Analysis
-
max time kernel
185s -
max time network
193s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 14:55
Static task
static1
Behavioral task
behavioral1
Sample
b6e4f89352611004e9f5cf1d57d10c04c1df3e32205d441db29b1167dd68c3d7.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b6e4f89352611004e9f5cf1d57d10c04c1df3e32205d441db29b1167dd68c3d7.exe
Resource
win10v2004-20221111-en
General
-
Target
b6e4f89352611004e9f5cf1d57d10c04c1df3e32205d441db29b1167dd68c3d7.exe
-
Size
63KB
-
MD5
ca7e77da33c0ef992a615c2c616b0c9c
-
SHA1
b28dd70f9b0eab845b801726ab9895b50ac68619
-
SHA256
b6e4f89352611004e9f5cf1d57d10c04c1df3e32205d441db29b1167dd68c3d7
-
SHA512
bba0479ab5f7e5300fcb21a7a77a26b1879b62c4e49301bc3b50db58257e95c952ed4aea0d9e2532126cfe239e17147e02694b64519301dbc76ffa1d66985ba7
-
SSDEEP
1536:454CnhpZeFD4zEcqPD+/2u7mbV5UdH8cQD9++N5X:45LhSD4ziy/2jvUdH8T++N5X
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2796 System64.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7890g421-b1gf-14d0-89bb-0090ce808e85} b6e4f89352611004e9f5cf1d57d10c04c1df3e32205d441db29b1167dd68c3d7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7890g421-b1gf-14d0-89bb-0090ce808e85}\StubPath = "C:\\Windows\\system32\\System64.exe" b6e4f89352611004e9f5cf1d57d10c04c1df3e32205d441db29b1167dd68c3d7.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation b6e4f89352611004e9f5cf1d57d10c04c1df3e32205d441db29b1167dd68c3d7.exe -
Loads dropped DLL 2 IoCs
pid Process 2796 System64.exe 2796 System64.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\System64.exe b6e4f89352611004e9f5cf1d57d10c04c1df3e32205d441db29b1167dd68c3d7.exe File created C:\Windows\SysWOW64\System64.exe b6e4f89352611004e9f5cf1d57d10c04c1df3e32205d441db29b1167dd68c3d7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2796 System64.exe 2796 System64.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2796 2348 b6e4f89352611004e9f5cf1d57d10c04c1df3e32205d441db29b1167dd68c3d7.exe 82 PID 2348 wrote to memory of 2796 2348 b6e4f89352611004e9f5cf1d57d10c04c1df3e32205d441db29b1167dd68c3d7.exe 82 PID 2348 wrote to memory of 2796 2348 b6e4f89352611004e9f5cf1d57d10c04c1df3e32205d441db29b1167dd68c3d7.exe 82 PID 2796 wrote to memory of 308 2796 System64.exe 83 PID 2796 wrote to memory of 308 2796 System64.exe 83 PID 2796 wrote to memory of 308 2796 System64.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6e4f89352611004e9f5cf1d57d10c04c1df3e32205d441db29b1167dd68c3d7.exe"C:\Users\Admin\AppData\Local\Temp\b6e4f89352611004e9f5cf1d57d10c04c1df3e32205d441db29b1167dd68c3d7.exe"1⤵
- Modifies Installed Components in the registry
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\System64.exe"C:\Windows\system32\System64.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\userinit.exe"C:\Windows\system32\userinit.exe"3⤵PID:308
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD5ca7e77da33c0ef992a615c2c616b0c9c
SHA1b28dd70f9b0eab845b801726ab9895b50ac68619
SHA256b6e4f89352611004e9f5cf1d57d10c04c1df3e32205d441db29b1167dd68c3d7
SHA512bba0479ab5f7e5300fcb21a7a77a26b1879b62c4e49301bc3b50db58257e95c952ed4aea0d9e2532126cfe239e17147e02694b64519301dbc76ffa1d66985ba7
-
Filesize
63KB
MD5ca7e77da33c0ef992a615c2c616b0c9c
SHA1b28dd70f9b0eab845b801726ab9895b50ac68619
SHA256b6e4f89352611004e9f5cf1d57d10c04c1df3e32205d441db29b1167dd68c3d7
SHA512bba0479ab5f7e5300fcb21a7a77a26b1879b62c4e49301bc3b50db58257e95c952ed4aea0d9e2532126cfe239e17147e02694b64519301dbc76ffa1d66985ba7
-
Filesize
63KB
MD5ca7e77da33c0ef992a615c2c616b0c9c
SHA1b28dd70f9b0eab845b801726ab9895b50ac68619
SHA256b6e4f89352611004e9f5cf1d57d10c04c1df3e32205d441db29b1167dd68c3d7
SHA512bba0479ab5f7e5300fcb21a7a77a26b1879b62c4e49301bc3b50db58257e95c952ed4aea0d9e2532126cfe239e17147e02694b64519301dbc76ffa1d66985ba7
-
Filesize
63KB
MD5ca7e77da33c0ef992a615c2c616b0c9c
SHA1b28dd70f9b0eab845b801726ab9895b50ac68619
SHA256b6e4f89352611004e9f5cf1d57d10c04c1df3e32205d441db29b1167dd68c3d7
SHA512bba0479ab5f7e5300fcb21a7a77a26b1879b62c4e49301bc3b50db58257e95c952ed4aea0d9e2532126cfe239e17147e02694b64519301dbc76ffa1d66985ba7