Analysis
-
max time kernel
180s -
max time network
212s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 08:47
Static task
static1
Behavioral task
behavioral1
Sample
e28c5297d0b141d2243aabce8d09c415da2b2f15a85215c6317b67ba7cfb8b0c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e28c5297d0b141d2243aabce8d09c415da2b2f15a85215c6317b67ba7cfb8b0c.exe
Resource
win10v2004-20221111-en
General
-
Target
e28c5297d0b141d2243aabce8d09c415da2b2f15a85215c6317b67ba7cfb8b0c.exe
-
Size
64KB
-
MD5
2780374d6b9ddb0574cf76c7e6f2fd10
-
SHA1
d3594e0791ac64acf102a8f9a2f6e839701de3ab
-
SHA256
e28c5297d0b141d2243aabce8d09c415da2b2f15a85215c6317b67ba7cfb8b0c
-
SHA512
83bc3ff52dd182e094247519c6744ccb7da9348553c6c0f5e625c48891cf255652bada3ef29cbaf8b07f5e0b060455d720f2f4e1ecbeebf4d0edd22c17a9c382
-
SSDEEP
1536:W2iaAUsY9KlxwaqTHB9vwlGiDOdxe2AqrC:WqZKl2pfwlgdyqrC
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3696 IntelSupport.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1984 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation e28c5297d0b141d2243aabce8d09c415da2b2f15a85215c6317b67ba7cfb8b0c.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\415c03e977101a5881cc8108b71223e5.exe IntelSupport.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\415c03e977101a5881cc8108b71223e5.exe IntelSupport.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\415c03e977101a5881cc8108b71223e5 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\IntelSupport.exe\" .." IntelSupport.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\415c03e977101a5881cc8108b71223e5 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\IntelSupport.exe\" .." IntelSupport.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 51 IoCs
pid Process 2340 e28c5297d0b141d2243aabce8d09c415da2b2f15a85215c6317b67ba7cfb8b0c.exe 2340 e28c5297d0b141d2243aabce8d09c415da2b2f15a85215c6317b67ba7cfb8b0c.exe 2340 e28c5297d0b141d2243aabce8d09c415da2b2f15a85215c6317b67ba7cfb8b0c.exe 2340 e28c5297d0b141d2243aabce8d09c415da2b2f15a85215c6317b67ba7cfb8b0c.exe 2340 e28c5297d0b141d2243aabce8d09c415da2b2f15a85215c6317b67ba7cfb8b0c.exe 2340 e28c5297d0b141d2243aabce8d09c415da2b2f15a85215c6317b67ba7cfb8b0c.exe 2340 e28c5297d0b141d2243aabce8d09c415da2b2f15a85215c6317b67ba7cfb8b0c.exe 2340 e28c5297d0b141d2243aabce8d09c415da2b2f15a85215c6317b67ba7cfb8b0c.exe 2340 e28c5297d0b141d2243aabce8d09c415da2b2f15a85215c6317b67ba7cfb8b0c.exe 2340 e28c5297d0b141d2243aabce8d09c415da2b2f15a85215c6317b67ba7cfb8b0c.exe 2340 e28c5297d0b141d2243aabce8d09c415da2b2f15a85215c6317b67ba7cfb8b0c.exe 2340 e28c5297d0b141d2243aabce8d09c415da2b2f15a85215c6317b67ba7cfb8b0c.exe 2340 e28c5297d0b141d2243aabce8d09c415da2b2f15a85215c6317b67ba7cfb8b0c.exe 3696 IntelSupport.exe 3696 IntelSupport.exe 3696 IntelSupport.exe 3696 IntelSupport.exe 3696 IntelSupport.exe 3696 IntelSupport.exe 3696 IntelSupport.exe 3696 IntelSupport.exe 3696 IntelSupport.exe 3696 IntelSupport.exe 3696 IntelSupport.exe 3696 IntelSupport.exe 3696 IntelSupport.exe 3696 IntelSupport.exe 3696 IntelSupport.exe 3696 IntelSupport.exe 3696 IntelSupport.exe 3696 IntelSupport.exe 3696 IntelSupport.exe 3696 IntelSupport.exe 3696 IntelSupport.exe 3696 IntelSupport.exe 3696 IntelSupport.exe 3696 IntelSupport.exe 3696 IntelSupport.exe 3696 IntelSupport.exe 3696 IntelSupport.exe 3696 IntelSupport.exe 3696 IntelSupport.exe 3696 IntelSupport.exe 3696 IntelSupport.exe 3696 IntelSupport.exe 3696 IntelSupport.exe 3696 IntelSupport.exe 3696 IntelSupport.exe 3696 IntelSupport.exe 3696 IntelSupport.exe 3696 IntelSupport.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2340 e28c5297d0b141d2243aabce8d09c415da2b2f15a85215c6317b67ba7cfb8b0c.exe Token: SeDebugPrivilege 3696 IntelSupport.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2340 wrote to memory of 3696 2340 e28c5297d0b141d2243aabce8d09c415da2b2f15a85215c6317b67ba7cfb8b0c.exe 83 PID 2340 wrote to memory of 3696 2340 e28c5297d0b141d2243aabce8d09c415da2b2f15a85215c6317b67ba7cfb8b0c.exe 83 PID 2340 wrote to memory of 3696 2340 e28c5297d0b141d2243aabce8d09c415da2b2f15a85215c6317b67ba7cfb8b0c.exe 83 PID 3696 wrote to memory of 1984 3696 IntelSupport.exe 84 PID 3696 wrote to memory of 1984 3696 IntelSupport.exe 84 PID 3696 wrote to memory of 1984 3696 IntelSupport.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\e28c5297d0b141d2243aabce8d09c415da2b2f15a85215c6317b67ba7cfb8b0c.exe"C:\Users\Admin\AppData\Local\Temp\e28c5297d0b141d2243aabce8d09c415da2b2f15a85215c6317b67ba7cfb8b0c.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\IntelSupport.exe"C:\Users\Admin\AppData\Local\Temp\IntelSupport.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\IntelSupport.exe" "IntelSupport.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:1984
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD52780374d6b9ddb0574cf76c7e6f2fd10
SHA1d3594e0791ac64acf102a8f9a2f6e839701de3ab
SHA256e28c5297d0b141d2243aabce8d09c415da2b2f15a85215c6317b67ba7cfb8b0c
SHA51283bc3ff52dd182e094247519c6744ccb7da9348553c6c0f5e625c48891cf255652bada3ef29cbaf8b07f5e0b060455d720f2f4e1ecbeebf4d0edd22c17a9c382
-
Filesize
64KB
MD52780374d6b9ddb0574cf76c7e6f2fd10
SHA1d3594e0791ac64acf102a8f9a2f6e839701de3ab
SHA256e28c5297d0b141d2243aabce8d09c415da2b2f15a85215c6317b67ba7cfb8b0c
SHA51283bc3ff52dd182e094247519c6744ccb7da9348553c6c0f5e625c48891cf255652bada3ef29cbaf8b07f5e0b060455d720f2f4e1ecbeebf4d0edd22c17a9c382