Analysis

  • max time kernel
    151s
  • max time network
    106s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2022 07:57

General

  • Target

    1ead08a142ce14889263f103325d442f7d76c1c282419c4b76876ab856aafef2.exe

  • Size

    101KB

  • MD5

    08667d50614283b754849916f2e004c0

  • SHA1

    4cc1cafa4e152d6ba18bcac134be655b718953b4

  • SHA256

    1ead08a142ce14889263f103325d442f7d76c1c282419c4b76876ab856aafef2

  • SHA512

    26af18becae39adc387235fe0d1a85a5b157886298724da7010f3a307198a135c48d986f52399fc5f6c1b210d22c2347818bc1642803875d336ecceee12aee67

  • SSDEEP

    1536:9QxqcQu0XPmEmEcYUpEjCTfaAIW1EvqTlrxtPpFAXF9N/6Sy:y/03mEcppEjCTfaAIWSqTlrbPLEz4

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:608
    • C:\Users\Admin\AppData\Local\Temp\1ead08a142ce14889263f103325d442f7d76c1c282419c4b76876ab856aafef2.exe
      "C:\Users\Admin\AppData\Local\Temp\1ead08a142ce14889263f103325d442f7d76c1c282419c4b76876ab856aafef2.exe"
      1⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:3852
      • C:\Users\Admin\AppData\Local\Temp\6tyF64B.exe
        "C:\Users\Admin\AppData\Local\Temp\6tyF64B.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2796
        • C:\Users\Admin\AppData\Local\Temp\6tyF64B.exe
          "C:\Users\Admin\AppData\Local\Temp\6tyF64B.exe"
          3⤵
          • Modifies WinLogon for persistence
          • Executes dropped EXE
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1412

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\6tyF64B.exe

      Filesize

      74KB

      MD5

      5b1a85d948bd7a075ebd0df2296ae9d5

      SHA1

      2b7cab4c68ca6c0fa28b360f9eb4673e7b075a24

      SHA256

      8cfb09392dd6cf7042c9aa9c98fbc9ef5969441d9cbf9d142fd5cbb9d70cd121

      SHA512

      46f05ba3117297faab0a7279d0791fd2e1daebcf9dbcbffaa17c2ee34ac3a68b4b8a40d4d73431a9da7e4a4c293aaf7a9f4bde2d4c93aa4f883c57fb6b2c0575

    • C:\Users\Admin\AppData\Local\Temp\6tyF64B.exe

      Filesize

      74KB

      MD5

      5b1a85d948bd7a075ebd0df2296ae9d5

      SHA1

      2b7cab4c68ca6c0fa28b360f9eb4673e7b075a24

      SHA256

      8cfb09392dd6cf7042c9aa9c98fbc9ef5969441d9cbf9d142fd5cbb9d70cd121

      SHA512

      46f05ba3117297faab0a7279d0791fd2e1daebcf9dbcbffaa17c2ee34ac3a68b4b8a40d4d73431a9da7e4a4c293aaf7a9f4bde2d4c93aa4f883c57fb6b2c0575

    • C:\Users\Admin\AppData\Local\Temp\6tyF64B.exe

      Filesize

      74KB

      MD5

      5b1a85d948bd7a075ebd0df2296ae9d5

      SHA1

      2b7cab4c68ca6c0fa28b360f9eb4673e7b075a24

      SHA256

      8cfb09392dd6cf7042c9aa9c98fbc9ef5969441d9cbf9d142fd5cbb9d70cd121

      SHA512

      46f05ba3117297faab0a7279d0791fd2e1daebcf9dbcbffaa17c2ee34ac3a68b4b8a40d4d73431a9da7e4a4c293aaf7a9f4bde2d4c93aa4f883c57fb6b2c0575

    • memory/608-197-0x0000000019250000-0x0000000019276000-memory.dmp

      Filesize

      152KB

    • memory/608-202-0x0000000019280000-0x00000000192A6000-memory.dmp

      Filesize

      152KB

    • memory/608-242-0x0000000019400000-0x0000000019426000-memory.dmp

      Filesize

      152KB

    • memory/608-237-0x00000000193D0000-0x00000000193F6000-memory.dmp

      Filesize

      152KB

    • memory/608-232-0x00000000193A0000-0x00000000193C6000-memory.dmp

      Filesize

      152KB

    • memory/608-227-0x0000000019370000-0x0000000019396000-memory.dmp

      Filesize

      152KB

    • memory/608-222-0x0000000019340000-0x0000000019366000-memory.dmp

      Filesize

      152KB

    • memory/608-217-0x0000000019310000-0x0000000019336000-memory.dmp

      Filesize

      152KB

    • memory/608-212-0x00000000192E0000-0x0000000019306000-memory.dmp

      Filesize

      152KB

    • memory/608-152-0x0000000000400000-0x0000000000426000-memory.dmp

      Filesize

      152KB

    • memory/608-157-0x00000000190D0000-0x00000000190F6000-memory.dmp

      Filesize

      152KB

    • memory/608-162-0x0000000019100000-0x0000000019126000-memory.dmp

      Filesize

      152KB

    • memory/608-167-0x0000000019130000-0x0000000019156000-memory.dmp

      Filesize

      152KB

    • memory/608-172-0x0000000019160000-0x0000000019186000-memory.dmp

      Filesize

      152KB

    • memory/608-177-0x0000000019190000-0x00000000191B6000-memory.dmp

      Filesize

      152KB

    • memory/608-182-0x00000000191C0000-0x00000000191E6000-memory.dmp

      Filesize

      152KB

    • memory/608-187-0x00000000191F0000-0x0000000019216000-memory.dmp

      Filesize

      152KB

    • memory/608-192-0x0000000019220000-0x0000000019246000-memory.dmp

      Filesize

      152KB

    • memory/608-207-0x00000000192B0000-0x00000000192D6000-memory.dmp

      Filesize

      152KB

    • memory/1412-138-0x0000000000400000-0x0000000000426000-memory.dmp

      Filesize

      152KB

    • memory/1412-147-0x0000000000410000-0x0000000000412000-memory.dmp

      Filesize

      8KB

    • memory/1412-145-0x0000000000400000-0x0000000000426000-memory.dmp

      Filesize

      152KB

    • memory/1412-144-0x0000000000400000-0x0000000000426000-memory.dmp

      Filesize

      152KB

    • memory/1412-141-0x0000000000400000-0x0000000000426000-memory.dmp

      Filesize

      152KB

    • memory/1412-140-0x0000000000400000-0x0000000000426000-memory.dmp

      Filesize

      152KB

    • memory/1412-139-0x0000000000400000-0x0000000000426000-memory.dmp

      Filesize

      152KB