Analysis
-
max time kernel
210s -
max time network
194s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2022 02:15
Static task
static1
Behavioral task
behavioral1
Sample
823d030488572436d740282a5c790910bf455775c52fc25c0278072357d3900c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
823d030488572436d740282a5c790910bf455775c52fc25c0278072357d3900c.exe
Resource
win10v2004-20221111-en
General
-
Target
823d030488572436d740282a5c790910bf455775c52fc25c0278072357d3900c.exe
-
Size
3.8MB
-
MD5
5f6ae7b2a016eee0ecd4a54ece4fce6f
-
SHA1
6a74cd7a9d86ef77fe21d48f2db8420421920687
-
SHA256
823d030488572436d740282a5c790910bf455775c52fc25c0278072357d3900c
-
SHA512
2946bd1a8fa22d9070f72ee72d68092e05d71171422bdd2bf1f8684fdb9b0c480e62b446667b9b742b617d61d4f9c61b905d7388b7d0da989fe7f38ea6ff4c07
-
SSDEEP
98304:ourAMjG8MOqNwo0cObEOunNsUL7zPfU9+B2ilyL5:jPP6GcObERNfLXs9+BLq
Malware Config
Signatures
-
Executes dropped EXE 13 IoCs
pid Process 4072 setup-4.9.4.exe 4668 infektor.exe 764 setup-4.9.4.tmp 4808 wnr230.exe 924 wnr230.exe 4196 wnr230.exe 4596 wnr230.exe 4008 wnr230.exe 2192 wnr230.exe 628 wnr230.exe 1520 wnr230.exe 1736 wnr230.exe 4208 wnr230.exe -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation wnr230.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation wnr230.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation 823d030488572436d740282a5c790910bf455775c52fc25c0278072357d3900c.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation infektor.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation wnr230.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation wnr230.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wnr230.exe infektor.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wnr230.exe infektor.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4196 wnr230.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 1764 wrote to memory of 4072 1764 823d030488572436d740282a5c790910bf455775c52fc25c0278072357d3900c.exe 87 PID 1764 wrote to memory of 4072 1764 823d030488572436d740282a5c790910bf455775c52fc25c0278072357d3900c.exe 87 PID 1764 wrote to memory of 4072 1764 823d030488572436d740282a5c790910bf455775c52fc25c0278072357d3900c.exe 87 PID 1764 wrote to memory of 4668 1764 823d030488572436d740282a5c790910bf455775c52fc25c0278072357d3900c.exe 89 PID 1764 wrote to memory of 4668 1764 823d030488572436d740282a5c790910bf455775c52fc25c0278072357d3900c.exe 89 PID 1764 wrote to memory of 4668 1764 823d030488572436d740282a5c790910bf455775c52fc25c0278072357d3900c.exe 89 PID 4072 wrote to memory of 764 4072 setup-4.9.4.exe 90 PID 4072 wrote to memory of 764 4072 setup-4.9.4.exe 90 PID 4072 wrote to memory of 764 4072 setup-4.9.4.exe 90 PID 4668 wrote to memory of 4808 4668 infektor.exe 91 PID 4668 wrote to memory of 4808 4668 infektor.exe 91 PID 4668 wrote to memory of 4808 4668 infektor.exe 91 PID 4808 wrote to memory of 924 4808 wnr230.exe 92 PID 4808 wrote to memory of 924 4808 wnr230.exe 92 PID 4808 wrote to memory of 924 4808 wnr230.exe 92 PID 4808 wrote to memory of 4196 4808 wnr230.exe 93 PID 4808 wrote to memory of 4196 4808 wnr230.exe 93 PID 4808 wrote to memory of 4196 4808 wnr230.exe 93 PID 4808 wrote to memory of 4596 4808 wnr230.exe 94 PID 4808 wrote to memory of 4596 4808 wnr230.exe 94 PID 4808 wrote to memory of 4596 4808 wnr230.exe 94 PID 4808 wrote to memory of 4008 4808 wnr230.exe 95 PID 4808 wrote to memory of 4008 4808 wnr230.exe 95 PID 4808 wrote to memory of 4008 4808 wnr230.exe 95 PID 4808 wrote to memory of 2192 4808 wnr230.exe 96 PID 4808 wrote to memory of 2192 4808 wnr230.exe 96 PID 4808 wrote to memory of 2192 4808 wnr230.exe 96 PID 4808 wrote to memory of 628 4808 wnr230.exe 97 PID 4808 wrote to memory of 628 4808 wnr230.exe 97 PID 4808 wrote to memory of 628 4808 wnr230.exe 97 PID 4596 wrote to memory of 1520 4596 wnr230.exe 98 PID 4596 wrote to memory of 1520 4596 wnr230.exe 98 PID 4596 wrote to memory of 1520 4596 wnr230.exe 98 PID 4008 wrote to memory of 1736 4008 wnr230.exe 99 PID 4008 wrote to memory of 1736 4008 wnr230.exe 99 PID 4008 wrote to memory of 1736 4008 wnr230.exe 99 PID 2192 wrote to memory of 4208 2192 wnr230.exe 100 PID 2192 wrote to memory of 4208 2192 wnr230.exe 100 PID 2192 wrote to memory of 4208 2192 wnr230.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\823d030488572436d740282a5c790910bf455775c52fc25c0278072357d3900c.exe"C:\Users\Admin\AppData\Local\Temp\823d030488572436d740282a5c790910bf455775c52fc25c0278072357d3900c.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\WINDOWS\setup-4.9.4.exe"C:\Users\Admin\AppData\Local\Temp\WINDOWS\setup-4.9.4.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Users\Admin\AppData\Local\Temp\is-7NFIQ.tmp\setup-4.9.4.tmp"C:\Users\Admin\AppData\Local\Temp\is-7NFIQ.tmp\setup-4.9.4.tmp" /SL5="$C0062,3628408,54272,C:\Users\Admin\AppData\Local\Temp\WINDOWS\setup-4.9.4.exe"3⤵
- Executes dropped EXE
PID:764
-
-
-
C:\Users\Admin\AppData\Local\Temp\WINDOWS\infektor.exe"C:\Users\Admin\AppData\Local\Temp\WINDOWS\infektor.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wnr230.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wnr230.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wnr230.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wnr230.exe" engine4⤵
- Executes dropped EXE
PID:924
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wnr230.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wnr230.exe" rk4⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:4196
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wnr230.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wnr230.exe" guard04⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wnr230.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wnr230.exe" guard15⤵
- Executes dropped EXE
PID:1520
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wnr230.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wnr230.exe" guard14⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wnr230.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wnr230.exe" guard25⤵
- Executes dropped EXE
PID:1736
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wnr230.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wnr230.exe" guard24⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wnr230.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wnr230.exe" guard35⤵
- Executes dropped EXE
PID:4208
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wnr230.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wnr230.exe" guard34⤵
- Executes dropped EXE
PID:628
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD5052cbe208ee1678588aa7259571d2a52
SHA1cb4d55542e7709b41aa803bda2cc5e50286335d1
SHA256164f0282a8741a0b746f8b16a4582662dd56595364ec9a3464784862eb5ed779
SHA512732d2a9c094021a91985e09ba99e57bd41605318a37bfb57f2376e8ba7abefdf657128a7079b40e4dcf91ee7729649be744ffa1d7ea60467bfff8732551a2d27
-
Filesize
53KB
MD5052cbe208ee1678588aa7259571d2a52
SHA1cb4d55542e7709b41aa803bda2cc5e50286335d1
SHA256164f0282a8741a0b746f8b16a4582662dd56595364ec9a3464784862eb5ed779
SHA512732d2a9c094021a91985e09ba99e57bd41605318a37bfb57f2376e8ba7abefdf657128a7079b40e4dcf91ee7729649be744ffa1d7ea60467bfff8732551a2d27
-
Filesize
3.7MB
MD5a49540a44cbf54d7442b107ac3237085
SHA1367b1ec3ee6d8e9b2a2542e1660dd123219e0f21
SHA2566078476c3886b0ae600f2731a1fbf907bbff1e39b60243e9e7e8e3c52fb7628c
SHA5120f92c54e995ace41a60e18dd1e5353c395fc14b12981214e75c6e75dcb4529cbdd473a91c9e6c50d4381afbe92c55f7cf49e5522046423d27304e494e531c1d5
-
Filesize
3.7MB
MD5a49540a44cbf54d7442b107ac3237085
SHA1367b1ec3ee6d8e9b2a2542e1660dd123219e0f21
SHA2566078476c3886b0ae600f2731a1fbf907bbff1e39b60243e9e7e8e3c52fb7628c
SHA5120f92c54e995ace41a60e18dd1e5353c395fc14b12981214e75c6e75dcb4529cbdd473a91c9e6c50d4381afbe92c55f7cf49e5522046423d27304e494e531c1d5
-
Filesize
683KB
MD5ce4e0ff83ac2a3256fd5c220562294a1
SHA172429c43cc4ed0a184a9c7b208902005489ff49a
SHA256130ec61d37b76fa26a4c7ebcf210467c5be3ae2ace7346546c65f093478bb06b
SHA512b375a78ca9b8e30ba665d3934716e5d3ac5737d8cf05a562f59c8b142923e3a79f1c44b55e995bd43fd0a9056a122cbe332d33947f626fa2d5bfb9f2e1824e98
-
Filesize
683KB
MD5ce4e0ff83ac2a3256fd5c220562294a1
SHA172429c43cc4ed0a184a9c7b208902005489ff49a
SHA256130ec61d37b76fa26a4c7ebcf210467c5be3ae2ace7346546c65f093478bb06b
SHA512b375a78ca9b8e30ba665d3934716e5d3ac5737d8cf05a562f59c8b142923e3a79f1c44b55e995bd43fd0a9056a122cbe332d33947f626fa2d5bfb9f2e1824e98
-
Filesize
53KB
MD5052cbe208ee1678588aa7259571d2a52
SHA1cb4d55542e7709b41aa803bda2cc5e50286335d1
SHA256164f0282a8741a0b746f8b16a4582662dd56595364ec9a3464784862eb5ed779
SHA512732d2a9c094021a91985e09ba99e57bd41605318a37bfb57f2376e8ba7abefdf657128a7079b40e4dcf91ee7729649be744ffa1d7ea60467bfff8732551a2d27
-
Filesize
53KB
MD5052cbe208ee1678588aa7259571d2a52
SHA1cb4d55542e7709b41aa803bda2cc5e50286335d1
SHA256164f0282a8741a0b746f8b16a4582662dd56595364ec9a3464784862eb5ed779
SHA512732d2a9c094021a91985e09ba99e57bd41605318a37bfb57f2376e8ba7abefdf657128a7079b40e4dcf91ee7729649be744ffa1d7ea60467bfff8732551a2d27
-
Filesize
53KB
MD5052cbe208ee1678588aa7259571d2a52
SHA1cb4d55542e7709b41aa803bda2cc5e50286335d1
SHA256164f0282a8741a0b746f8b16a4582662dd56595364ec9a3464784862eb5ed779
SHA512732d2a9c094021a91985e09ba99e57bd41605318a37bfb57f2376e8ba7abefdf657128a7079b40e4dcf91ee7729649be744ffa1d7ea60467bfff8732551a2d27
-
Filesize
53KB
MD5052cbe208ee1678588aa7259571d2a52
SHA1cb4d55542e7709b41aa803bda2cc5e50286335d1
SHA256164f0282a8741a0b746f8b16a4582662dd56595364ec9a3464784862eb5ed779
SHA512732d2a9c094021a91985e09ba99e57bd41605318a37bfb57f2376e8ba7abefdf657128a7079b40e4dcf91ee7729649be744ffa1d7ea60467bfff8732551a2d27
-
Filesize
53KB
MD5052cbe208ee1678588aa7259571d2a52
SHA1cb4d55542e7709b41aa803bda2cc5e50286335d1
SHA256164f0282a8741a0b746f8b16a4582662dd56595364ec9a3464784862eb5ed779
SHA512732d2a9c094021a91985e09ba99e57bd41605318a37bfb57f2376e8ba7abefdf657128a7079b40e4dcf91ee7729649be744ffa1d7ea60467bfff8732551a2d27
-
Filesize
53KB
MD5052cbe208ee1678588aa7259571d2a52
SHA1cb4d55542e7709b41aa803bda2cc5e50286335d1
SHA256164f0282a8741a0b746f8b16a4582662dd56595364ec9a3464784862eb5ed779
SHA512732d2a9c094021a91985e09ba99e57bd41605318a37bfb57f2376e8ba7abefdf657128a7079b40e4dcf91ee7729649be744ffa1d7ea60467bfff8732551a2d27
-
Filesize
53KB
MD5052cbe208ee1678588aa7259571d2a52
SHA1cb4d55542e7709b41aa803bda2cc5e50286335d1
SHA256164f0282a8741a0b746f8b16a4582662dd56595364ec9a3464784862eb5ed779
SHA512732d2a9c094021a91985e09ba99e57bd41605318a37bfb57f2376e8ba7abefdf657128a7079b40e4dcf91ee7729649be744ffa1d7ea60467bfff8732551a2d27
-
Filesize
53KB
MD5052cbe208ee1678588aa7259571d2a52
SHA1cb4d55542e7709b41aa803bda2cc5e50286335d1
SHA256164f0282a8741a0b746f8b16a4582662dd56595364ec9a3464784862eb5ed779
SHA512732d2a9c094021a91985e09ba99e57bd41605318a37bfb57f2376e8ba7abefdf657128a7079b40e4dcf91ee7729649be744ffa1d7ea60467bfff8732551a2d27
-
Filesize
53KB
MD5052cbe208ee1678588aa7259571d2a52
SHA1cb4d55542e7709b41aa803bda2cc5e50286335d1
SHA256164f0282a8741a0b746f8b16a4582662dd56595364ec9a3464784862eb5ed779
SHA512732d2a9c094021a91985e09ba99e57bd41605318a37bfb57f2376e8ba7abefdf657128a7079b40e4dcf91ee7729649be744ffa1d7ea60467bfff8732551a2d27
-
Filesize
53KB
MD5052cbe208ee1678588aa7259571d2a52
SHA1cb4d55542e7709b41aa803bda2cc5e50286335d1
SHA256164f0282a8741a0b746f8b16a4582662dd56595364ec9a3464784862eb5ed779
SHA512732d2a9c094021a91985e09ba99e57bd41605318a37bfb57f2376e8ba7abefdf657128a7079b40e4dcf91ee7729649be744ffa1d7ea60467bfff8732551a2d27
-
Filesize
53KB
MD5052cbe208ee1678588aa7259571d2a52
SHA1cb4d55542e7709b41aa803bda2cc5e50286335d1
SHA256164f0282a8741a0b746f8b16a4582662dd56595364ec9a3464784862eb5ed779
SHA512732d2a9c094021a91985e09ba99e57bd41605318a37bfb57f2376e8ba7abefdf657128a7079b40e4dcf91ee7729649be744ffa1d7ea60467bfff8732551a2d27