Analysis

  • max time kernel
    205s
  • max time network
    207s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-11-2022 14:20

General

  • Target

    89e8dbf09685f9de65e186fd7487374b7f081dbbbca86360a9047fb334235c33.exe

  • Size

    636KB

  • MD5

    c9ffc3cf9644b18d3b9177f3538d5777

  • SHA1

    4b07b514e46bdc9d1b7a4d141972390db368b5f0

  • SHA256

    89e8dbf09685f9de65e186fd7487374b7f081dbbbca86360a9047fb334235c33

  • SHA512

    8c79fe2a251d2baa6b2d7eb8bbc99ea8112e44e4cabf8083cb3a762b03cc75c635927f2652ea48aaa2f2d57d1b472a612157c897c660f5e5efa6991396031109

  • SSDEEP

    12288:P3N7+8qyRWMzSfXPzwDevratVILPqbP/E:PkRp4Snz7atVpP

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in Drivers directory 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\89e8dbf09685f9de65e186fd7487374b7f081dbbbca86360a9047fb334235c33.exe
    "C:\Users\Admin\AppData\Local\Temp\89e8dbf09685f9de65e186fd7487374b7f081dbbbca86360a9047fb334235c33.exe"
    1⤵
    • Drops file in Drivers directory
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:420
    • C:\Users\Admin\AppData\Local\Temp\89e8dbf09685f9de65e186fd7487374b7f081dbbbca86360a9047fb334235c33.exe
      "C:\Users\Admin\AppData\Local\Temp\89e8dbf09685f9de65e186fd7487374b7f081dbbbca86360a9047fb334235c33.exe"
      2⤵
        PID:2940
      • C:\Users\Admin\AppData\Local\Temp\89e8dbf09685f9de65e186fd7487374b7f081dbbbca86360a9047fb334235c33.exe
        "C:\Users\Admin\AppData\Local\Temp\89e8dbf09685f9de65e186fd7487374b7f081dbbbca86360a9047fb334235c33.exe"
        2⤵
        • Modifies WinLogon for persistence
        • Checks computer location settings
        • Drops file in System32 directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3484
        • C:\ProgramData\502970\system.exe
          "C:\ProgramData\502970\system.exe"
          3⤵
          • Drops file in Drivers directory
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3992
          • C:\ProgramData\502970\system.exe
            "C:\ProgramData\502970\system.exe"
            4⤵
            • Executes dropped EXE
            PID:5096
          • C:\ProgramData\502970\system.exe
            "C:\ProgramData\502970\system.exe"
            4⤵
            • Executes dropped EXE
            PID:456

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\502970\system.exe

      Filesize

      636KB

      MD5

      c9ffc3cf9644b18d3b9177f3538d5777

      SHA1

      4b07b514e46bdc9d1b7a4d141972390db368b5f0

      SHA256

      89e8dbf09685f9de65e186fd7487374b7f081dbbbca86360a9047fb334235c33

      SHA512

      8c79fe2a251d2baa6b2d7eb8bbc99ea8112e44e4cabf8083cb3a762b03cc75c635927f2652ea48aaa2f2d57d1b472a612157c897c660f5e5efa6991396031109

    • C:\ProgramData\502970\system.exe

      Filesize

      636KB

      MD5

      c9ffc3cf9644b18d3b9177f3538d5777

      SHA1

      4b07b514e46bdc9d1b7a4d141972390db368b5f0

      SHA256

      89e8dbf09685f9de65e186fd7487374b7f081dbbbca86360a9047fb334235c33

      SHA512

      8c79fe2a251d2baa6b2d7eb8bbc99ea8112e44e4cabf8083cb3a762b03cc75c635927f2652ea48aaa2f2d57d1b472a612157c897c660f5e5efa6991396031109

    • C:\ProgramData\502970\system.exe

      Filesize

      636KB

      MD5

      c9ffc3cf9644b18d3b9177f3538d5777

      SHA1

      4b07b514e46bdc9d1b7a4d141972390db368b5f0

      SHA256

      89e8dbf09685f9de65e186fd7487374b7f081dbbbca86360a9047fb334235c33

      SHA512

      8c79fe2a251d2baa6b2d7eb8bbc99ea8112e44e4cabf8083cb3a762b03cc75c635927f2652ea48aaa2f2d57d1b472a612157c897c660f5e5efa6991396031109

    • C:\ProgramData\502970\system.exe

      Filesize

      636KB

      MD5

      c9ffc3cf9644b18d3b9177f3538d5777

      SHA1

      4b07b514e46bdc9d1b7a4d141972390db368b5f0

      SHA256

      89e8dbf09685f9de65e186fd7487374b7f081dbbbca86360a9047fb334235c33

      SHA512

      8c79fe2a251d2baa6b2d7eb8bbc99ea8112e44e4cabf8083cb3a762b03cc75c635927f2652ea48aaa2f2d57d1b472a612157c897c660f5e5efa6991396031109

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\89e8dbf09685f9de65e186fd7487374b7f081dbbbca86360a9047fb334235c33.exe.log

      Filesize

      400B

      MD5

      0a9b4592cd49c3c21f6767c2dabda92f

      SHA1

      f534297527ae5ccc0ecb2221ddeb8e58daeb8b74

      SHA256

      c7effe9cb81a70d738dee863991afefab040290d4c4b78b4202383bcb9f88fcd

      SHA512

      6b878df474e5bbfb8e9e265f15a76560c2ef151dcebc6388c82d7f6f86ffaf83f5ade5a09f1842e493cb6c8fd63b0b88d088c728fd725f7139f965a5ee332307

    • C:\Windows\system32\drivers\etc\hosts

      Filesize

      2KB

      MD5

      1cca24ab81c8b433dbf256fb95564a26

      SHA1

      565b8147705862cb0fff85591a48a9fa6859dc31

      SHA256

      ca9af0bb473d3b51f7b47ddbd7ee75e8e88342ba35e169f3cd1666bf9176215a

      SHA512

      3bc3179fcc8e74da763a42401fa8e99d33a1181fda8f8695c4394a2bcc54690dd85b9d4b9ea59bfc7ddfbd6f1f055179bf79a93919d1e384e16f28029ea3e839

    • memory/420-139-0x0000000075410000-0x00000000759C1000-memory.dmp

      Filesize

      5.7MB

    • memory/420-132-0x0000000075410000-0x00000000759C1000-memory.dmp

      Filesize

      5.7MB

    • memory/420-133-0x0000000075410000-0x00000000759C1000-memory.dmp

      Filesize

      5.7MB

    • memory/456-154-0x0000000075410000-0x00000000759C1000-memory.dmp

      Filesize

      5.7MB

    • memory/456-153-0x0000000075410000-0x00000000759C1000-memory.dmp

      Filesize

      5.7MB

    • memory/3484-138-0x0000000075410000-0x00000000759C1000-memory.dmp

      Filesize

      5.7MB

    • memory/3484-140-0x0000000075410000-0x00000000759C1000-memory.dmp

      Filesize

      5.7MB

    • memory/3484-136-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/3992-152-0x0000000075410000-0x00000000759C1000-memory.dmp

      Filesize

      5.7MB

    • memory/3992-145-0x0000000075410000-0x00000000759C1000-memory.dmp

      Filesize

      5.7MB

    • memory/3992-144-0x0000000075410000-0x00000000759C1000-memory.dmp

      Filesize

      5.7MB