Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2022 02:13
Static task
static1
Behavioral task
behavioral1
Sample
a5804a09b689daffd0be303f2cdaa95d880bf5dc7a203ee3048cd0585e13f1e1.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a5804a09b689daffd0be303f2cdaa95d880bf5dc7a203ee3048cd0585e13f1e1.exe
Resource
win10v2004-20220901-en
General
-
Target
a5804a09b689daffd0be303f2cdaa95d880bf5dc7a203ee3048cd0585e13f1e1.exe
-
Size
1.3MB
-
MD5
45b2f5034b07d3738a3ddaa9f1307df5
-
SHA1
cd608158817d7a2ebb957f36103d2206fd415f16
-
SHA256
a5804a09b689daffd0be303f2cdaa95d880bf5dc7a203ee3048cd0585e13f1e1
-
SHA512
94208c685120ae40cfbac2ae2996612b8a1c6abf827edfacdaa238c5bb4e57f1b2f5a5ea937731774b20dfe49305fc5e2aca5bf74a14c1753101405ea41ab1f4
-
SSDEEP
3072:qXJCFRSt63wPwWYhVTjJ5cHymR7w0YmS8O:LdnWYD95z4w0Dt
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
pid Process 4700 winlogon.exe 3688 winlogon.exe 2600 winlogon.exe 4876 winlogon.exe 1836 winlogon.exe -
resource yara_rule behavioral2/memory/1664-134-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/1664-136-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/1664-137-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/1664-140-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/1664-144-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/3688-154-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/3688-158-0x0000000000400000-0x000000000041C000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation a5804a09b689daffd0be303f2cdaa95d880bf5dc7a203ee3048cd0585e13f1e1.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 3404 set thread context of 1664 3404 a5804a09b689daffd0be303f2cdaa95d880bf5dc7a203ee3048cd0585e13f1e1.exe 82 PID 4700 set thread context of 3688 4700 winlogon.exe 86 PID 3688 set thread context of 2600 3688 winlogon.exe 87 PID 3688 set thread context of 4876 3688 winlogon.exe 96 PID 3688 set thread context of 1836 3688 winlogon.exe 101 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 3716 2600 WerFault.exe 87 2940 4876 WerFault.exe 96 4480 1836 WerFault.exe 101 -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1664 a5804a09b689daffd0be303f2cdaa95d880bf5dc7a203ee3048cd0585e13f1e1.exe 3688 winlogon.exe -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 3404 wrote to memory of 636 3404 a5804a09b689daffd0be303f2cdaa95d880bf5dc7a203ee3048cd0585e13f1e1.exe 81 PID 3404 wrote to memory of 636 3404 a5804a09b689daffd0be303f2cdaa95d880bf5dc7a203ee3048cd0585e13f1e1.exe 81 PID 3404 wrote to memory of 636 3404 a5804a09b689daffd0be303f2cdaa95d880bf5dc7a203ee3048cd0585e13f1e1.exe 81 PID 3404 wrote to memory of 1664 3404 a5804a09b689daffd0be303f2cdaa95d880bf5dc7a203ee3048cd0585e13f1e1.exe 82 PID 3404 wrote to memory of 1664 3404 a5804a09b689daffd0be303f2cdaa95d880bf5dc7a203ee3048cd0585e13f1e1.exe 82 PID 3404 wrote to memory of 1664 3404 a5804a09b689daffd0be303f2cdaa95d880bf5dc7a203ee3048cd0585e13f1e1.exe 82 PID 3404 wrote to memory of 1664 3404 a5804a09b689daffd0be303f2cdaa95d880bf5dc7a203ee3048cd0585e13f1e1.exe 82 PID 3404 wrote to memory of 1664 3404 a5804a09b689daffd0be303f2cdaa95d880bf5dc7a203ee3048cd0585e13f1e1.exe 82 PID 3404 wrote to memory of 1664 3404 a5804a09b689daffd0be303f2cdaa95d880bf5dc7a203ee3048cd0585e13f1e1.exe 82 PID 3404 wrote to memory of 1664 3404 a5804a09b689daffd0be303f2cdaa95d880bf5dc7a203ee3048cd0585e13f1e1.exe 82 PID 3404 wrote to memory of 1664 3404 a5804a09b689daffd0be303f2cdaa95d880bf5dc7a203ee3048cd0585e13f1e1.exe 82 PID 1664 wrote to memory of 4700 1664 a5804a09b689daffd0be303f2cdaa95d880bf5dc7a203ee3048cd0585e13f1e1.exe 84 PID 1664 wrote to memory of 4700 1664 a5804a09b689daffd0be303f2cdaa95d880bf5dc7a203ee3048cd0585e13f1e1.exe 84 PID 1664 wrote to memory of 4700 1664 a5804a09b689daffd0be303f2cdaa95d880bf5dc7a203ee3048cd0585e13f1e1.exe 84 PID 4700 wrote to memory of 3148 4700 winlogon.exe 85 PID 4700 wrote to memory of 3148 4700 winlogon.exe 85 PID 4700 wrote to memory of 3148 4700 winlogon.exe 85 PID 4700 wrote to memory of 3688 4700 winlogon.exe 86 PID 4700 wrote to memory of 3688 4700 winlogon.exe 86 PID 4700 wrote to memory of 3688 4700 winlogon.exe 86 PID 4700 wrote to memory of 3688 4700 winlogon.exe 86 PID 4700 wrote to memory of 3688 4700 winlogon.exe 86 PID 4700 wrote to memory of 3688 4700 winlogon.exe 86 PID 4700 wrote to memory of 3688 4700 winlogon.exe 86 PID 4700 wrote to memory of 3688 4700 winlogon.exe 86 PID 3688 wrote to memory of 2600 3688 winlogon.exe 87 PID 3688 wrote to memory of 2600 3688 winlogon.exe 87 PID 3688 wrote to memory of 2600 3688 winlogon.exe 87 PID 3688 wrote to memory of 2600 3688 winlogon.exe 87 PID 3688 wrote to memory of 2600 3688 winlogon.exe 87 PID 3688 wrote to memory of 2600 3688 winlogon.exe 87 PID 3688 wrote to memory of 2600 3688 winlogon.exe 87 PID 3688 wrote to memory of 2600 3688 winlogon.exe 87 PID 3688 wrote to memory of 4876 3688 winlogon.exe 96 PID 3688 wrote to memory of 4876 3688 winlogon.exe 96 PID 3688 wrote to memory of 4876 3688 winlogon.exe 96 PID 3688 wrote to memory of 4876 3688 winlogon.exe 96 PID 3688 wrote to memory of 4876 3688 winlogon.exe 96 PID 3688 wrote to memory of 4876 3688 winlogon.exe 96 PID 3688 wrote to memory of 4876 3688 winlogon.exe 96 PID 3688 wrote to memory of 4876 3688 winlogon.exe 96 PID 3688 wrote to memory of 1836 3688 winlogon.exe 101 PID 3688 wrote to memory of 1836 3688 winlogon.exe 101 PID 3688 wrote to memory of 1836 3688 winlogon.exe 101 PID 3688 wrote to memory of 1836 3688 winlogon.exe 101 PID 3688 wrote to memory of 1836 3688 winlogon.exe 101 PID 3688 wrote to memory of 1836 3688 winlogon.exe 101 PID 3688 wrote to memory of 1836 3688 winlogon.exe 101 PID 3688 wrote to memory of 1836 3688 winlogon.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5804a09b689daffd0be303f2cdaa95d880bf5dc7a203ee3048cd0585e13f1e1.exe"C:\Users\Admin\AppData\Local\Temp\a5804a09b689daffd0be303f2cdaa95d880bf5dc7a203ee3048cd0585e13f1e1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\\svchost.exe2⤵PID:636
-
-
C:\Users\Admin\AppData\Local\Temp\a5804a09b689daffd0be303f2cdaa95d880bf5dc7a203ee3048cd0585e13f1e1.exe
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\\svchost.exe4⤵PID:3148
-
-
C:\Users\Admin\E696D64614\winlogon.exe
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"5⤵
- Executes dropped EXE
PID:2600 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2600 -s 126⤵
- Program crash
PID:3716
-
-
-
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"5⤵
- Executes dropped EXE
PID:4876 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 126⤵
- Program crash
PID:2940
-
-
-
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"5⤵
- Executes dropped EXE
PID:1836 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1836 -s 126⤵
- Program crash
PID:4480
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2600 -ip 26001⤵PID:912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4876 -ip 48761⤵PID:4872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1836 -ip 18361⤵PID:4204
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD545b2f5034b07d3738a3ddaa9f1307df5
SHA1cd608158817d7a2ebb957f36103d2206fd415f16
SHA256a5804a09b689daffd0be303f2cdaa95d880bf5dc7a203ee3048cd0585e13f1e1
SHA51294208c685120ae40cfbac2ae2996612b8a1c6abf827edfacdaa238c5bb4e57f1b2f5a5ea937731774b20dfe49305fc5e2aca5bf74a14c1753101405ea41ab1f4
-
Filesize
1.3MB
MD545b2f5034b07d3738a3ddaa9f1307df5
SHA1cd608158817d7a2ebb957f36103d2206fd415f16
SHA256a5804a09b689daffd0be303f2cdaa95d880bf5dc7a203ee3048cd0585e13f1e1
SHA51294208c685120ae40cfbac2ae2996612b8a1c6abf827edfacdaa238c5bb4e57f1b2f5a5ea937731774b20dfe49305fc5e2aca5bf74a14c1753101405ea41ab1f4
-
Filesize
1.3MB
MD545b2f5034b07d3738a3ddaa9f1307df5
SHA1cd608158817d7a2ebb957f36103d2206fd415f16
SHA256a5804a09b689daffd0be303f2cdaa95d880bf5dc7a203ee3048cd0585e13f1e1
SHA51294208c685120ae40cfbac2ae2996612b8a1c6abf827edfacdaa238c5bb4e57f1b2f5a5ea937731774b20dfe49305fc5e2aca5bf74a14c1753101405ea41ab1f4
-
Filesize
1.3MB
MD545b2f5034b07d3738a3ddaa9f1307df5
SHA1cd608158817d7a2ebb957f36103d2206fd415f16
SHA256a5804a09b689daffd0be303f2cdaa95d880bf5dc7a203ee3048cd0585e13f1e1
SHA51294208c685120ae40cfbac2ae2996612b8a1c6abf827edfacdaa238c5bb4e57f1b2f5a5ea937731774b20dfe49305fc5e2aca5bf74a14c1753101405ea41ab1f4
-
Filesize
1.3MB
MD545b2f5034b07d3738a3ddaa9f1307df5
SHA1cd608158817d7a2ebb957f36103d2206fd415f16
SHA256a5804a09b689daffd0be303f2cdaa95d880bf5dc7a203ee3048cd0585e13f1e1
SHA51294208c685120ae40cfbac2ae2996612b8a1c6abf827edfacdaa238c5bb4e57f1b2f5a5ea937731774b20dfe49305fc5e2aca5bf74a14c1753101405ea41ab1f4
-
Filesize
1.3MB
MD545b2f5034b07d3738a3ddaa9f1307df5
SHA1cd608158817d7a2ebb957f36103d2206fd415f16
SHA256a5804a09b689daffd0be303f2cdaa95d880bf5dc7a203ee3048cd0585e13f1e1
SHA51294208c685120ae40cfbac2ae2996612b8a1c6abf827edfacdaa238c5bb4e57f1b2f5a5ea937731774b20dfe49305fc5e2aca5bf74a14c1753101405ea41ab1f4