Analysis
-
max time kernel
157s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
28/11/2022, 01:09
Static task
static1
Behavioral task
behavioral1
Sample
021c586a2cd7d499d6ad5cf59e8f0d5d2babea0a061bb05e3ba07acd24adf8c0.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
021c586a2cd7d499d6ad5cf59e8f0d5d2babea0a061bb05e3ba07acd24adf8c0.exe
Resource
win10v2004-20220812-en
General
-
Target
021c586a2cd7d499d6ad5cf59e8f0d5d2babea0a061bb05e3ba07acd24adf8c0.exe
-
Size
68KB
-
MD5
a104334f091fba128807dcf115819720
-
SHA1
ab4dee275193e7a0f2a19f71cfc6d0f69692f424
-
SHA256
021c586a2cd7d499d6ad5cf59e8f0d5d2babea0a061bb05e3ba07acd24adf8c0
-
SHA512
bda7359cc600a26a40f252ff52f36a83605de71adef15c87c4a0fb4cfb5d2f2b1ae633b4549aceaedfa6a69101bdab32571bea2eb283f553a14ae2faf036e34e
-
SSDEEP
768:rdsv/UDO00cfykvw8qqOve3ZVrt2F0mv9PIKr5LQ6hZDyVYUv5m/668OWQHYNnds:qeO00cdVrMFjdF5L7hov5Ex4Br+KkCKT
Malware Config
Signatures
-
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt SP00LSV.EXE -
Executes dropped EXE 3 IoCs
pid Process 2828 winlog.exe 4836 SP00LSV.EXE 1860 SVCH0ST.EXE -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 021c586a2cd7d499d6ad5cf59e8f0d5d2babea0a061bb05e3ba07acd24adf8c0.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation winlog.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation SP00LSV.EXE -
Drops file in Windows directory 10 IoCs
description ioc Process File opened for modification C:\Windows\winlog.EXE 021c586a2cd7d499d6ad5cf59e8f0d5d2babea0a061bb05e3ba07acd24adf8c0.exe File created C:\Windows\SVCH0ST.EXE SP00LSV.EXE File created C:\Windows\Recycled.{645FF040-5081-101B-9F08-00AA002F954E}\winlog.EXE SP00LSV.EXE File opened for modification C:\Windows\Recycled.{645FF040-5081-101B-9F08-00AA002F954E}\winlog.EXE SP00LSV.EXE File created C:\Windows\Recycled.{645FF040-5081-101B-9F08-00AA002F954E}\system.exe SP00LSV.EXE File opened for modification C:\Windows\Recycled.{645FF040-5081-101B-9F08-00AA002F954E}\system.exe SP00LSV.EXE File opened for modification C:\Windows\Recycled.{645FF040-5081-101B-9F08-00AA002F954E} SP00LSV.EXE File created C:\Windows\winlog.EXE 021c586a2cd7d499d6ad5cf59e8f0d5d2babea0a061bb05e3ba07acd24adf8c0.exe File opened for modification C:\Windows\SVCH0ST.EXE SP00LSV.EXE File opened for modification C:\Windows\SP00LSV.EXE winlog.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shell\open\command SP00LSV.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shell SP00LSV.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shell\explore\ = "?????(&X) " SP00LSV.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inifile\shell\open\command SP00LSV.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command SP00LSV.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "C:\\Windows\\winlog.EXE %1" SP00LSV.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile SP00LSV.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt SP00LSV.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shell\explore SP00LSV.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\open\command SP00LSV.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\shell\open\command\ = "C:\\Windows\\winlog.EXE %1" SP00LSV.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\vbsfile\shell\open\command SP00LSV.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command\ = "C:\\Windows\\winlog.EXE %1" SP00LSV.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shell\open SP00LSV.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shell\open\command\ = "C:\\Windows\\winlog.EXE %1" SP00LSV.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inifile\shell\open\command\ = "C:\\Windows\\winlog.EXE %1" SP00LSV.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\shell\open\command SP00LSV.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\chm.file\shell\open\command SP00LSV.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shell\open\ = "??(&O) " SP00LSV.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shell\explore\command\ = "C:\\Windows\\winlog.EXE %1" SP00LSV.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shell\explore\command SP00LSV.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\open\command\ = "C:\\Windows\\winlog.EXE %1" SP00LSV.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive SP00LSV.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shell\ = "open" SP00LSV.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2828 winlog.exe 2828 winlog.exe 2828 winlog.exe 2828 winlog.exe 2828 winlog.exe 2828 winlog.exe 2828 winlog.exe 2828 winlog.exe 4836 SP00LSV.EXE 4836 SP00LSV.EXE 4836 SP00LSV.EXE 4836 SP00LSV.EXE 2828 winlog.exe 2828 winlog.exe 2828 winlog.exe 2828 winlog.exe 2828 winlog.exe 2828 winlog.exe 2828 winlog.exe 2828 winlog.exe 4836 SP00LSV.EXE 4836 SP00LSV.EXE 4836 SP00LSV.EXE 4836 SP00LSV.EXE 1860 SVCH0ST.EXE 1860 SVCH0ST.EXE 1860 SVCH0ST.EXE 1860 SVCH0ST.EXE 2828 winlog.exe 2828 winlog.exe 2828 winlog.exe 2828 winlog.exe 2828 winlog.exe 2828 winlog.exe 2828 winlog.exe 2828 winlog.exe 4836 SP00LSV.EXE 4836 SP00LSV.EXE 4836 SP00LSV.EXE 4836 SP00LSV.EXE 1860 SVCH0ST.EXE 1860 SVCH0ST.EXE 1860 SVCH0ST.EXE 1860 SVCH0ST.EXE 2828 winlog.exe 2828 winlog.exe 2828 winlog.exe 2828 winlog.exe 4836 SP00LSV.EXE 4836 SP00LSV.EXE 4836 SP00LSV.EXE 4836 SP00LSV.EXE 1860 SVCH0ST.EXE 1860 SVCH0ST.EXE 1860 SVCH0ST.EXE 1860 SVCH0ST.EXE 2828 winlog.exe 2828 winlog.exe 2828 winlog.exe 2828 winlog.exe 2828 winlog.exe 2828 winlog.exe 2828 winlog.exe 2828 winlog.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4836 SP00LSV.EXE -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4748 021c586a2cd7d499d6ad5cf59e8f0d5d2babea0a061bb05e3ba07acd24adf8c0.exe 2828 winlog.exe 4836 SP00LSV.EXE 1860 SVCH0ST.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4748 wrote to memory of 2828 4748 021c586a2cd7d499d6ad5cf59e8f0d5d2babea0a061bb05e3ba07acd24adf8c0.exe 80 PID 4748 wrote to memory of 2828 4748 021c586a2cd7d499d6ad5cf59e8f0d5d2babea0a061bb05e3ba07acd24adf8c0.exe 80 PID 4748 wrote to memory of 2828 4748 021c586a2cd7d499d6ad5cf59e8f0d5d2babea0a061bb05e3ba07acd24adf8c0.exe 80 PID 2828 wrote to memory of 4836 2828 winlog.exe 81 PID 2828 wrote to memory of 4836 2828 winlog.exe 81 PID 2828 wrote to memory of 4836 2828 winlog.exe 81 PID 4836 wrote to memory of 1860 4836 SP00LSV.EXE 82 PID 4836 wrote to memory of 1860 4836 SP00LSV.EXE 82 PID 4836 wrote to memory of 1860 4836 SP00LSV.EXE 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\021c586a2cd7d499d6ad5cf59e8f0d5d2babea0a061bb05e3ba07acd24adf8c0.exe"C:\Users\Admin\AppData\Local\Temp\021c586a2cd7d499d6ad5cf59e8f0d5d2babea0a061bb05e3ba07acd24adf8c0.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Windows\winlog.exe"C:\Windows\winlog.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SP00LSV.EXE"C:\Windows\SP00LSV.EXE"3⤵
- Modifies system executable filetype association
- Executes dropped EXE
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Windows\SVCH0ST.EXE"C:\Windows\SVCH0ST.EXE"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1860
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD5836d2fa36f768019167b6ac48f58bdad
SHA19e5ed6d4c78c64a09c8c1804f0c68ae0b225ad1b
SHA2569b387db163f089f6ed9700a96c49899edf59d20a2215d9e4970601eb905f2c72
SHA512774563e0d923f2dffa82b7f14d07bf318b7845398aa384d8a278693a67cf548754c3288e92a4f5d339aecc90484e6a87b0eea7abf59a89918cc37148edb8a102
-
Filesize
19KB
MD5836d2fa36f768019167b6ac48f58bdad
SHA19e5ed6d4c78c64a09c8c1804f0c68ae0b225ad1b
SHA2569b387db163f089f6ed9700a96c49899edf59d20a2215d9e4970601eb905f2c72
SHA512774563e0d923f2dffa82b7f14d07bf318b7845398aa384d8a278693a67cf548754c3288e92a4f5d339aecc90484e6a87b0eea7abf59a89918cc37148edb8a102
-
Filesize
19KB
MD5836d2fa36f768019167b6ac48f58bdad
SHA19e5ed6d4c78c64a09c8c1804f0c68ae0b225ad1b
SHA2569b387db163f089f6ed9700a96c49899edf59d20a2215d9e4970601eb905f2c72
SHA512774563e0d923f2dffa82b7f14d07bf318b7845398aa384d8a278693a67cf548754c3288e92a4f5d339aecc90484e6a87b0eea7abf59a89918cc37148edb8a102
-
Filesize
19KB
MD5836d2fa36f768019167b6ac48f58bdad
SHA19e5ed6d4c78c64a09c8c1804f0c68ae0b225ad1b
SHA2569b387db163f089f6ed9700a96c49899edf59d20a2215d9e4970601eb905f2c72
SHA512774563e0d923f2dffa82b7f14d07bf318b7845398aa384d8a278693a67cf548754c3288e92a4f5d339aecc90484e6a87b0eea7abf59a89918cc37148edb8a102
-
Filesize
68KB
MD5a104334f091fba128807dcf115819720
SHA1ab4dee275193e7a0f2a19f71cfc6d0f69692f424
SHA256021c586a2cd7d499d6ad5cf59e8f0d5d2babea0a061bb05e3ba07acd24adf8c0
SHA512bda7359cc600a26a40f252ff52f36a83605de71adef15c87c4a0fb4cfb5d2f2b1ae633b4549aceaedfa6a69101bdab32571bea2eb283f553a14ae2faf036e34e
-
Filesize
68KB
MD5a104334f091fba128807dcf115819720
SHA1ab4dee275193e7a0f2a19f71cfc6d0f69692f424
SHA256021c586a2cd7d499d6ad5cf59e8f0d5d2babea0a061bb05e3ba07acd24adf8c0
SHA512bda7359cc600a26a40f252ff52f36a83605de71adef15c87c4a0fb4cfb5d2f2b1ae633b4549aceaedfa6a69101bdab32571bea2eb283f553a14ae2faf036e34e