Analysis
-
max time kernel
196s -
max time network
218s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 03:04
Static task
static1
Behavioral task
behavioral1
Sample
926957886ad95c2e5084776c7d2ee84daf1ce3930eafdab8138b3bf9d8edb45c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
926957886ad95c2e5084776c7d2ee84daf1ce3930eafdab8138b3bf9d8edb45c.exe
Resource
win10v2004-20220812-en
General
-
Target
926957886ad95c2e5084776c7d2ee84daf1ce3930eafdab8138b3bf9d8edb45c.exe
-
Size
228KB
-
MD5
2dc8df6240a9550c9b27a9a933a48d8d
-
SHA1
c102eaa3831a098b7802125c6b0e932ad78c8dba
-
SHA256
926957886ad95c2e5084776c7d2ee84daf1ce3930eafdab8138b3bf9d8edb45c
-
SHA512
0608a020dc5bd449320d2b317a658df5452a2bf7accddfa7d68abe377c2116ae6bc0ece9ec467e8d12e9d531fbf3c7c4f614d435b8c4fc359768fc73478acdde
-
SSDEEP
6144:Kmf3PFKs7aFwKWwalhrEqxF6snji81RUinKZHg/9F:KmfPhAmZIH+H
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 926957886ad95c2e5084776c7d2ee84daf1ce3930eafdab8138b3bf9d8edb45c.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" lgred.exe -
Executes dropped EXE 1 IoCs
pid Process 5004 lgred.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 926957886ad95c2e5084776c7d2ee84daf1ce3930eafdab8138b3bf9d8edb45c.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lgred = "C:\\Users\\Admin\\lgred.exe /k" lgred.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lgred = "C:\\Users\\Admin\\lgred.exe /y" lgred.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lgred = "C:\\Users\\Admin\\lgred.exe /i" lgred.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lgred = "C:\\Users\\Admin\\lgred.exe /g" lgred.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lgred = "C:\\Users\\Admin\\lgred.exe /p" lgred.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lgred = "C:\\Users\\Admin\\lgred.exe /u" lgred.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lgred = "C:\\Users\\Admin\\lgred.exe /j" lgred.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lgred = "C:\\Users\\Admin\\lgred.exe /s" lgred.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lgred = "C:\\Users\\Admin\\lgred.exe /e" lgred.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lgred = "C:\\Users\\Admin\\lgred.exe /b" lgred.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lgred = "C:\\Users\\Admin\\lgred.exe /m" lgred.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lgred = "C:\\Users\\Admin\\lgred.exe /r" lgred.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lgred = "C:\\Users\\Admin\\lgred.exe /f" lgred.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lgred = "C:\\Users\\Admin\\lgred.exe /o" lgred.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lgred = "C:\\Users\\Admin\\lgred.exe /l" lgred.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lgred = "C:\\Users\\Admin\\lgred.exe /t" 926957886ad95c2e5084776c7d2ee84daf1ce3930eafdab8138b3bf9d8edb45c.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lgred = "C:\\Users\\Admin\\lgred.exe /h" lgred.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lgred = "C:\\Users\\Admin\\lgred.exe /t" lgred.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lgred = "C:\\Users\\Admin\\lgred.exe /c" lgred.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 926957886ad95c2e5084776c7d2ee84daf1ce3930eafdab8138b3bf9d8edb45c.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lgred = "C:\\Users\\Admin\\lgred.exe /w" lgred.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lgred = "C:\\Users\\Admin\\lgred.exe /d" lgred.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lgred = "C:\\Users\\Admin\\lgred.exe /z" lgred.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lgred = "C:\\Users\\Admin\\lgred.exe /a" lgred.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lgred = "C:\\Users\\Admin\\lgred.exe /v" lgred.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lgred = "C:\\Users\\Admin\\lgred.exe /q" lgred.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lgred = "C:\\Users\\Admin\\lgred.exe /x" lgred.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ lgred.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lgred = "C:\\Users\\Admin\\lgred.exe /n" lgred.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2508 926957886ad95c2e5084776c7d2ee84daf1ce3930eafdab8138b3bf9d8edb45c.exe 2508 926957886ad95c2e5084776c7d2ee84daf1ce3930eafdab8138b3bf9d8edb45c.exe 5004 lgred.exe 5004 lgred.exe 5004 lgred.exe 5004 lgred.exe 5004 lgred.exe 5004 lgred.exe 5004 lgred.exe 5004 lgred.exe 5004 lgred.exe 5004 lgred.exe 5004 lgred.exe 5004 lgred.exe 5004 lgred.exe 5004 lgred.exe 5004 lgred.exe 5004 lgred.exe 5004 lgred.exe 5004 lgred.exe 5004 lgred.exe 5004 lgred.exe 5004 lgred.exe 5004 lgred.exe 5004 lgred.exe 5004 lgred.exe 5004 lgred.exe 5004 lgred.exe 5004 lgred.exe 5004 lgred.exe 5004 lgred.exe 5004 lgred.exe 5004 lgred.exe 5004 lgred.exe 5004 lgred.exe 5004 lgred.exe 5004 lgred.exe 5004 lgred.exe 5004 lgred.exe 5004 lgred.exe 5004 lgred.exe 5004 lgred.exe 5004 lgred.exe 5004 lgred.exe 5004 lgred.exe 5004 lgred.exe 5004 lgred.exe 5004 lgred.exe 5004 lgred.exe 5004 lgred.exe 5004 lgred.exe 5004 lgred.exe 5004 lgred.exe 5004 lgred.exe 5004 lgred.exe 5004 lgred.exe 5004 lgred.exe 5004 lgred.exe 5004 lgred.exe 5004 lgred.exe 5004 lgred.exe 5004 lgred.exe 5004 lgred.exe 5004 lgred.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2508 926957886ad95c2e5084776c7d2ee84daf1ce3930eafdab8138b3bf9d8edb45c.exe 5004 lgred.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2508 wrote to memory of 5004 2508 926957886ad95c2e5084776c7d2ee84daf1ce3930eafdab8138b3bf9d8edb45c.exe 79 PID 2508 wrote to memory of 5004 2508 926957886ad95c2e5084776c7d2ee84daf1ce3930eafdab8138b3bf9d8edb45c.exe 79 PID 2508 wrote to memory of 5004 2508 926957886ad95c2e5084776c7d2ee84daf1ce3930eafdab8138b3bf9d8edb45c.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\926957886ad95c2e5084776c7d2ee84daf1ce3930eafdab8138b3bf9d8edb45c.exe"C:\Users\Admin\AppData\Local\Temp\926957886ad95c2e5084776c7d2ee84daf1ce3930eafdab8138b3bf9d8edb45c.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Users\Admin\lgred.exe"C:\Users\Admin\lgred.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5004
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
228KB
MD5f64186805f4a37596ba7d0b7ff334101
SHA18c177aac225eac38985471ba9e4a1d381c8901e0
SHA2560c6d0ce21a5ff08ed9b99c408125fdab8019ca36de435fdd749b7ed569b5412b
SHA512ee8f438aef2692627028b744a05bac1067d28ec479e758aded39f13f50abfce081d0228ee5e98efcad87b404ca6a9892c895189524fa3e873f6c5b598272651d
-
Filesize
228KB
MD5f64186805f4a37596ba7d0b7ff334101
SHA18c177aac225eac38985471ba9e4a1d381c8901e0
SHA2560c6d0ce21a5ff08ed9b99c408125fdab8019ca36de435fdd749b7ed569b5412b
SHA512ee8f438aef2692627028b744a05bac1067d28ec479e758aded39f13f50abfce081d0228ee5e98efcad87b404ca6a9892c895189524fa3e873f6c5b598272651d