Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 17:16
Static task
static1
Behavioral task
behavioral1
Sample
d075e6f5a56bbf4f5111088e8ea92ced1b833287031fec3a9c9c30d2edadbb0a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d075e6f5a56bbf4f5111088e8ea92ced1b833287031fec3a9c9c30d2edadbb0a.exe
Resource
win10v2004-20220812-en
General
-
Target
d075e6f5a56bbf4f5111088e8ea92ced1b833287031fec3a9c9c30d2edadbb0a.exe
-
Size
1.1MB
-
MD5
5e1c2e6f9198085ba91feadb94f1b368
-
SHA1
354423c09e50fd8cbafedd104dd90efd6a52b691
-
SHA256
d075e6f5a56bbf4f5111088e8ea92ced1b833287031fec3a9c9c30d2edadbb0a
-
SHA512
df7b712fe79f9d6b58b11515830a8e72891fd9db9cd51e9e1f53515be5d48382f45d39467150f2601a03891d176b4e5009c1fa276be4ef749799294d9e7008b7
-
SSDEEP
12288:EX87M0uZr2qmQ4FkK88BibQmGC5cYibZUMt99zfMmlrh1RV+apUItSvrpSVC9MoS:ED2qmQ4FzBvvC5cY0t9fDrhtCMMOHEjS
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1384 myrogclua.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation d075e6f5a56bbf4f5111088e8ea92ced1b833287031fec3a9c9c30d2edadbb0a.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ximgpabrlionyifrpix = "C:\\Users\\Admin\\AppData\\Roaming\\ximgpabrlionyifrpix.exe" applaunch.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4804 set thread context of 4920 4804 d075e6f5a56bbf4f5111088e8ea92ced1b833287031fec3a9c9c30d2edadbb0a.exe 80 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings d075e6f5a56bbf4f5111088e8ea92ced1b833287031fec3a9c9c30d2edadbb0a.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4804 wrote to memory of 4920 4804 d075e6f5a56bbf4f5111088e8ea92ced1b833287031fec3a9c9c30d2edadbb0a.exe 80 PID 4804 wrote to memory of 4920 4804 d075e6f5a56bbf4f5111088e8ea92ced1b833287031fec3a9c9c30d2edadbb0a.exe 80 PID 4804 wrote to memory of 4920 4804 d075e6f5a56bbf4f5111088e8ea92ced1b833287031fec3a9c9c30d2edadbb0a.exe 80 PID 4804 wrote to memory of 4920 4804 d075e6f5a56bbf4f5111088e8ea92ced1b833287031fec3a9c9c30d2edadbb0a.exe 80 PID 4804 wrote to memory of 4920 4804 d075e6f5a56bbf4f5111088e8ea92ced1b833287031fec3a9c9c30d2edadbb0a.exe 80 PID 4804 wrote to memory of 4920 4804 d075e6f5a56bbf4f5111088e8ea92ced1b833287031fec3a9c9c30d2edadbb0a.exe 80 PID 4804 wrote to memory of 4920 4804 d075e6f5a56bbf4f5111088e8ea92ced1b833287031fec3a9c9c30d2edadbb0a.exe 80 PID 4804 wrote to memory of 4920 4804 d075e6f5a56bbf4f5111088e8ea92ced1b833287031fec3a9c9c30d2edadbb0a.exe 80 PID 4804 wrote to memory of 4920 4804 d075e6f5a56bbf4f5111088e8ea92ced1b833287031fec3a9c9c30d2edadbb0a.exe 80 PID 4920 wrote to memory of 1384 4920 applaunch.exe 81 PID 4920 wrote to memory of 1384 4920 applaunch.exe 81 PID 4920 wrote to memory of 1384 4920 applaunch.exe 81 PID 4804 wrote to memory of 368 4804 d075e6f5a56bbf4f5111088e8ea92ced1b833287031fec3a9c9c30d2edadbb0a.exe 83 PID 4804 wrote to memory of 368 4804 d075e6f5a56bbf4f5111088e8ea92ced1b833287031fec3a9c9c30d2edadbb0a.exe 83 PID 4804 wrote to memory of 368 4804 d075e6f5a56bbf4f5111088e8ea92ced1b833287031fec3a9c9c30d2edadbb0a.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\d075e6f5a56bbf4f5111088e8ea92ced1b833287031fec3a9c9c30d2edadbb0a.exe"C:\Users\Admin\AppData\Local\Temp\d075e6f5a56bbf4f5111088e8ea92ced1b833287031fec3a9c9c30d2edadbb0a.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\applaunch.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\applaunch.exe2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\myrogclua.exePID:1384
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\hilgX.vbs"2⤵PID:368
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
398B
MD5058c53333b53cc4eec0493f7e2c37531
SHA18e9033908347f1d51361c93abbb9d57e4c07c0b3
SHA256f0ced39e2aaeaf1e67da2202918947038f8822179bce145d2cb1df1cdc137b50
SHA51207dcea6880db47f0a91f37544bb923953391bcfdb1c5ead17f0690275b70a46ff963406ae3129c33e5c79c559d5ecc7deb8e502425c3c98ab8a597bbc8a424b4
-
Filesize
988KB
MD5f7f27a4ba13238e87f13d68955a11954
SHA11ae7730667a5cf21ade307e2c52eca5f25730a42
SHA256db135ee55ddd17d285b641d45c25051e1fa428fcf77b5aeaccbc9c979a2e7d50
SHA51248521d8c810a64f4658615ea92e14f98f552536ea443c21c8c4d3adc0efdf117d3a678ce402bf4425da1e96aeecc0e3f3f534b7a653b47e532a73b29b3a8293d
-
Filesize
988KB
MD5f7f27a4ba13238e87f13d68955a11954
SHA11ae7730667a5cf21ade307e2c52eca5f25730a42
SHA256db135ee55ddd17d285b641d45c25051e1fa428fcf77b5aeaccbc9c979a2e7d50
SHA51248521d8c810a64f4658615ea92e14f98f552536ea443c21c8c4d3adc0efdf117d3a678ce402bf4425da1e96aeecc0e3f3f534b7a653b47e532a73b29b3a8293d