Analysis
-
max time kernel
138s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
02/12/2022, 22:50
Static task
static1
Behavioral task
behavioral1
Sample
142d3db5357b0b20e5798de1763923bba401a59ce95a8d399f37a64281b1c3d2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
142d3db5357b0b20e5798de1763923bba401a59ce95a8d399f37a64281b1c3d2.exe
Resource
win10v2004-20221111-en
General
-
Target
142d3db5357b0b20e5798de1763923bba401a59ce95a8d399f37a64281b1c3d2.exe
-
Size
40KB
-
MD5
a90ac281e572aab1ca34c988c1c2b221
-
SHA1
9134967349366d9c7378890ac38119d7f48e53e3
-
SHA256
142d3db5357b0b20e5798de1763923bba401a59ce95a8d399f37a64281b1c3d2
-
SHA512
668179f3479cf934465781a9b44c4a375a9f5923a8d84fd1108fdd5eadb952b8dec3165d795a7b3962ec5ec576008a5ee03aed1ebb26396d0c16ef8d205b96f9
-
SSDEEP
768:7F2Oi5T0xlRPeVI918IBqns8XCM1N2+HLCCRNg0VrvmP2Ys2clsIX2:7FqmJPsy8IBHB42+rE0VruPBtcRm
Malware Config
Signatures
-
Unexpected DNS network traffic destination 5 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4268 set thread context of 948 4268 142d3db5357b0b20e5798de1763923bba401a59ce95a8d399f37a64281b1c3d2.exe 85 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Fonts\pXt14.com 142d3db5357b0b20e5798de1763923bba401a59ce95a8d399f37a64281b1c3d2.exe File opened for modification C:\Windows\Fonts\pXt14.com 142d3db5357b0b20e5798de1763923bba401a59ce95a8d399f37a64281b1c3d2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings 142d3db5357b0b20e5798de1763923bba401a59ce95a8d399f37a64281b1c3d2.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 948 142d3db5357b0b20e5798de1763923bba401a59ce95a8d399f37a64281b1c3d2.exe 948 142d3db5357b0b20e5798de1763923bba401a59ce95a8d399f37a64281b1c3d2.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4268 142d3db5357b0b20e5798de1763923bba401a59ce95a8d399f37a64281b1c3d2.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4268 wrote to memory of 948 4268 142d3db5357b0b20e5798de1763923bba401a59ce95a8d399f37a64281b1c3d2.exe 85 PID 4268 wrote to memory of 948 4268 142d3db5357b0b20e5798de1763923bba401a59ce95a8d399f37a64281b1c3d2.exe 85 PID 4268 wrote to memory of 948 4268 142d3db5357b0b20e5798de1763923bba401a59ce95a8d399f37a64281b1c3d2.exe 85 PID 4268 wrote to memory of 948 4268 142d3db5357b0b20e5798de1763923bba401a59ce95a8d399f37a64281b1c3d2.exe 85 PID 4268 wrote to memory of 948 4268 142d3db5357b0b20e5798de1763923bba401a59ce95a8d399f37a64281b1c3d2.exe 85 PID 4268 wrote to memory of 948 4268 142d3db5357b0b20e5798de1763923bba401a59ce95a8d399f37a64281b1c3d2.exe 85 PID 4268 wrote to memory of 948 4268 142d3db5357b0b20e5798de1763923bba401a59ce95a8d399f37a64281b1c3d2.exe 85 PID 4268 wrote to memory of 948 4268 142d3db5357b0b20e5798de1763923bba401a59ce95a8d399f37a64281b1c3d2.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\142d3db5357b0b20e5798de1763923bba401a59ce95a8d399f37a64281b1c3d2.exe"C:\Users\Admin\AppData\Local\Temp\142d3db5357b0b20e5798de1763923bba401a59ce95a8d399f37a64281b1c3d2.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Users\Admin\AppData\Local\Temp\142d3db5357b0b20e5798de1763923bba401a59ce95a8d399f37a64281b1c3d2.exe"C:\Users\Admin\AppData\Local\Temp\142d3db5357b0b20e5798de1763923bba401a59ce95a8d399f37a64281b1c3d2.exe"2⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:948
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3780