Analysis
-
max time kernel
155s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 11:10
Static task
static1
Behavioral task
behavioral1
Sample
a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe
Resource
win10v2004-20220812-en
General
-
Target
a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe
-
Size
804KB
-
MD5
8f13f2272afefa6dc53873a1163407ad
-
SHA1
c17c173fd05983a2c2316049a67456152bc3cfa0
-
SHA256
a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2
-
SHA512
5d419feeff95bba903f4b12822c619856eb25035a5789b4c683f894036dc0c5b4739a1b15432d4edf44fc5a4f8ec9a173e63bb1d97a83f2f53da3b9ad5d255e8
-
SSDEEP
6144:H/8JeJfEuGs8k/bUlgqjpJDHCq17WSTLp980sbpy3KR/ie5bBb2Y+NHTY4F9:UJeJfEuGstgg/kjp98zHpie5toHTV9
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe " a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe regsvr.exe" a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "0" a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe -
Disables Task Manager via registry modification
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Msn Messsenger = "C:\\Windows\\system32\\regsvr.exe" a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\f: a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe File opened (read-only) \??\h: a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe File opened (read-only) \??\q: a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe File opened (read-only) \??\r: a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe File opened (read-only) \??\z: a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe File opened (read-only) \??\e: a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe File opened (read-only) \??\g: a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe File opened (read-only) \??\i: a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe File opened (read-only) \??\s: a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe File opened (read-only) \??\t: a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe File opened (read-only) \??\x: a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe File opened (read-only) \??\y: a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe File opened (read-only) \??\a: a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe File opened (read-only) \??\k: a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe File opened (read-only) \??\n: a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe File opened (read-only) \??\p: a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe File opened (read-only) \??\w: a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe File opened (read-only) \??\b: a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe File opened (read-only) \??\j: a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe File opened (read-only) \??\l: a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe File opened (read-only) \??\m: a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe File opened (read-only) \??\o: a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe File opened (read-only) \??\u: a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe File opened (read-only) \??\v: a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/4780-132-0x0000000000400000-0x000000000050A000-memory.dmp autoit_exe behavioral2/memory/4780-137-0x0000000000400000-0x000000000050A000-memory.dmp autoit_exe -
Drops file in System32 directory 8 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\svchost .exe a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe File opened for modification C:\Windows\SysWOW64\setup.ini a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe File created C:\Windows\SysWOW64\setting.ini a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe File opened for modification C:\Windows\SysWOW64\setting.ini a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe File opened for modification C:\Windows\SysWOW64\28463 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe File created C:\Windows\SysWOW64\regsvr.exe a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe File opened for modification C:\Windows\SysWOW64\regsvr.exe a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe File created C:\Windows\SysWOW64\svchost .exe a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\regsvr.exe a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe File created C:\Windows\regsvr.exe a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4780 wrote to memory of 3104 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 79 PID 4780 wrote to memory of 3104 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 79 PID 4780 wrote to memory of 3104 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 79 PID 3104 wrote to memory of 4924 3104 cmd.exe 81 PID 3104 wrote to memory of 4924 3104 cmd.exe 81 PID 3104 wrote to memory of 4924 3104 cmd.exe 81 PID 4780 wrote to memory of 4872 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 82 PID 4780 wrote to memory of 4872 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 82 PID 4780 wrote to memory of 4872 4780 a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe 82 PID 4872 wrote to memory of 4616 4872 cmd.exe 84 PID 4872 wrote to memory of 4616 4872 cmd.exe 84 PID 4872 wrote to memory of 4616 4872 cmd.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe"C:\Users\Admin\AppData\Local\Temp\a802a2848b594b8f102fb0eba161e5742655e1397e862fa018b03c2cb4d4aab2.exe"1⤵
- Modifies WinLogon for persistence
- Disables RegEdit via registry modification
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT /delete /yes2⤵
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Windows\SysWOW64\at.exeAT /delete /yes3⤵PID:4924
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\svchost .exe2⤵
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Windows\SysWOW64\at.exeAT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\svchost .exe3⤵PID:4616
-
-