Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 14:28
Static task
static1
Behavioral task
behavioral1
Sample
0ad20a03e235011e396a944aa0d0d0e88d5f2b026585efb51eb669dcc0b85f56.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0ad20a03e235011e396a944aa0d0d0e88d5f2b026585efb51eb669dcc0b85f56.exe
Resource
win10v2004-20220812-en
General
-
Target
0ad20a03e235011e396a944aa0d0d0e88d5f2b026585efb51eb669dcc0b85f56.exe
-
Size
613KB
-
MD5
7cbee96532ee3feb095ec7c46611939c
-
SHA1
11010f8e39f282f4a70fea98621d84bffba169bb
-
SHA256
0ad20a03e235011e396a944aa0d0d0e88d5f2b026585efb51eb669dcc0b85f56
-
SHA512
e27d13c7aa93eae3f788f38a74f13de89a7592f3acc1b7857dfefdc31bf4f4e43f18467fff0cc0908e1db426e6638765fb8abb875add13392c520a35b6172c29
-
SSDEEP
12288:k1dlZo5yydIUiK33SicQsrit6XmSw/65btLM23ny/ILqun/RSUiKa8Ik81dit6J3:k1dlZo5biKSic26X3w/65bt93NLXiKaT
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2696 WindowsApplication11.exe 2448 systam 32.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 560 netsh.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 0ad20a03e235011e396a944aa0d0d0e88d5f2b026585efb51eb669dcc0b85f56.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation WindowsApplication11.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\6478165697df5354950888dc469d5c53 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\systam 32.exe\" .." systam 32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\6478165697df5354950888dc469d5c53 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\systam 32.exe\" .." systam 32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeDebugPrivilege 2448 systam 32.exe Token: 33 2448 systam 32.exe Token: SeIncBasePriorityPrivilege 2448 systam 32.exe Token: 33 2448 systam 32.exe Token: SeIncBasePriorityPrivilege 2448 systam 32.exe Token: 33 2448 systam 32.exe Token: SeIncBasePriorityPrivilege 2448 systam 32.exe Token: 33 2448 systam 32.exe Token: SeIncBasePriorityPrivilege 2448 systam 32.exe Token: 33 2448 systam 32.exe Token: SeIncBasePriorityPrivilege 2448 systam 32.exe Token: 33 2448 systam 32.exe Token: SeIncBasePriorityPrivilege 2448 systam 32.exe Token: 33 2448 systam 32.exe Token: SeIncBasePriorityPrivilege 2448 systam 32.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3208 wrote to memory of 2696 3208 0ad20a03e235011e396a944aa0d0d0e88d5f2b026585efb51eb669dcc0b85f56.exe 82 PID 3208 wrote to memory of 2696 3208 0ad20a03e235011e396a944aa0d0d0e88d5f2b026585efb51eb669dcc0b85f56.exe 82 PID 3208 wrote to memory of 2696 3208 0ad20a03e235011e396a944aa0d0d0e88d5f2b026585efb51eb669dcc0b85f56.exe 82 PID 2696 wrote to memory of 2448 2696 WindowsApplication11.exe 85 PID 2696 wrote to memory of 2448 2696 WindowsApplication11.exe 85 PID 2696 wrote to memory of 2448 2696 WindowsApplication11.exe 85 PID 2448 wrote to memory of 560 2448 systam 32.exe 86 PID 2448 wrote to memory of 560 2448 systam 32.exe 86 PID 2448 wrote to memory of 560 2448 systam 32.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ad20a03e235011e396a944aa0d0d0e88d5f2b026585efb51eb669dcc0b85f56.exe"C:\Users\Admin\AppData\Local\Temp\0ad20a03e235011e396a944aa0d0d0e88d5f2b026585efb51eb669dcc0b85f56.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Extracted\WindowsApplication11.exe"C:\Extracted\WindowsApplication11.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\systam 32.exe"C:\Users\Admin\AppData\Local\Temp\systam 32.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\systam 32.exe" "systam 32.exe" ENABLE4⤵
- Modifies Windows Firewall
PID:560
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
265KB
MD5c8e1fc8569b113172641b706f98cab73
SHA1f14faa4eb19131034823b196f1b590d61eb7ebd3
SHA2566f6269c676b56c3e24f8b38fd3dd3b0cbb1bc9b0fa9e9ceb608c2ebc5a65aeba
SHA512123d1145dad17af1ff5621ded86cd1ce1a74cce4c81c27ac3470f3f400c9c3d620c1a32bfb122fb1b3c2246972e90330090c6748366cb08e8a24d7d7a6bf632e
-
Filesize
265KB
MD5c8e1fc8569b113172641b706f98cab73
SHA1f14faa4eb19131034823b196f1b590d61eb7ebd3
SHA2566f6269c676b56c3e24f8b38fd3dd3b0cbb1bc9b0fa9e9ceb608c2ebc5a65aeba
SHA512123d1145dad17af1ff5621ded86cd1ce1a74cce4c81c27ac3470f3f400c9c3d620c1a32bfb122fb1b3c2246972e90330090c6748366cb08e8a24d7d7a6bf632e
-
Filesize
265KB
MD5c8e1fc8569b113172641b706f98cab73
SHA1f14faa4eb19131034823b196f1b590d61eb7ebd3
SHA2566f6269c676b56c3e24f8b38fd3dd3b0cbb1bc9b0fa9e9ceb608c2ebc5a65aeba
SHA512123d1145dad17af1ff5621ded86cd1ce1a74cce4c81c27ac3470f3f400c9c3d620c1a32bfb122fb1b3c2246972e90330090c6748366cb08e8a24d7d7a6bf632e
-
Filesize
265KB
MD5c8e1fc8569b113172641b706f98cab73
SHA1f14faa4eb19131034823b196f1b590d61eb7ebd3
SHA2566f6269c676b56c3e24f8b38fd3dd3b0cbb1bc9b0fa9e9ceb608c2ebc5a65aeba
SHA512123d1145dad17af1ff5621ded86cd1ce1a74cce4c81c27ac3470f3f400c9c3d620c1a32bfb122fb1b3c2246972e90330090c6748366cb08e8a24d7d7a6bf632e