Analysis
-
max time kernel
152s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 08:55
Static task
static1
Behavioral task
behavioral1
Sample
59d5e4f982621299e1f80fcabd0439f4a1dc6b8c6072c71fa7a6af34c220c761.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
59d5e4f982621299e1f80fcabd0439f4a1dc6b8c6072c71fa7a6af34c220c761.exe
Resource
win10v2004-20220812-en
General
-
Target
59d5e4f982621299e1f80fcabd0439f4a1dc6b8c6072c71fa7a6af34c220c761.exe
-
Size
61KB
-
MD5
2580de40d6e84cf1fc95c52924a55090
-
SHA1
38b010e0c2a83f2698d3a61a1ec9fc52e632471f
-
SHA256
59d5e4f982621299e1f80fcabd0439f4a1dc6b8c6072c71fa7a6af34c220c761
-
SHA512
c4ecfd87d99c01c2d3091002428faf469b02342fe4fe02e3fe090d86e4857fb3f3195bf338007d815b5a148b92cdad826f9414a6ac3552ff96c6eced38950e12
-
SSDEEP
1536:/Wud/0Igp1yctpQUSrQiyOcfI1J09BtnlkCVo+KsJGUp:/Jd/0Im3I1KBtlro+KsJGUp
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3160 Kaspersky PURE 3.0.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2704 netsh.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 59d5e4f982621299e1f80fcabd0439f4a1dc6b8c6072c71fa7a6af34c220c761.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation Kaspersky PURE 3.0.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\45868937efb3874ef449c2eb957e5091.exe Kaspersky PURE 3.0.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\45868937efb3874ef449c2eb957e5091.exe Kaspersky PURE 3.0.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\45868937efb3874ef449c2eb957e5091 = "\"C:\\ProgramData\\Kaspersky PURE 3.0.exe\" .." Kaspersky PURE 3.0.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\45868937efb3874ef449c2eb957e5091 = "\"C:\\ProgramData\\Kaspersky PURE 3.0.exe\" .." Kaspersky PURE 3.0.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\windows\system32\s4c.vbs 59d5e4f982621299e1f80fcabd0439f4a1dc6b8c6072c71fa7a6af34c220c761.exe File created C:\windows\system32\s4c.vbs Kaspersky PURE 3.0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings Kaspersky PURE 3.0.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 59d5e4f982621299e1f80fcabd0439f4a1dc6b8c6072c71fa7a6af34c220c761.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 4868 59d5e4f982621299e1f80fcabd0439f4a1dc6b8c6072c71fa7a6af34c220c761.exe 4868 59d5e4f982621299e1f80fcabd0439f4a1dc6b8c6072c71fa7a6af34c220c761.exe 4868 59d5e4f982621299e1f80fcabd0439f4a1dc6b8c6072c71fa7a6af34c220c761.exe 4868 59d5e4f982621299e1f80fcabd0439f4a1dc6b8c6072c71fa7a6af34c220c761.exe 4868 59d5e4f982621299e1f80fcabd0439f4a1dc6b8c6072c71fa7a6af34c220c761.exe 3160 Kaspersky PURE 3.0.exe 3160 Kaspersky PURE 3.0.exe 3160 Kaspersky PURE 3.0.exe 3160 Kaspersky PURE 3.0.exe 3160 Kaspersky PURE 3.0.exe 3160 Kaspersky PURE 3.0.exe 3160 Kaspersky PURE 3.0.exe 3160 Kaspersky PURE 3.0.exe 3160 Kaspersky PURE 3.0.exe 3160 Kaspersky PURE 3.0.exe 3160 Kaspersky PURE 3.0.exe 3160 Kaspersky PURE 3.0.exe 3160 Kaspersky PURE 3.0.exe 3160 Kaspersky PURE 3.0.exe 3160 Kaspersky PURE 3.0.exe 3160 Kaspersky PURE 3.0.exe 3160 Kaspersky PURE 3.0.exe 3160 Kaspersky PURE 3.0.exe 3160 Kaspersky PURE 3.0.exe 3160 Kaspersky PURE 3.0.exe 3160 Kaspersky PURE 3.0.exe 3160 Kaspersky PURE 3.0.exe 3160 Kaspersky PURE 3.0.exe 3160 Kaspersky PURE 3.0.exe 3160 Kaspersky PURE 3.0.exe 3160 Kaspersky PURE 3.0.exe 3160 Kaspersky PURE 3.0.exe 3160 Kaspersky PURE 3.0.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4868 59d5e4f982621299e1f80fcabd0439f4a1dc6b8c6072c71fa7a6af34c220c761.exe Token: SeDebugPrivilege 3160 Kaspersky PURE 3.0.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4868 wrote to memory of 4240 4868 59d5e4f982621299e1f80fcabd0439f4a1dc6b8c6072c71fa7a6af34c220c761.exe 81 PID 4868 wrote to memory of 4240 4868 59d5e4f982621299e1f80fcabd0439f4a1dc6b8c6072c71fa7a6af34c220c761.exe 81 PID 4868 wrote to memory of 3160 4868 59d5e4f982621299e1f80fcabd0439f4a1dc6b8c6072c71fa7a6af34c220c761.exe 83 PID 4868 wrote to memory of 3160 4868 59d5e4f982621299e1f80fcabd0439f4a1dc6b8c6072c71fa7a6af34c220c761.exe 83 PID 3160 wrote to memory of 4548 3160 Kaspersky PURE 3.0.exe 84 PID 3160 wrote to memory of 4548 3160 Kaspersky PURE 3.0.exe 84 PID 3160 wrote to memory of 2704 3160 Kaspersky PURE 3.0.exe 85 PID 3160 wrote to memory of 2704 3160 Kaspersky PURE 3.0.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\59d5e4f982621299e1f80fcabd0439f4a1dc6b8c6072c71fa7a6af34c220c761.exe"C:\Users\Admin\AppData\Local\Temp\59d5e4f982621299e1f80fcabd0439f4a1dc6b8c6072c71fa7a6af34c220c761.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\windows\system32\s4c.vbs"2⤵PID:4240
-
-
C:\ProgramData\Kaspersky PURE 3.0.exe"C:\ProgramData\Kaspersky PURE 3.0.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\windows\system32\s4c.vbs"3⤵PID:4548
-
-
C:\Windows\SYSTEM32\netsh.exenetsh firewall add allowedprogram "C:\ProgramData\Kaspersky PURE 3.0.exe" "Kaspersky PURE 3.0.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:2704
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD52580de40d6e84cf1fc95c52924a55090
SHA138b010e0c2a83f2698d3a61a1ec9fc52e632471f
SHA25659d5e4f982621299e1f80fcabd0439f4a1dc6b8c6072c71fa7a6af34c220c761
SHA512c4ecfd87d99c01c2d3091002428faf469b02342fe4fe02e3fe090d86e4857fb3f3195bf338007d815b5a148b92cdad826f9414a6ac3552ff96c6eced38950e12
-
Filesize
61KB
MD52580de40d6e84cf1fc95c52924a55090
SHA138b010e0c2a83f2698d3a61a1ec9fc52e632471f
SHA25659d5e4f982621299e1f80fcabd0439f4a1dc6b8c6072c71fa7a6af34c220c761
SHA512c4ecfd87d99c01c2d3091002428faf469b02342fe4fe02e3fe090d86e4857fb3f3195bf338007d815b5a148b92cdad826f9414a6ac3552ff96c6eced38950e12