Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 01:20
Static task
static1
Behavioral task
behavioral1
Sample
28824f7006872c78d1914bb2bf95671f0033ee2b0aad19244447383dbe803a1e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
28824f7006872c78d1914bb2bf95671f0033ee2b0aad19244447383dbe803a1e.exe
Resource
win10v2004-20220901-en
General
-
Target
28824f7006872c78d1914bb2bf95671f0033ee2b0aad19244447383dbe803a1e.exe
-
Size
100KB
-
MD5
5569861337f4a0447cbe1b0886a2dd04
-
SHA1
84034aa020f72e6dd6ef8849e386ae48ee83898b
-
SHA256
28824f7006872c78d1914bb2bf95671f0033ee2b0aad19244447383dbe803a1e
-
SHA512
65a28534d2e86541d03c8d333e383881ebe30332629ce4cb6e7f17a2682777af2d1c0b044fdfed748994d25fbf4ed90bd2e00f07262ece23e10bf6be8e65f40a
-
SSDEEP
1536:zD1RjS3Kj/HP1UtGgH0tCSoe11z3yqM4/0bucdU/mNYjiZcHvIyi68q7+FSlDKB0:vy3KbP1U1ju0Qz
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" pinod.exe -
Executes dropped EXE 1 IoCs
pid Process 2200 pinod.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 28824f7006872c78d1914bb2bf95671f0033ee2b0aad19244447383dbe803a1e.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run\ pinod.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pinod = "C:\\Users\\Admin\\pinod.exe" pinod.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2200 pinod.exe 2200 pinod.exe 2200 pinod.exe 2200 pinod.exe 2200 pinod.exe 2200 pinod.exe 2200 pinod.exe 2200 pinod.exe 2200 pinod.exe 2200 pinod.exe 2200 pinod.exe 2200 pinod.exe 2200 pinod.exe 2200 pinod.exe 2200 pinod.exe 2200 pinod.exe 2200 pinod.exe 2200 pinod.exe 2200 pinod.exe 2200 pinod.exe 2200 pinod.exe 2200 pinod.exe 2200 pinod.exe 2200 pinod.exe 2200 pinod.exe 2200 pinod.exe 2200 pinod.exe 2200 pinod.exe 2200 pinod.exe 2200 pinod.exe 2200 pinod.exe 2200 pinod.exe 2200 pinod.exe 2200 pinod.exe 2200 pinod.exe 2200 pinod.exe 2200 pinod.exe 2200 pinod.exe 2200 pinod.exe 2200 pinod.exe 2200 pinod.exe 2200 pinod.exe 2200 pinod.exe 2200 pinod.exe 2200 pinod.exe 2200 pinod.exe 2200 pinod.exe 2200 pinod.exe 2200 pinod.exe 2200 pinod.exe 2200 pinod.exe 2200 pinod.exe 2200 pinod.exe 2200 pinod.exe 2200 pinod.exe 2200 pinod.exe 2200 pinod.exe 2200 pinod.exe 2200 pinod.exe 2200 pinod.exe 2200 pinod.exe 2200 pinod.exe 2200 pinod.exe 2200 pinod.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 652 28824f7006872c78d1914bb2bf95671f0033ee2b0aad19244447383dbe803a1e.exe 2200 pinod.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 652 wrote to memory of 2200 652 28824f7006872c78d1914bb2bf95671f0033ee2b0aad19244447383dbe803a1e.exe 83 PID 652 wrote to memory of 2200 652 28824f7006872c78d1914bb2bf95671f0033ee2b0aad19244447383dbe803a1e.exe 83 PID 652 wrote to memory of 2200 652 28824f7006872c78d1914bb2bf95671f0033ee2b0aad19244447383dbe803a1e.exe 83 PID 2200 wrote to memory of 652 2200 pinod.exe 80 PID 2200 wrote to memory of 652 2200 pinod.exe 80 PID 2200 wrote to memory of 652 2200 pinod.exe 80 PID 2200 wrote to memory of 652 2200 pinod.exe 80 PID 2200 wrote to memory of 652 2200 pinod.exe 80 PID 2200 wrote to memory of 652 2200 pinod.exe 80 PID 2200 wrote to memory of 652 2200 pinod.exe 80 PID 2200 wrote to memory of 652 2200 pinod.exe 80 PID 2200 wrote to memory of 652 2200 pinod.exe 80 PID 2200 wrote to memory of 652 2200 pinod.exe 80 PID 2200 wrote to memory of 652 2200 pinod.exe 80 PID 2200 wrote to memory of 652 2200 pinod.exe 80 PID 2200 wrote to memory of 652 2200 pinod.exe 80 PID 2200 wrote to memory of 652 2200 pinod.exe 80 PID 2200 wrote to memory of 652 2200 pinod.exe 80 PID 2200 wrote to memory of 652 2200 pinod.exe 80 PID 2200 wrote to memory of 652 2200 pinod.exe 80 PID 2200 wrote to memory of 652 2200 pinod.exe 80 PID 2200 wrote to memory of 652 2200 pinod.exe 80 PID 2200 wrote to memory of 652 2200 pinod.exe 80 PID 2200 wrote to memory of 652 2200 pinod.exe 80 PID 2200 wrote to memory of 652 2200 pinod.exe 80 PID 2200 wrote to memory of 652 2200 pinod.exe 80 PID 2200 wrote to memory of 652 2200 pinod.exe 80 PID 2200 wrote to memory of 652 2200 pinod.exe 80 PID 2200 wrote to memory of 652 2200 pinod.exe 80 PID 2200 wrote to memory of 652 2200 pinod.exe 80 PID 2200 wrote to memory of 652 2200 pinod.exe 80 PID 2200 wrote to memory of 652 2200 pinod.exe 80 PID 2200 wrote to memory of 652 2200 pinod.exe 80 PID 2200 wrote to memory of 652 2200 pinod.exe 80 PID 2200 wrote to memory of 652 2200 pinod.exe 80 PID 2200 wrote to memory of 652 2200 pinod.exe 80 PID 2200 wrote to memory of 652 2200 pinod.exe 80 PID 2200 wrote to memory of 652 2200 pinod.exe 80 PID 2200 wrote to memory of 652 2200 pinod.exe 80 PID 2200 wrote to memory of 652 2200 pinod.exe 80 PID 2200 wrote to memory of 652 2200 pinod.exe 80 PID 2200 wrote to memory of 652 2200 pinod.exe 80 PID 2200 wrote to memory of 652 2200 pinod.exe 80 PID 2200 wrote to memory of 652 2200 pinod.exe 80 PID 2200 wrote to memory of 652 2200 pinod.exe 80 PID 2200 wrote to memory of 652 2200 pinod.exe 80 PID 2200 wrote to memory of 652 2200 pinod.exe 80 PID 2200 wrote to memory of 652 2200 pinod.exe 80 PID 2200 wrote to memory of 652 2200 pinod.exe 80 PID 2200 wrote to memory of 652 2200 pinod.exe 80 PID 2200 wrote to memory of 652 2200 pinod.exe 80 PID 2200 wrote to memory of 652 2200 pinod.exe 80 PID 2200 wrote to memory of 652 2200 pinod.exe 80 PID 2200 wrote to memory of 652 2200 pinod.exe 80 PID 2200 wrote to memory of 652 2200 pinod.exe 80 PID 2200 wrote to memory of 652 2200 pinod.exe 80 PID 2200 wrote to memory of 652 2200 pinod.exe 80 PID 2200 wrote to memory of 652 2200 pinod.exe 80 PID 2200 wrote to memory of 652 2200 pinod.exe 80 PID 2200 wrote to memory of 652 2200 pinod.exe 80 PID 2200 wrote to memory of 652 2200 pinod.exe 80 PID 2200 wrote to memory of 652 2200 pinod.exe 80 PID 2200 wrote to memory of 652 2200 pinod.exe 80 PID 2200 wrote to memory of 652 2200 pinod.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\28824f7006872c78d1914bb2bf95671f0033ee2b0aad19244447383dbe803a1e.exe"C:\Users\Admin\AppData\Local\Temp\28824f7006872c78d1914bb2bf95671f0033ee2b0aad19244447383dbe803a1e.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Users\Admin\pinod.exe"C:\Users\Admin\pinod.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2200
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD5a215346ed32856174d3910a7bbfdd77b
SHA1cb47dc96c9e6a7a3bb0ede4bbab9254abdc6e42a
SHA256ade021b7d47d69110266efb62cb7757e6c2acbc0355c849741d511dc42d1947c
SHA5125b70a4193368e0619e61b9b882e19a9e0e0c1250f5149a1b3ed28a5864e50e3e62597ba78a4aefafd4445350d92e2985b973a34fb12ae3275826ecd9bf6ed1d4
-
Filesize
100KB
MD5a215346ed32856174d3910a7bbfdd77b
SHA1cb47dc96c9e6a7a3bb0ede4bbab9254abdc6e42a
SHA256ade021b7d47d69110266efb62cb7757e6c2acbc0355c849741d511dc42d1947c
SHA5125b70a4193368e0619e61b9b882e19a9e0e0c1250f5149a1b3ed28a5864e50e3e62597ba78a4aefafd4445350d92e2985b973a34fb12ae3275826ecd9bf6ed1d4