Analysis
-
max time kernel
182s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2022 07:06
Behavioral task
behavioral1
Sample
caa465e63287335c8a4b13ad6adb60f49c4aff55e40ac40f5694829fae11db53.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
caa465e63287335c8a4b13ad6adb60f49c4aff55e40ac40f5694829fae11db53.exe
Resource
win10v2004-20221111-en
General
-
Target
caa465e63287335c8a4b13ad6adb60f49c4aff55e40ac40f5694829fae11db53.exe
-
Size
25KB
-
MD5
b9841a0f9a092cafe713e08ad5340e24
-
SHA1
255c1d9653ab94d29fe5f65510ff084b9ea140c2
-
SHA256
caa465e63287335c8a4b13ad6adb60f49c4aff55e40ac40f5694829fae11db53
-
SHA512
f76568cbf1dc419ab39b78b7fb6446a21d5d777dc7a5468beea770d9b7b19a424444f71114db0610cc23a73f2224996182542df79d24774b868ba1ea90eb6a7d
-
SSDEEP
384:fwVTyPgD6SgOViuyg0pBH2W4Gah9WrUk2MgDqDkIcBsQe6nnfThCNqtz9cLKD:oLGQViuygAyuUk2CgHBZ5nwCe
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2788 cmss.exe -
resource yara_rule behavioral2/memory/1236-132-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral2/memory/1236-133-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral2/files/0x0009000000022dc7-134.dat upx behavioral2/files/0x0009000000022dc7-135.dat upx behavioral2/memory/2788-136-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral2/memory/1236-138-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral2/memory/2788-140-0x0000000000400000-0x0000000000415000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation caa465e63287335c8a4b13ad6adb60f49c4aff55e40ac40f5694829fae11db53.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\cmss.exe caa465e63287335c8a4b13ad6adb60f49c4aff55e40ac40f5694829fae11db53.exe File created C:\Program Files (x86)\cmss.exe caa465e63287335c8a4b13ad6adb60f49c4aff55e40ac40f5694829fae11db53.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings caa465e63287335c8a4b13ad6adb60f49c4aff55e40ac40f5694829fae11db53.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1236 caa465e63287335c8a4b13ad6adb60f49c4aff55e40ac40f5694829fae11db53.exe 1236 caa465e63287335c8a4b13ad6adb60f49c4aff55e40ac40f5694829fae11db53.exe 2788 cmss.exe 2788 cmss.exe 1236 caa465e63287335c8a4b13ad6adb60f49c4aff55e40ac40f5694829fae11db53.exe 1236 caa465e63287335c8a4b13ad6adb60f49c4aff55e40ac40f5694829fae11db53.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2788 cmss.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1236 wrote to memory of 3900 1236 caa465e63287335c8a4b13ad6adb60f49c4aff55e40ac40f5694829fae11db53.exe 83 PID 1236 wrote to memory of 3900 1236 caa465e63287335c8a4b13ad6adb60f49c4aff55e40ac40f5694829fae11db53.exe 83 PID 1236 wrote to memory of 3900 1236 caa465e63287335c8a4b13ad6adb60f49c4aff55e40ac40f5694829fae11db53.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\caa465e63287335c8a4b13ad6adb60f49c4aff55e40ac40f5694829fae11db53.exe"C:\Users\Admin\AppData\Local\Temp\caa465e63287335c8a4b13ad6adb60f49c4aff55e40ac40f5694829fae11db53.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\7724.vbs"2⤵PID:3900
-
-
C:\Program Files (x86)\cmss.exe"C:\Program Files (x86)\cmss.exe"1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2788
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
500B
MD5f987ed9a13348b7bbf4da9dacb355b7d
SHA1c2cc0febd562297648304dc78bf845eb6409e9e3
SHA256a9ed7a8126aa3f99df4ecd9e7fb6c673d28811f9b5644c48f048c7d415b308a1
SHA512159befd0b4c47935292707dee46eb64257472a0a41ecc5cc4dbffc91a07782c9a25d2fdc93f59d77b78454a0dbb5b1ee2a73f4bcb51311e5e238775b090a78e3
-
Filesize
25KB
MD5b9841a0f9a092cafe713e08ad5340e24
SHA1255c1d9653ab94d29fe5f65510ff084b9ea140c2
SHA256caa465e63287335c8a4b13ad6adb60f49c4aff55e40ac40f5694829fae11db53
SHA512f76568cbf1dc419ab39b78b7fb6446a21d5d777dc7a5468beea770d9b7b19a424444f71114db0610cc23a73f2224996182542df79d24774b868ba1ea90eb6a7d
-
Filesize
25KB
MD5b9841a0f9a092cafe713e08ad5340e24
SHA1255c1d9653ab94d29fe5f65510ff084b9ea140c2
SHA256caa465e63287335c8a4b13ad6adb60f49c4aff55e40ac40f5694829fae11db53
SHA512f76568cbf1dc419ab39b78b7fb6446a21d5d777dc7a5468beea770d9b7b19a424444f71114db0610cc23a73f2224996182542df79d24774b868ba1ea90eb6a7d