Analysis
-
max time kernel
152s -
max time network
194s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 15:55
Static task
static1
Behavioral task
behavioral1
Sample
a4f3f4ffb7e625b76cc509b7c49d98669f0e0f5b3dde5b241d1b30c3d51d0635.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a4f3f4ffb7e625b76cc509b7c49d98669f0e0f5b3dde5b241d1b30c3d51d0635.exe
Resource
win10v2004-20221111-en
General
-
Target
a4f3f4ffb7e625b76cc509b7c49d98669f0e0f5b3dde5b241d1b30c3d51d0635.exe
-
Size
452KB
-
MD5
88140b8a47b523da3f16de466e6ddbd7
-
SHA1
889dfdd52e48616862f48428e5fcb145d9a88255
-
SHA256
a4f3f4ffb7e625b76cc509b7c49d98669f0e0f5b3dde5b241d1b30c3d51d0635
-
SHA512
d6e7fe3dbbf75745ec4da3371051d3b12a0677f8d20b28487b9ba017c19be758d561434ff8b6be1def6984fb5c83646d44f8b9d0ea09e2aa96d5eef6bb399452
-
SSDEEP
12288:KFhlFYQMvgPhzLuvBszuKmx+Dj3Avzxenf4/41:KrlyQJzLuQu/+/3Yzxenf4g
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\SunJava\\JavaUpdata.exe" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation a4f3f4ffb7e625b76cc509b7c49d98669f0e0f5b3dde5b241d1b30c3d51d0635.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\Windows\assembly\Desktop.ini a4f3f4ffb7e625b76cc509b7c49d98669f0e0f5b3dde5b241d1b30c3d51d0635.exe File created C:\Windows\assembly\Desktop.ini a4f3f4ffb7e625b76cc509b7c49d98669f0e0f5b3dde5b241d1b30c3d51d0635.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4412 set thread context of 4640 4412 a4f3f4ffb7e625b76cc509b7c49d98669f0e0f5b3dde5b241d1b30c3d51d0635.exe 87 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly a4f3f4ffb7e625b76cc509b7c49d98669f0e0f5b3dde5b241d1b30c3d51d0635.exe File created C:\Windows\assembly\Desktop.ini a4f3f4ffb7e625b76cc509b7c49d98669f0e0f5b3dde5b241d1b30c3d51d0635.exe File opened for modification C:\Windows\assembly\Desktop.ini a4f3f4ffb7e625b76cc509b7c49d98669f0e0f5b3dde5b241d1b30c3d51d0635.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4640 a4f3f4ffb7e625b76cc509b7c49d98669f0e0f5b3dde5b241d1b30c3d51d0635.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4640 a4f3f4ffb7e625b76cc509b7c49d98669f0e0f5b3dde5b241d1b30c3d51d0635.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4640 a4f3f4ffb7e625b76cc509b7c49d98669f0e0f5b3dde5b241d1b30c3d51d0635.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4412 wrote to memory of 4640 4412 a4f3f4ffb7e625b76cc509b7c49d98669f0e0f5b3dde5b241d1b30c3d51d0635.exe 87 PID 4412 wrote to memory of 4640 4412 a4f3f4ffb7e625b76cc509b7c49d98669f0e0f5b3dde5b241d1b30c3d51d0635.exe 87 PID 4412 wrote to memory of 4640 4412 a4f3f4ffb7e625b76cc509b7c49d98669f0e0f5b3dde5b241d1b30c3d51d0635.exe 87 PID 4412 wrote to memory of 4640 4412 a4f3f4ffb7e625b76cc509b7c49d98669f0e0f5b3dde5b241d1b30c3d51d0635.exe 87 PID 4412 wrote to memory of 4640 4412 a4f3f4ffb7e625b76cc509b7c49d98669f0e0f5b3dde5b241d1b30c3d51d0635.exe 87 PID 4412 wrote to memory of 4640 4412 a4f3f4ffb7e625b76cc509b7c49d98669f0e0f5b3dde5b241d1b30c3d51d0635.exe 87 PID 4412 wrote to memory of 4640 4412 a4f3f4ffb7e625b76cc509b7c49d98669f0e0f5b3dde5b241d1b30c3d51d0635.exe 87 PID 4412 wrote to memory of 4640 4412 a4f3f4ffb7e625b76cc509b7c49d98669f0e0f5b3dde5b241d1b30c3d51d0635.exe 87 PID 4412 wrote to memory of 4064 4412 a4f3f4ffb7e625b76cc509b7c49d98669f0e0f5b3dde5b241d1b30c3d51d0635.exe 88 PID 4412 wrote to memory of 4064 4412 a4f3f4ffb7e625b76cc509b7c49d98669f0e0f5b3dde5b241d1b30c3d51d0635.exe 88 PID 4412 wrote to memory of 4064 4412 a4f3f4ffb7e625b76cc509b7c49d98669f0e0f5b3dde5b241d1b30c3d51d0635.exe 88 PID 4064 wrote to memory of 4020 4064 cmd.exe 90 PID 4064 wrote to memory of 4020 4064 cmd.exe 90 PID 4064 wrote to memory of 4020 4064 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4f3f4ffb7e625b76cc509b7c49d98669f0e0f5b3dde5b241d1b30c3d51d0635.exe"C:\Users\Admin\AppData\Local\Temp\a4f3f4ffb7e625b76cc509b7c49d98669f0e0f5b3dde5b241d1b30c3d51d0635.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\a4f3f4ffb7e625b76cc509b7c49d98669f0e0f5b3dde5b241d1b30c3d51d0635.exe"C:\Users\Admin\AppData\Local\Temp\a4f3f4ffb7e625b76cc509b7c49d98669f0e0f5b3dde5b241d1b30c3d51d0635.exe"2⤵
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4640
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v shell /t REG_SZ /d explorer.exe,"C:\Users\Admin\AppData\Roaming\SunJava\JavaUpdata.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v shell /t REG_SZ /d explorer.exe,"C:\Users\Admin\AppData\Roaming\SunJava\JavaUpdata.exe"3⤵
- Modifies WinLogon for persistence
PID:4020
-
-