Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2022 11:22
Static task
static1
Behavioral task
behavioral1
Sample
e467fd779a583367fdfa3868363e394492ef8b9840a54497fd2d581d922cf4c3.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e467fd779a583367fdfa3868363e394492ef8b9840a54497fd2d581d922cf4c3.exe
Resource
win10v2004-20220901-en
General
-
Target
e467fd779a583367fdfa3868363e394492ef8b9840a54497fd2d581d922cf4c3.exe
-
Size
272KB
-
MD5
4110967fb802dc7c9fb7885c95ab5cbd
-
SHA1
b388efe57f316a3b5cef0e353fd0f394e803d53d
-
SHA256
e467fd779a583367fdfa3868363e394492ef8b9840a54497fd2d581d922cf4c3
-
SHA512
70bf552ba8ff0305ae2f9a07e279434140b62e3e87e887f428ebf3193a623b999dc7207104c50eecb3609d09bc4b45333d38ecc2f804ee24506ceff75f985765
-
SSDEEP
6144:7sbL9azzIMJSP+PMcx8jH+qJM/4KhfuulWCxCuctlxU:8EzJJSP6Ms8jH+qJrKff1cuIK
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4788 e467fd779a583367fdfa3868363e394492ef8b9840a54497fd2d581d922cf4c3.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation e467fd779a583367fdfa3868363e394492ef8b9840a54497fd2d581d922cf4c3.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\543ewt234 = "C:\\Users\\Admin\\AppData\\Local\\1234234reawsd\\awdhgQWYEFTDGAVHWBDexe" e467fd779a583367fdfa3868363e394492ef8b9840a54497fd2d581d922cf4c3.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\543ewt234 = "\\1234234reawsd\\awdhgQWYEFTDGAVHWBDexe" e467fd779a583367fdfa3868363e394492ef8b9840a54497fd2d581d922cf4c3.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\Windows\assembly\Desktop.ini e467fd779a583367fdfa3868363e394492ef8b9840a54497fd2d581d922cf4c3.exe File created C:\Windows\assembly\Desktop.ini e467fd779a583367fdfa3868363e394492ef8b9840a54497fd2d581d922cf4c3.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly e467fd779a583367fdfa3868363e394492ef8b9840a54497fd2d581d922cf4c3.exe File created C:\Windows\assembly\Desktop.ini e467fd779a583367fdfa3868363e394492ef8b9840a54497fd2d581d922cf4c3.exe File opened for modification C:\Windows\assembly\Desktop.ini e467fd779a583367fdfa3868363e394492ef8b9840a54497fd2d581d922cf4c3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 372 PING.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4788 e467fd779a583367fdfa3868363e394492ef8b9840a54497fd2d581d922cf4c3.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4152 e467fd779a583367fdfa3868363e394492ef8b9840a54497fd2d581d922cf4c3.exe Token: SeDebugPrivilege 4788 e467fd779a583367fdfa3868363e394492ef8b9840a54497fd2d581d922cf4c3.exe Token: SeDebugPrivilege 4788 e467fd779a583367fdfa3868363e394492ef8b9840a54497fd2d581d922cf4c3.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4788 e467fd779a583367fdfa3868363e394492ef8b9840a54497fd2d581d922cf4c3.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4152 wrote to memory of 4788 4152 e467fd779a583367fdfa3868363e394492ef8b9840a54497fd2d581d922cf4c3.exe 81 PID 4152 wrote to memory of 4788 4152 e467fd779a583367fdfa3868363e394492ef8b9840a54497fd2d581d922cf4c3.exe 81 PID 4152 wrote to memory of 4788 4152 e467fd779a583367fdfa3868363e394492ef8b9840a54497fd2d581d922cf4c3.exe 81 PID 4152 wrote to memory of 1752 4152 e467fd779a583367fdfa3868363e394492ef8b9840a54497fd2d581d922cf4c3.exe 82 PID 4152 wrote to memory of 1752 4152 e467fd779a583367fdfa3868363e394492ef8b9840a54497fd2d581d922cf4c3.exe 82 PID 4152 wrote to memory of 1752 4152 e467fd779a583367fdfa3868363e394492ef8b9840a54497fd2d581d922cf4c3.exe 82 PID 1752 wrote to memory of 372 1752 cmd.exe 84 PID 1752 wrote to memory of 372 1752 cmd.exe 84 PID 1752 wrote to memory of 372 1752 cmd.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\e467fd779a583367fdfa3868363e394492ef8b9840a54497fd2d581d922cf4c3.exe"C:\Users\Admin\AppData\Local\Temp\e467fd779a583367fdfa3868363e394492ef8b9840a54497fd2d581d922cf4c3.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\e467fd779a583367fdfa3868363e394492ef8b9840a54497fd2d581d922cf4c3\e467fd779a583367fdfa3868363e394492ef8b9840a54497fd2d581d922cf4c3.exe"C:\Users\Admin\AppData\Local\Temp\e467fd779a583367fdfa3868363e394492ef8b9840a54497fd2d581d922cf4c3\e467fd779a583367fdfa3868363e394492ef8b9840a54497fd2d581d922cf4c3.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4788
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\e467fd779a583367fdfa3868363e394492ef8b9840a54497fd2d581d922cf4c3.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 10003⤵
- Runs ping.exe
PID:372
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\e467fd779a583367fdfa3868363e394492ef8b9840a54497fd2d581d922cf4c3\e467fd779a583367fdfa3868363e394492ef8b9840a54497fd2d581d922cf4c3.exe
Filesize272KB
MD54110967fb802dc7c9fb7885c95ab5cbd
SHA1b388efe57f316a3b5cef0e353fd0f394e803d53d
SHA256e467fd779a583367fdfa3868363e394492ef8b9840a54497fd2d581d922cf4c3
SHA51270bf552ba8ff0305ae2f9a07e279434140b62e3e87e887f428ebf3193a623b999dc7207104c50eecb3609d09bc4b45333d38ecc2f804ee24506ceff75f985765
-
C:\Users\Admin\AppData\Local\Temp\e467fd779a583367fdfa3868363e394492ef8b9840a54497fd2d581d922cf4c3\e467fd779a583367fdfa3868363e394492ef8b9840a54497fd2d581d922cf4c3.exe
Filesize272KB
MD54110967fb802dc7c9fb7885c95ab5cbd
SHA1b388efe57f316a3b5cef0e353fd0f394e803d53d
SHA256e467fd779a583367fdfa3868363e394492ef8b9840a54497fd2d581d922cf4c3
SHA51270bf552ba8ff0305ae2f9a07e279434140b62e3e87e887f428ebf3193a623b999dc7207104c50eecb3609d09bc4b45333d38ecc2f804ee24506ceff75f985765