Analysis
-
max time kernel
151s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2022 07:57
Static task
static1
Behavioral task
behavioral1
Sample
1ead08a142ce14889263f103325d442f7d76c1c282419c4b76876ab856aafef2.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1ead08a142ce14889263f103325d442f7d76c1c282419c4b76876ab856aafef2.exe
Resource
win10v2004-20220901-en
General
-
Target
1ead08a142ce14889263f103325d442f7d76c1c282419c4b76876ab856aafef2.exe
-
Size
101KB
-
MD5
08667d50614283b754849916f2e004c0
-
SHA1
4cc1cafa4e152d6ba18bcac134be655b718953b4
-
SHA256
1ead08a142ce14889263f103325d442f7d76c1c282419c4b76876ab856aafef2
-
SHA512
26af18becae39adc387235fe0d1a85a5b157886298724da7010f3a307198a135c48d986f52399fc5f6c1b210d22c2347818bc1642803875d336ecceee12aee67
-
SSDEEP
1536:9QxqcQu0XPmEmEcYUpEjCTfaAIW1EvqTlrxtPpFAXF9N/6Sy:y/03mEcppEjCTfaAIWSqTlrbPLEz4
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\twext.exe," 6tyF64B.exe -
Executes dropped EXE 2 IoCs
pid Process 2796 6tyF64B.exe 1412 6tyF64B.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 1ead08a142ce14889263f103325d442f7d76c1c282419c4b76876ab856aafef2.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\twext.exe 6tyF64B.exe File created C:\Windows\SysWOW64\twext.exe 6tyF64B.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2796 set thread context of 1412 2796 6tyF64B.exe 82 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1412 6tyF64B.exe 1412 6tyF64B.exe 1412 6tyF64B.exe 1412 6tyF64B.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1412 6tyF64B.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2796 6tyF64B.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3852 wrote to memory of 2796 3852 1ead08a142ce14889263f103325d442f7d76c1c282419c4b76876ab856aafef2.exe 81 PID 3852 wrote to memory of 2796 3852 1ead08a142ce14889263f103325d442f7d76c1c282419c4b76876ab856aafef2.exe 81 PID 3852 wrote to memory of 2796 3852 1ead08a142ce14889263f103325d442f7d76c1c282419c4b76876ab856aafef2.exe 81 PID 2796 wrote to memory of 1412 2796 6tyF64B.exe 82 PID 2796 wrote to memory of 1412 2796 6tyF64B.exe 82 PID 2796 wrote to memory of 1412 2796 6tyF64B.exe 82 PID 2796 wrote to memory of 1412 2796 6tyF64B.exe 82 PID 2796 wrote to memory of 1412 2796 6tyF64B.exe 82 PID 2796 wrote to memory of 1412 2796 6tyF64B.exe 82 PID 2796 wrote to memory of 1412 2796 6tyF64B.exe 82 PID 2796 wrote to memory of 1412 2796 6tyF64B.exe 82 PID 2796 wrote to memory of 1412 2796 6tyF64B.exe 82 PID 1412 wrote to memory of 608 1412 6tyF64B.exe 3 PID 1412 wrote to memory of 608 1412 6tyF64B.exe 3 PID 1412 wrote to memory of 608 1412 6tyF64B.exe 3 PID 1412 wrote to memory of 608 1412 6tyF64B.exe 3 PID 1412 wrote to memory of 608 1412 6tyF64B.exe 3 PID 1412 wrote to memory of 608 1412 6tyF64B.exe 3 PID 1412 wrote to memory of 608 1412 6tyF64B.exe 3 PID 1412 wrote to memory of 608 1412 6tyF64B.exe 3 PID 1412 wrote to memory of 608 1412 6tyF64B.exe 3 PID 1412 wrote to memory of 608 1412 6tyF64B.exe 3 PID 1412 wrote to memory of 608 1412 6tyF64B.exe 3 PID 1412 wrote to memory of 608 1412 6tyF64B.exe 3 PID 1412 wrote to memory of 608 1412 6tyF64B.exe 3 PID 1412 wrote to memory of 608 1412 6tyF64B.exe 3 PID 1412 wrote to memory of 608 1412 6tyF64B.exe 3 PID 1412 wrote to memory of 608 1412 6tyF64B.exe 3 PID 1412 wrote to memory of 608 1412 6tyF64B.exe 3 PID 1412 wrote to memory of 608 1412 6tyF64B.exe 3 PID 1412 wrote to memory of 608 1412 6tyF64B.exe 3 PID 1412 wrote to memory of 608 1412 6tyF64B.exe 3 PID 1412 wrote to memory of 608 1412 6tyF64B.exe 3 PID 1412 wrote to memory of 608 1412 6tyF64B.exe 3 PID 1412 wrote to memory of 608 1412 6tyF64B.exe 3 PID 1412 wrote to memory of 608 1412 6tyF64B.exe 3 PID 1412 wrote to memory of 608 1412 6tyF64B.exe 3 PID 1412 wrote to memory of 608 1412 6tyF64B.exe 3 PID 1412 wrote to memory of 608 1412 6tyF64B.exe 3 PID 1412 wrote to memory of 608 1412 6tyF64B.exe 3 PID 1412 wrote to memory of 608 1412 6tyF64B.exe 3 PID 1412 wrote to memory of 608 1412 6tyF64B.exe 3 PID 1412 wrote to memory of 608 1412 6tyF64B.exe 3 PID 1412 wrote to memory of 608 1412 6tyF64B.exe 3 PID 1412 wrote to memory of 608 1412 6tyF64B.exe 3 PID 1412 wrote to memory of 608 1412 6tyF64B.exe 3 PID 1412 wrote to memory of 608 1412 6tyF64B.exe 3 PID 1412 wrote to memory of 608 1412 6tyF64B.exe 3 PID 1412 wrote to memory of 608 1412 6tyF64B.exe 3 PID 1412 wrote to memory of 608 1412 6tyF64B.exe 3 PID 1412 wrote to memory of 608 1412 6tyF64B.exe 3 PID 1412 wrote to memory of 608 1412 6tyF64B.exe 3 PID 1412 wrote to memory of 608 1412 6tyF64B.exe 3 PID 1412 wrote to memory of 608 1412 6tyF64B.exe 3 PID 1412 wrote to memory of 608 1412 6tyF64B.exe 3 PID 1412 wrote to memory of 608 1412 6tyF64B.exe 3 PID 1412 wrote to memory of 608 1412 6tyF64B.exe 3 PID 1412 wrote to memory of 608 1412 6tyF64B.exe 3 PID 1412 wrote to memory of 608 1412 6tyF64B.exe 3 PID 1412 wrote to memory of 608 1412 6tyF64B.exe 3 PID 1412 wrote to memory of 608 1412 6tyF64B.exe 3 PID 1412 wrote to memory of 608 1412 6tyF64B.exe 3 PID 1412 wrote to memory of 608 1412 6tyF64B.exe 3 PID 1412 wrote to memory of 608 1412 6tyF64B.exe 3
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:608
-
C:\Users\Admin\AppData\Local\Temp\1ead08a142ce14889263f103325d442f7d76c1c282419c4b76876ab856aafef2.exe"C:\Users\Admin\AppData\Local\Temp\1ead08a142ce14889263f103325d442f7d76c1c282419c4b76876ab856aafef2.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Users\Admin\AppData\Local\Temp\6tyF64B.exe"C:\Users\Admin\AppData\Local\Temp\6tyF64B.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\6tyF64B.exe"C:\Users\Admin\AppData\Local\Temp\6tyF64B.exe"3⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1412
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74KB
MD55b1a85d948bd7a075ebd0df2296ae9d5
SHA12b7cab4c68ca6c0fa28b360f9eb4673e7b075a24
SHA2568cfb09392dd6cf7042c9aa9c98fbc9ef5969441d9cbf9d142fd5cbb9d70cd121
SHA51246f05ba3117297faab0a7279d0791fd2e1daebcf9dbcbffaa17c2ee34ac3a68b4b8a40d4d73431a9da7e4a4c293aaf7a9f4bde2d4c93aa4f883c57fb6b2c0575
-
Filesize
74KB
MD55b1a85d948bd7a075ebd0df2296ae9d5
SHA12b7cab4c68ca6c0fa28b360f9eb4673e7b075a24
SHA2568cfb09392dd6cf7042c9aa9c98fbc9ef5969441d9cbf9d142fd5cbb9d70cd121
SHA51246f05ba3117297faab0a7279d0791fd2e1daebcf9dbcbffaa17c2ee34ac3a68b4b8a40d4d73431a9da7e4a4c293aaf7a9f4bde2d4c93aa4f883c57fb6b2c0575
-
Filesize
74KB
MD55b1a85d948bd7a075ebd0df2296ae9d5
SHA12b7cab4c68ca6c0fa28b360f9eb4673e7b075a24
SHA2568cfb09392dd6cf7042c9aa9c98fbc9ef5969441d9cbf9d142fd5cbb9d70cd121
SHA51246f05ba3117297faab0a7279d0791fd2e1daebcf9dbcbffaa17c2ee34ac3a68b4b8a40d4d73431a9da7e4a4c293aaf7a9f4bde2d4c93aa4f883c57fb6b2c0575