Analysis
-
max time kernel
134s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02-12-2022 23:53
Behavioral task
behavioral1
Sample
2c59bd81eb6cb54781d9dc09a54a86e66d1a82781cf5f19b0510433cdb9a6a78.exe
Resource
win7-20220901-en
General
-
Target
2c59bd81eb6cb54781d9dc09a54a86e66d1a82781cf5f19b0510433cdb9a6a78.exe
-
Size
57KB
-
MD5
8f3abbb6c30b9e2e4e72b0e8f192aaa6
-
SHA1
19cc26ff5509c85520732828ec2085d52e18f33a
-
SHA256
2c59bd81eb6cb54781d9dc09a54a86e66d1a82781cf5f19b0510433cdb9a6a78
-
SHA512
e7f52358416f3c8567c1361546ae274c9c5685290f05e058135ee03b4125fef8729de5ce05daa5a34345042477fba3ca86f6cb856415634bb8161965c17e7938
-
SSDEEP
1536:mkazcVn2gSpl9vxWgfb0ZqU1T4dEIi4Jnf/qrqe71G:c82gI9vcGEJ4dEIzJf/iqyG
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
Processes:
cmd.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts cmd.exe -
Possible privilege escalation attempt 2 IoCs
Processes:
takeown.exeicacls.exepid process 4924 takeown.exe 1252 icacls.exe -
Processes:
resource yara_rule behavioral2/memory/2112-132-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2112-138-0x0000000000400000-0x000000000041F000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
2c59bd81eb6cb54781d9dc09a54a86e66d1a82781cf5f19b0510433cdb9a6a78.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 2c59bd81eb6cb54781d9dc09a54a86e66d1a82781cf5f19b0510433cdb9a6a78.exe -
Modifies file permissions 1 TTPs 2 IoCs
Processes:
takeown.exeicacls.exepid process 4924 takeown.exe 1252 icacls.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
2c59bd81eb6cb54781d9dc09a54a86e66d1a82781cf5f19b0510433cdb9a6a78.execmd.exedescription pid process target process PID 2112 wrote to memory of 3044 2112 2c59bd81eb6cb54781d9dc09a54a86e66d1a82781cf5f19b0510433cdb9a6a78.exe cmd.exe PID 2112 wrote to memory of 3044 2112 2c59bd81eb6cb54781d9dc09a54a86e66d1a82781cf5f19b0510433cdb9a6a78.exe cmd.exe PID 2112 wrote to memory of 3044 2112 2c59bd81eb6cb54781d9dc09a54a86e66d1a82781cf5f19b0510433cdb9a6a78.exe cmd.exe PID 3044 wrote to memory of 4924 3044 cmd.exe takeown.exe PID 3044 wrote to memory of 4924 3044 cmd.exe takeown.exe PID 3044 wrote to memory of 4924 3044 cmd.exe takeown.exe PID 3044 wrote to memory of 1252 3044 cmd.exe icacls.exe PID 3044 wrote to memory of 1252 3044 cmd.exe icacls.exe PID 3044 wrote to memory of 1252 3044 cmd.exe icacls.exe PID 3044 wrote to memory of 3416 3044 cmd.exe attrib.exe PID 3044 wrote to memory of 3416 3044 cmd.exe attrib.exe PID 3044 wrote to memory of 3416 3044 cmd.exe attrib.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c59bd81eb6cb54781d9dc09a54a86e66d1a82781cf5f19b0510433cdb9a6a78.exe"C:\Users\Admin\AppData\Local\Temp\2c59bd81eb6cb54781d9dc09a54a86e66d1a82781cf5f19b0510433cdb9a6a78.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\test.bat" "2⤵
- Drops file in Drivers directory
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\system32\drivers\etc\hosts"3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4924 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\system32\drivers\etc\hosts" /grant administrators:F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1252 -
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Windows\system32\drivers\etc\hosts3⤵
- Views/modifies file attributes
PID:3416
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e42d4acc898ba6eafca28660001d2aed
SHA140be1464a04153eca0d7fef0967e475b6d9062af
SHA25680dc20a3b0fe1c390e5a54cecb019a311de5ef9a5436c8a4c7eb5797f40e6da1
SHA51292b6c7d67c053d3b0380b1feda04f2401975f9761651634a24baa73591780b89466d12e79e11f9c20eb93b80e962bbb7cf8277b1f503a34f110753a1a50a70e8