Analysis
-
max time kernel
151s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 10:33
Static task
static1
Behavioral task
behavioral1
Sample
1a54390bf4f97eabc52bed5f3d698efb57ee285e789284993233c2a5db944d16.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1a54390bf4f97eabc52bed5f3d698efb57ee285e789284993233c2a5db944d16.exe
Resource
win10v2004-20220812-en
General
-
Target
1a54390bf4f97eabc52bed5f3d698efb57ee285e789284993233c2a5db944d16.exe
-
Size
1.5MB
-
MD5
15e5b2411f2f7ab042edd30fa9af6237
-
SHA1
bb5787e864dc3f0a3048e81f5616cce66b3c4de5
-
SHA256
1a54390bf4f97eabc52bed5f3d698efb57ee285e789284993233c2a5db944d16
-
SHA512
9e921e113bdc269633caa8c044960147f94a6507c5e6d910a50d1c01d456aeb5e35cdc86c5aad7b4b247251ab161073e2a997394976168a889fea9f8e245f1f0
-
SSDEEP
24576:jGmAQCMjaSfT3qg/JdrKuWbOWVkebKcg1JR16SOqu5JogAOUbJN2rElKnKkzOF/Y:jG+CM2SfT3qgBQ241c4tP5JogAOUFN2N
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 3172 Tempcsrss.exe 1200 TempMicrosoft.exe 4868 System.exe 3084 csrss.exe -
Modifies Windows Firewall 1 TTPs 2 IoCs
pid Process 3040 netsh.exe 4328 netsh.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 1a54390bf4f97eabc52bed5f3d698efb57ee285e789284993233c2a5db944d16.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation TempMicrosoft.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation Tempcsrss.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\97335ed968c8d21501810d2516770677.exe csrss.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\97335ed968c8d21501810d2516770677.exe csrss.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\953466711bd850611a452323a9126aec.exe System.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\953466711bd850611a452323a9126aec.exe System.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\97335ed968c8d21501810d2516770677 = "\"C:\\Users\\Admin\\AppData\\Roaming\\csrss.exe\" .." csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\97335ed968c8d21501810d2516770677 = "\"C:\\Users\\Admin\\AppData\\Roaming\\csrss.exe\" .." csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\953466711bd850611a452323a9126aec = "\"C:\\Users\\Admin\\AppData\\Roaming\\System.exe\" .." System.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\953466711bd850611a452323a9126aec = "\"C:\\Users\\Admin\\AppData\\Roaming\\System.exe\" .." System.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 3084 csrss.exe 3084 csrss.exe 3084 csrss.exe 3084 csrss.exe 3084 csrss.exe 3084 csrss.exe 3084 csrss.exe 3084 csrss.exe 3084 csrss.exe 3084 csrss.exe 3084 csrss.exe 3084 csrss.exe 3084 csrss.exe 3084 csrss.exe 3084 csrss.exe 3084 csrss.exe 3084 csrss.exe 3084 csrss.exe 3084 csrss.exe 3084 csrss.exe 3084 csrss.exe 3084 csrss.exe 3084 csrss.exe 3084 csrss.exe 3084 csrss.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeDebugPrivilege 3172 Tempcsrss.exe Token: 33 3172 Tempcsrss.exe Token: SeIncBasePriorityPrivilege 3172 Tempcsrss.exe Token: SeDebugPrivilege 3084 csrss.exe Token: 33 3084 csrss.exe Token: SeIncBasePriorityPrivilege 3084 csrss.exe Token: SeDebugPrivilege 4868 System.exe Token: 33 4868 System.exe Token: SeIncBasePriorityPrivilege 4868 System.exe Token: 33 4868 System.exe Token: SeIncBasePriorityPrivilege 4868 System.exe Token: 33 4868 System.exe Token: SeIncBasePriorityPrivilege 4868 System.exe Token: 33 4868 System.exe Token: SeIncBasePriorityPrivilege 4868 System.exe Token: 33 4868 System.exe Token: SeIncBasePriorityPrivilege 4868 System.exe Token: 33 4868 System.exe Token: SeIncBasePriorityPrivilege 4868 System.exe Token: 33 4868 System.exe Token: SeIncBasePriorityPrivilege 4868 System.exe Token: 33 4868 System.exe Token: SeIncBasePriorityPrivilege 4868 System.exe Token: 33 4868 System.exe Token: SeIncBasePriorityPrivilege 4868 System.exe Token: 33 4868 System.exe Token: SeIncBasePriorityPrivilege 4868 System.exe Token: 33 4868 System.exe Token: SeIncBasePriorityPrivilege 4868 System.exe Token: 33 4868 System.exe Token: SeIncBasePriorityPrivilege 4868 System.exe Token: 33 4868 System.exe Token: SeIncBasePriorityPrivilege 4868 System.exe Token: 33 4868 System.exe Token: SeIncBasePriorityPrivilege 4868 System.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4636 wrote to memory of 3172 4636 1a54390bf4f97eabc52bed5f3d698efb57ee285e789284993233c2a5db944d16.exe 84 PID 4636 wrote to memory of 3172 4636 1a54390bf4f97eabc52bed5f3d698efb57ee285e789284993233c2a5db944d16.exe 84 PID 4636 wrote to memory of 3172 4636 1a54390bf4f97eabc52bed5f3d698efb57ee285e789284993233c2a5db944d16.exe 84 PID 4636 wrote to memory of 1200 4636 1a54390bf4f97eabc52bed5f3d698efb57ee285e789284993233c2a5db944d16.exe 85 PID 4636 wrote to memory of 1200 4636 1a54390bf4f97eabc52bed5f3d698efb57ee285e789284993233c2a5db944d16.exe 85 PID 4636 wrote to memory of 1200 4636 1a54390bf4f97eabc52bed5f3d698efb57ee285e789284993233c2a5db944d16.exe 85 PID 1200 wrote to memory of 4868 1200 TempMicrosoft.exe 86 PID 1200 wrote to memory of 4868 1200 TempMicrosoft.exe 86 PID 1200 wrote to memory of 4868 1200 TempMicrosoft.exe 86 PID 3172 wrote to memory of 3084 3172 Tempcsrss.exe 87 PID 3172 wrote to memory of 3084 3172 Tempcsrss.exe 87 PID 3172 wrote to memory of 3084 3172 Tempcsrss.exe 87 PID 4868 wrote to memory of 4328 4868 System.exe 90 PID 4868 wrote to memory of 4328 4868 System.exe 90 PID 4868 wrote to memory of 4328 4868 System.exe 90 PID 3084 wrote to memory of 3040 3084 csrss.exe 89 PID 3084 wrote to memory of 3040 3084 csrss.exe 89 PID 3084 wrote to memory of 3040 3084 csrss.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a54390bf4f97eabc52bed5f3d698efb57ee285e789284993233c2a5db944d16.exe"C:\Users\Admin\AppData\Local\Temp\1a54390bf4f97eabc52bed5f3d698efb57ee285e789284993233c2a5db944d16.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Users\Admin\AppData\Local\Tempcsrss.exe"C:\Users\Admin\AppData\Local\Tempcsrss.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Users\Admin\AppData\Roaming\csrss.exe"C:\Users\Admin\AppData\Roaming\csrss.exe"3⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\csrss.exe" "csrss.exe" ENABLE4⤵
- Modifies Windows Firewall
PID:3040
-
-
-
-
C:\Users\Admin\AppData\Local\TempMicrosoft.exe"C:\Users\Admin\AppData\Local\TempMicrosoft.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Roaming\System.exe"C:\Users\Admin\AppData\Roaming\System.exe"3⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\System.exe" "System.exe" ENABLE4⤵
- Modifies Windows Firewall
PID:4328
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
150KB
MD55f033a40a7dc81e791fa1c1f6b351b07
SHA13ce56b830072807c95db020eb8cf6798c8b7c8ee
SHA256014fba39ef2c96201dcd6cc30c3c703e69847d0f0bcd37e172943a645a07d67a
SHA512ab0f5723585b6f4f386cdd92752ee66fb4bf3725ae96d3d8287d344c09958bd46255b277bae9ecce50358dff7e95428f8cafcdd3ce614f86222ef131ed5b9f13
-
Filesize
150KB
MD55f033a40a7dc81e791fa1c1f6b351b07
SHA13ce56b830072807c95db020eb8cf6798c8b7c8ee
SHA256014fba39ef2c96201dcd6cc30c3c703e69847d0f0bcd37e172943a645a07d67a
SHA512ab0f5723585b6f4f386cdd92752ee66fb4bf3725ae96d3d8287d344c09958bd46255b277bae9ecce50358dff7e95428f8cafcdd3ce614f86222ef131ed5b9f13
-
Filesize
383KB
MD599f3b1120829755dc29ab8b0eaf765d1
SHA1d42ce27d894e71d6f00e5a6628e71ba80aaf0477
SHA25652ff931c18fe5a944d757e213708daead76cc212c7b1e748b16d2e1c656cfc4f
SHA512470d1b8a86d26ddf5814ca1db93c632a77df3ed96f64b1c36f421989630c8f90a4186224220b55bc95015145511191595bab4f0759a02c80fd44e43cb7ef6042
-
Filesize
383KB
MD599f3b1120829755dc29ab8b0eaf765d1
SHA1d42ce27d894e71d6f00e5a6628e71ba80aaf0477
SHA25652ff931c18fe5a944d757e213708daead76cc212c7b1e748b16d2e1c656cfc4f
SHA512470d1b8a86d26ddf5814ca1db93c632a77df3ed96f64b1c36f421989630c8f90a4186224220b55bc95015145511191595bab4f0759a02c80fd44e43cb7ef6042
-
Filesize
150KB
MD55f033a40a7dc81e791fa1c1f6b351b07
SHA13ce56b830072807c95db020eb8cf6798c8b7c8ee
SHA256014fba39ef2c96201dcd6cc30c3c703e69847d0f0bcd37e172943a645a07d67a
SHA512ab0f5723585b6f4f386cdd92752ee66fb4bf3725ae96d3d8287d344c09958bd46255b277bae9ecce50358dff7e95428f8cafcdd3ce614f86222ef131ed5b9f13
-
Filesize
150KB
MD55f033a40a7dc81e791fa1c1f6b351b07
SHA13ce56b830072807c95db020eb8cf6798c8b7c8ee
SHA256014fba39ef2c96201dcd6cc30c3c703e69847d0f0bcd37e172943a645a07d67a
SHA512ab0f5723585b6f4f386cdd92752ee66fb4bf3725ae96d3d8287d344c09958bd46255b277bae9ecce50358dff7e95428f8cafcdd3ce614f86222ef131ed5b9f13
-
Filesize
383KB
MD599f3b1120829755dc29ab8b0eaf765d1
SHA1d42ce27d894e71d6f00e5a6628e71ba80aaf0477
SHA25652ff931c18fe5a944d757e213708daead76cc212c7b1e748b16d2e1c656cfc4f
SHA512470d1b8a86d26ddf5814ca1db93c632a77df3ed96f64b1c36f421989630c8f90a4186224220b55bc95015145511191595bab4f0759a02c80fd44e43cb7ef6042
-
Filesize
383KB
MD599f3b1120829755dc29ab8b0eaf765d1
SHA1d42ce27d894e71d6f00e5a6628e71ba80aaf0477
SHA25652ff931c18fe5a944d757e213708daead76cc212c7b1e748b16d2e1c656cfc4f
SHA512470d1b8a86d26ddf5814ca1db93c632a77df3ed96f64b1c36f421989630c8f90a4186224220b55bc95015145511191595bab4f0759a02c80fd44e43cb7ef6042