Analysis
-
max time kernel
186s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 06:47
Static task
static1
Behavioral task
behavioral1
Sample
b4698b0c8b29d3eb5682f4f7611afb35dc7e8bdf971357c72e86901db82238b7.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b4698b0c8b29d3eb5682f4f7611afb35dc7e8bdf971357c72e86901db82238b7.exe
Resource
win10v2004-20220812-en
General
-
Target
b4698b0c8b29d3eb5682f4f7611afb35dc7e8bdf971357c72e86901db82238b7.exe
-
Size
882KB
-
MD5
1038bb73ee81a9dd5301d55a33b9aa6a
-
SHA1
47d517cd733b5e6e7b29db7b76fee91e57c9380b
-
SHA256
b4698b0c8b29d3eb5682f4f7611afb35dc7e8bdf971357c72e86901db82238b7
-
SHA512
6480f55df05b07ddb18648bd21f58f03a34014370f691192c8332da2e25f7651f4e04daa500dc87f9c31a3662e231b306347396c3ad92c740672901a9594dc1f
-
SSDEEP
768:bZ4dLYeMpy7VUbOJIl1YxoUbfZCCCBeKimNsDVF2ta9jS:bKYByprJ2tuxLBKiBVF2tak
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" b4698b0c8b29d3eb5682f4f7611afb35dc7e8bdf971357c72e86901db82238b7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wscntfy.exe -
Adds policy Run key to start application 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run b4698b0c8b29d3eb5682f4f7611afb35dc7e8bdf971357c72e86901db82238b7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Windows-Network Component = "C:\\Program Files (x86)\\Common Files\\lsmass.exe" b4698b0c8b29d3eb5682f4f7611afb35dc7e8bdf971357c72e86901db82238b7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Windows-Network Component = "C:\\Program Files (x86)\\Common Files\\lsmass.exe" wscntfy.exe -
Executes dropped EXE 4 IoCs
pid Process 3140 wscntfy.exe 4884 lsmass.exe 804 wscntfy.exe 2152 lsmass.exe -
Modifies Installed Components in the registry 2 TTPs 5 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2625933C-FF9F-6D29-2296-D3B784D938D3}\IsInstalled = "1" wscntfy.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2625933C-FF9F-6D29-2296-D3B784D938D3} b4698b0c8b29d3eb5682f4f7611afb35dc7e8bdf971357c72e86901db82238b7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2625933C-FF9F-6D29-2296-D3B784D938D3}\StubPath = "C:\\ProgramData\\wscntfy.exe -r" b4698b0c8b29d3eb5682f4f7611afb35dc7e8bdf971357c72e86901db82238b7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2625933C-FF9F-6D29-2296-D3B784D938D3}\IsInstalled = "1" b4698b0c8b29d3eb5682f4f7611afb35dc7e8bdf971357c72e86901db82238b7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2625933C-FF9F-6D29-2296-D3B784D938D3}\StubPath = "C:\\ProgramData\\wscntfy.exe -r" wscntfy.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1928 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation b4698b0c8b29d3eb5682f4f7611afb35dc7e8bdf971357c72e86901db82238b7.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows-Audio Driver = "C:\\ProgramData\\wscntfy.exe" b4698b0c8b29d3eb5682f4f7611afb35dc7e8bdf971357c72e86901db82238b7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows-Audio Driver = "C:\\ProgramData\\wscntfy.exe" wscntfy.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wscntfy.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA b4698b0c8b29d3eb5682f4f7611afb35dc7e8bdf971357c72e86901db82238b7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" b4698b0c8b29d3eb5682f4f7611afb35dc7e8bdf971357c72e86901db82238b7.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wscntfy.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2160 set thread context of 1088 2160 b4698b0c8b29d3eb5682f4f7611afb35dc7e8bdf971357c72e86901db82238b7.exe 80 PID 3140 set thread context of 804 3140 wscntfy.exe 83 PID 4884 set thread context of 2152 4884 lsmass.exe 84 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\lsmass.exe b4698b0c8b29d3eb5682f4f7611afb35dc7e8bdf971357c72e86901db82238b7.exe File opened for modification C:\Program Files (x86)\Common Files\lsmass.exe b4698b0c8b29d3eb5682f4f7611afb35dc7e8bdf971357c72e86901db82238b7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2160 b4698b0c8b29d3eb5682f4f7611afb35dc7e8bdf971357c72e86901db82238b7.exe Token: SeDebugPrivilege 1088 b4698b0c8b29d3eb5682f4f7611afb35dc7e8bdf971357c72e86901db82238b7.exe Token: SeDebugPrivilege 3140 wscntfy.exe Token: SeDebugPrivilege 4884 lsmass.exe Token: SeDebugPrivilege 804 wscntfy.exe Token: SeDebugPrivilege 2152 lsmass.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 2160 wrote to memory of 1088 2160 b4698b0c8b29d3eb5682f4f7611afb35dc7e8bdf971357c72e86901db82238b7.exe 80 PID 2160 wrote to memory of 1088 2160 b4698b0c8b29d3eb5682f4f7611afb35dc7e8bdf971357c72e86901db82238b7.exe 80 PID 2160 wrote to memory of 1088 2160 b4698b0c8b29d3eb5682f4f7611afb35dc7e8bdf971357c72e86901db82238b7.exe 80 PID 2160 wrote to memory of 1088 2160 b4698b0c8b29d3eb5682f4f7611afb35dc7e8bdf971357c72e86901db82238b7.exe 80 PID 2160 wrote to memory of 1088 2160 b4698b0c8b29d3eb5682f4f7611afb35dc7e8bdf971357c72e86901db82238b7.exe 80 PID 2160 wrote to memory of 1088 2160 b4698b0c8b29d3eb5682f4f7611afb35dc7e8bdf971357c72e86901db82238b7.exe 80 PID 2160 wrote to memory of 1088 2160 b4698b0c8b29d3eb5682f4f7611afb35dc7e8bdf971357c72e86901db82238b7.exe 80 PID 2160 wrote to memory of 1088 2160 b4698b0c8b29d3eb5682f4f7611afb35dc7e8bdf971357c72e86901db82238b7.exe 80 PID 1088 wrote to memory of 3140 1088 b4698b0c8b29d3eb5682f4f7611afb35dc7e8bdf971357c72e86901db82238b7.exe 81 PID 1088 wrote to memory of 3140 1088 b4698b0c8b29d3eb5682f4f7611afb35dc7e8bdf971357c72e86901db82238b7.exe 81 PID 1088 wrote to memory of 3140 1088 b4698b0c8b29d3eb5682f4f7611afb35dc7e8bdf971357c72e86901db82238b7.exe 81 PID 1088 wrote to memory of 4884 1088 b4698b0c8b29d3eb5682f4f7611afb35dc7e8bdf971357c72e86901db82238b7.exe 82 PID 1088 wrote to memory of 4884 1088 b4698b0c8b29d3eb5682f4f7611afb35dc7e8bdf971357c72e86901db82238b7.exe 82 PID 1088 wrote to memory of 4884 1088 b4698b0c8b29d3eb5682f4f7611afb35dc7e8bdf971357c72e86901db82238b7.exe 82 PID 3140 wrote to memory of 804 3140 wscntfy.exe 83 PID 3140 wrote to memory of 804 3140 wscntfy.exe 83 PID 3140 wrote to memory of 804 3140 wscntfy.exe 83 PID 3140 wrote to memory of 804 3140 wscntfy.exe 83 PID 3140 wrote to memory of 804 3140 wscntfy.exe 83 PID 3140 wrote to memory of 804 3140 wscntfy.exe 83 PID 3140 wrote to memory of 804 3140 wscntfy.exe 83 PID 3140 wrote to memory of 804 3140 wscntfy.exe 83 PID 4884 wrote to memory of 2152 4884 lsmass.exe 84 PID 4884 wrote to memory of 2152 4884 lsmass.exe 84 PID 4884 wrote to memory of 2152 4884 lsmass.exe 84 PID 4884 wrote to memory of 2152 4884 lsmass.exe 84 PID 4884 wrote to memory of 2152 4884 lsmass.exe 84 PID 4884 wrote to memory of 2152 4884 lsmass.exe 84 PID 4884 wrote to memory of 2152 4884 lsmass.exe 84 PID 4884 wrote to memory of 2152 4884 lsmass.exe 84 PID 804 wrote to memory of 1928 804 wscntfy.exe 85 PID 804 wrote to memory of 1928 804 wscntfy.exe 85 PID 804 wrote to memory of 1928 804 wscntfy.exe 85 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" b4698b0c8b29d3eb5682f4f7611afb35dc7e8bdf971357c72e86901db82238b7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wscntfy.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4698b0c8b29d3eb5682f4f7611afb35dc7e8bdf971357c72e86901db82238b7.exe"C:\Users\Admin\AppData\Local\Temp\b4698b0c8b29d3eb5682f4f7611afb35dc7e8bdf971357c72e86901db82238b7.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\b4698b0c8b29d3eb5682f4f7611afb35dc7e8bdf971357c72e86901db82238b7.exeC:\Users\Admin\AppData\Local\Temp\b4698b0c8b29d3eb5682f4f7611afb35dc7e8bdf971357c72e86901db82238b7.exe2⤵
- UAC bypass
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Checks computer location settings
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1088 -
C:\ProgramData\wscntfy.exe"C:\ProgramData\wscntfy.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\ProgramData\wscntfy.exeC:\ProgramData\wscntfy.exe4⤵
- UAC bypass
- Adds policy Run key to start application
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:804 -
C:\Windows\SysWOW64\netsh.exe"netsh.exe" firewall add allowedprogram program="C:\ProgramData\wscntfy.exe" name="Windows-Audio Driver" mode=ENABLE scope=ALL profile=ALL5⤵
- Modifies Windows Firewall
PID:1928
-
-
-
-
C:\Program Files (x86)\Common Files\lsmass.exe"C:\Program Files (x86)\Common Files\lsmass.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Program Files (x86)\Common Files\lsmass.exe"C:\Program Files (x86)\Common Files\lsmass.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2152
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
882KB
MD51038bb73ee81a9dd5301d55a33b9aa6a
SHA147d517cd733b5e6e7b29db7b76fee91e57c9380b
SHA256b4698b0c8b29d3eb5682f4f7611afb35dc7e8bdf971357c72e86901db82238b7
SHA5126480f55df05b07ddb18648bd21f58f03a34014370f691192c8332da2e25f7651f4e04daa500dc87f9c31a3662e231b306347396c3ad92c740672901a9594dc1f
-
Filesize
882KB
MD51038bb73ee81a9dd5301d55a33b9aa6a
SHA147d517cd733b5e6e7b29db7b76fee91e57c9380b
SHA256b4698b0c8b29d3eb5682f4f7611afb35dc7e8bdf971357c72e86901db82238b7
SHA5126480f55df05b07ddb18648bd21f58f03a34014370f691192c8332da2e25f7651f4e04daa500dc87f9c31a3662e231b306347396c3ad92c740672901a9594dc1f
-
Filesize
882KB
MD51038bb73ee81a9dd5301d55a33b9aa6a
SHA147d517cd733b5e6e7b29db7b76fee91e57c9380b
SHA256b4698b0c8b29d3eb5682f4f7611afb35dc7e8bdf971357c72e86901db82238b7
SHA5126480f55df05b07ddb18648bd21f58f03a34014370f691192c8332da2e25f7651f4e04daa500dc87f9c31a3662e231b306347396c3ad92c740672901a9594dc1f
-
Filesize
882KB
MD51038bb73ee81a9dd5301d55a33b9aa6a
SHA147d517cd733b5e6e7b29db7b76fee91e57c9380b
SHA256b4698b0c8b29d3eb5682f4f7611afb35dc7e8bdf971357c72e86901db82238b7
SHA5126480f55df05b07ddb18648bd21f58f03a34014370f691192c8332da2e25f7651f4e04daa500dc87f9c31a3662e231b306347396c3ad92c740672901a9594dc1f
-
Filesize
882KB
MD51038bb73ee81a9dd5301d55a33b9aa6a
SHA147d517cd733b5e6e7b29db7b76fee91e57c9380b
SHA256b4698b0c8b29d3eb5682f4f7611afb35dc7e8bdf971357c72e86901db82238b7
SHA5126480f55df05b07ddb18648bd21f58f03a34014370f691192c8332da2e25f7651f4e04daa500dc87f9c31a3662e231b306347396c3ad92c740672901a9594dc1f
-
Filesize
882KB
MD51038bb73ee81a9dd5301d55a33b9aa6a
SHA147d517cd733b5e6e7b29db7b76fee91e57c9380b
SHA256b4698b0c8b29d3eb5682f4f7611afb35dc7e8bdf971357c72e86901db82238b7
SHA5126480f55df05b07ddb18648bd21f58f03a34014370f691192c8332da2e25f7651f4e04daa500dc87f9c31a3662e231b306347396c3ad92c740672901a9594dc1f
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\b4698b0c8b29d3eb5682f4f7611afb35dc7e8bdf971357c72e86901db82238b7.exe.log
Filesize128B
MD5a5dcc7c9c08af7dddd82be5b036a4416
SHA14f998ca1526d199e355ffb435bae111a2779b994
SHA256e24033ceec97fd03402b03acaaabd1d1e378e83bb1683afbccac760e00f8ead5
SHA51256035de734836c0c39f0b48641c51c26adb6e79c6c65e23ca96603f71c95b8673e2ef853146e87efc899dd1878d0bbc2c82d91fbf0fce81c552048e986f9bb5a
-
Filesize
128B
MD5a5dcc7c9c08af7dddd82be5b036a4416
SHA14f998ca1526d199e355ffb435bae111a2779b994
SHA256e24033ceec97fd03402b03acaaabd1d1e378e83bb1683afbccac760e00f8ead5
SHA51256035de734836c0c39f0b48641c51c26adb6e79c6c65e23ca96603f71c95b8673e2ef853146e87efc899dd1878d0bbc2c82d91fbf0fce81c552048e986f9bb5a