Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 01:10
Static task
static1
Behavioral task
behavioral1
Sample
a9c96b1703cb39684207a675bf3af295faed1f8d27eb51b312c9cb19b57cbc98.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a9c96b1703cb39684207a675bf3af295faed1f8d27eb51b312c9cb19b57cbc98.exe
Resource
win10v2004-20220901-en
General
-
Target
a9c96b1703cb39684207a675bf3af295faed1f8d27eb51b312c9cb19b57cbc98.exe
-
Size
1.1MB
-
MD5
753beed5c8ef36a4f9974bb5ed154c2e
-
SHA1
b88685813f147997e9a39f7771bf4efb8bbbf257
-
SHA256
a9c96b1703cb39684207a675bf3af295faed1f8d27eb51b312c9cb19b57cbc98
-
SHA512
081a5dab5f68aa18d56451d2e3e3011dc89087dd450e4b6617443577658a0985e3e21fd597e015c5c5c6aeebf7a8e38c2a04d3dbf292f4b46ddc49ab42bedcca
-
SSDEEP
24576:JkjHSN59ngsR+PEIzzamL1472ex/Fbl2DPpoUX:JuinF+sIHlDI5YDqu
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 364 svchost.exe 3524 svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation a9c96b1703cb39684207a675bf3af295faed1f8d27eb51b312c9cb19b57cbc98.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 364 set thread context of 3524 364 svchost.exe 93 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 1 IoCs
pid Process 4528 reg.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3840 wrote to memory of 4528 3840 a9c96b1703cb39684207a675bf3af295faed1f8d27eb51b312c9cb19b57cbc98.exe 82 PID 3840 wrote to memory of 4528 3840 a9c96b1703cb39684207a675bf3af295faed1f8d27eb51b312c9cb19b57cbc98.exe 82 PID 3840 wrote to memory of 4528 3840 a9c96b1703cb39684207a675bf3af295faed1f8d27eb51b312c9cb19b57cbc98.exe 82 PID 3840 wrote to memory of 364 3840 a9c96b1703cb39684207a675bf3af295faed1f8d27eb51b312c9cb19b57cbc98.exe 84 PID 3840 wrote to memory of 364 3840 a9c96b1703cb39684207a675bf3af295faed1f8d27eb51b312c9cb19b57cbc98.exe 84 PID 3840 wrote to memory of 364 3840 a9c96b1703cb39684207a675bf3af295faed1f8d27eb51b312c9cb19b57cbc98.exe 84 PID 364 wrote to memory of 3524 364 svchost.exe 93 PID 364 wrote to memory of 3524 364 svchost.exe 93 PID 364 wrote to memory of 3524 364 svchost.exe 93 PID 364 wrote to memory of 3524 364 svchost.exe 93 PID 364 wrote to memory of 3524 364 svchost.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9c96b1703cb39684207a675bf3af295faed1f8d27eb51b312c9cb19b57cbc98.exe"C:\Users\Admin\AppData\Local\Temp\a9c96b1703cb39684207a675bf3af295faed1f8d27eb51b312c9cb19b57cbc98.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "Windows Update" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\svchost.exe" /f2⤵
- Adds Run key to start application
- Modifies registry key
PID:4528
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵
- Executes dropped EXE
PID:3524
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD50387c13510de79729829f7c764875778
SHA140164ca13337e3ed4f37762cb2bb3fc1474eab7b
SHA256e3befe607de38a10fc5f331acbb384e3c512b6c1c90c6ddafd006e8e6dff80b4
SHA51231614b30e2024309dc2ee3278c44dcf84e62ed9d4f7d5d7781d819e01f6a125413047b1c93eb4730070d7c1328108b786cd3fde63ad8bb4b14c56fba430b327c
-
Filesize
1.1MB
MD50387c13510de79729829f7c764875778
SHA140164ca13337e3ed4f37762cb2bb3fc1474eab7b
SHA256e3befe607de38a10fc5f331acbb384e3c512b6c1c90c6ddafd006e8e6dff80b4
SHA51231614b30e2024309dc2ee3278c44dcf84e62ed9d4f7d5d7781d819e01f6a125413047b1c93eb4730070d7c1328108b786cd3fde63ad8bb4b14c56fba430b327c
-
Filesize
1.1MB
MD50387c13510de79729829f7c764875778
SHA140164ca13337e3ed4f37762cb2bb3fc1474eab7b
SHA256e3befe607de38a10fc5f331acbb384e3c512b6c1c90c6ddafd006e8e6dff80b4
SHA51231614b30e2024309dc2ee3278c44dcf84e62ed9d4f7d5d7781d819e01f6a125413047b1c93eb4730070d7c1328108b786cd3fde63ad8bb4b14c56fba430b327c