298b1e15bece
SHA51224136b20415c05eda8ec8efdd75ae3c5b046f8163b93085d19929a4f02178ee88595432d39ceeb6d2db08d6e35a8322c676c6212f7eeb9c5a905ab43cf8bccac
-
C:\Users\Admin\E696D64614\winlogon.exeFilesize
1.4MB
MD5cc12ec67eab006a43338a10951daa7bb
SHA172ef2f5b4572d1efa8d7c0f29be89e4873e8c541
SHA25660fc6ebe7a7c8c1b44977f169e4dfa9a36aae132a3406dd5f4ca298b1e15bece
SHA51224136b20415c05eda8ec8efdd75ae3c5b046f8163b93085d19929a4f02178ee88595432d39ceeb6d2db08d6e35a8322c676c6212f7eeb9c5a905ab43cf8bccac
-
memory/1004-146-0x0000000000000000-mapping.dmp
-
memory/1004-154-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/1004-158-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/1396-132-0x0000000000000000-mapping.dmp
-
memory/3404-145-0x0000000000000000-mapping.dmp
-
memory/3740-155-0x0000000000000000-mapping.dmp
-
memory/3812-159-0x0000000000000000-mapping.dmp
-
memory/4696-136-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/4696-137-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/4696-134-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/4696-144-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/4696-140-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/4696-133-0x0000000000000000-mapping.dmp
-
memory/4808-141-0x0000000000000000-mapping.dmp