Analysis
-
max time kernel
151s -
max time network
184s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 19:46
Static task
static1
Behavioral task
behavioral1
Sample
f99ad202c43c98a4bd3d505f0680c663487c1f036a356815d7ac69b96e541b81.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f99ad202c43c98a4bd3d505f0680c663487c1f036a356815d7ac69b96e541b81.exe
Resource
win10v2004-20220812-en
General
-
Target
f99ad202c43c98a4bd3d505f0680c663487c1f036a356815d7ac69b96e541b81.exe
-
Size
213KB
-
MD5
56ba8755dd359723ca9b02cd9fcad553
-
SHA1
be4dc02dd304505fd1c55066ef2d770e38596a17
-
SHA256
f99ad202c43c98a4bd3d505f0680c663487c1f036a356815d7ac69b96e541b81
-
SHA512
54e32c037ba5bb9abc523773abe56e587ca10aaca4318ea46219f1cb7545111d22abcecfad23bb4fc52926a8b9124b95a980ff5423a24ce74f2940ca25d97eaa
-
SSDEEP
3072:nl1i/NU8bOMYcYYcmy5PTM5YmMOMYcYY51i/NU8TffsN0n/A76r7Gki0Hv5sioUe:Xi/NjO5zX3Oai/NZG66CY/J
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4052 system.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation f99ad202c43c98a4bd3d505f0680c663487c1f036a356815d7ac69b96e541b81.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation system.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\qx.bat system.exe -
Drops file in Program Files directory 9 IoCs
description ioc Process File created C:\Program Files\Windows\sys.exe f99ad202c43c98a4bd3d505f0680c663487c1f036a356815d7ac69b96e541b81.exe File opened for modification C:\Program Files\Windows\system.jpg f99ad202c43c98a4bd3d505f0680c663487c1f036a356815d7ac69b96e541b81.exe File opened for modification C:\Program Files\Windows\SDRW.jpg f99ad202c43c98a4bd3d505f0680c663487c1f036a356815d7ac69b96e541b81.exe File created C:\Program Files\Windows\sys2.exe system.exe File opened for modification C:\Program Files\Windows\sys2.exe system.exe File opened for modification C:\Program Files\Windows\sys.exe f99ad202c43c98a4bd3d505f0680c663487c1f036a356815d7ac69b96e541b81.exe File opened for modification C:\Program Files\Windows attrib.exe File opened for modification C:\Program Files\Windows\sys.exe attrib.exe File opened for modification C:\Program Files\Windows\system.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4904 f99ad202c43c98a4bd3d505f0680c663487c1f036a356815d7ac69b96e541b81.exe 4052 system.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 4904 wrote to memory of 4052 4904 f99ad202c43c98a4bd3d505f0680c663487c1f036a356815d7ac69b96e541b81.exe 81 PID 4904 wrote to memory of 4052 4904 f99ad202c43c98a4bd3d505f0680c663487c1f036a356815d7ac69b96e541b81.exe 81 PID 4904 wrote to memory of 4052 4904 f99ad202c43c98a4bd3d505f0680c663487c1f036a356815d7ac69b96e541b81.exe 81 PID 4904 wrote to memory of 4780 4904 f99ad202c43c98a4bd3d505f0680c663487c1f036a356815d7ac69b96e541b81.exe 82 PID 4904 wrote to memory of 4780 4904 f99ad202c43c98a4bd3d505f0680c663487c1f036a356815d7ac69b96e541b81.exe 82 PID 4904 wrote to memory of 4780 4904 f99ad202c43c98a4bd3d505f0680c663487c1f036a356815d7ac69b96e541b81.exe 82 PID 4052 wrote to memory of 1296 4052 system.exe 84 PID 4052 wrote to memory of 1296 4052 system.exe 84 PID 4052 wrote to memory of 1296 4052 system.exe 84 PID 1296 wrote to memory of 3324 1296 cmd.exe 86 PID 1296 wrote to memory of 3324 1296 cmd.exe 86 PID 1296 wrote to memory of 3324 1296 cmd.exe 86 PID 4052 wrote to memory of 688 4052 system.exe 87 PID 4052 wrote to memory of 688 4052 system.exe 87 PID 4052 wrote to memory of 688 4052 system.exe 87 PID 688 wrote to memory of 4524 688 cmd.exe 89 PID 688 wrote to memory of 4524 688 cmd.exe 89 PID 688 wrote to memory of 4524 688 cmd.exe 89 PID 4052 wrote to memory of 4092 4052 system.exe 90 PID 4052 wrote to memory of 4092 4052 system.exe 90 PID 4052 wrote to memory of 4092 4052 system.exe 90 PID 4092 wrote to memory of 228 4092 cmd.exe 92 PID 4092 wrote to memory of 228 4092 cmd.exe 92 PID 4092 wrote to memory of 228 4092 cmd.exe 92 PID 4092 wrote to memory of 1012 4092 cmd.exe 93 PID 4092 wrote to memory of 1012 4092 cmd.exe 93 PID 4092 wrote to memory of 1012 4092 cmd.exe 93 PID 4092 wrote to memory of 652 4092 cmd.exe 94 PID 4092 wrote to memory of 652 4092 cmd.exe 94 PID 4092 wrote to memory of 652 4092 cmd.exe 94 PID 4092 wrote to memory of 3888 4092 cmd.exe 95 PID 4092 wrote to memory of 3888 4092 cmd.exe 95 PID 4092 wrote to memory of 3888 4092 cmd.exe 95 PID 4092 wrote to memory of 4216 4092 cmd.exe 96 PID 4092 wrote to memory of 4216 4092 cmd.exe 96 PID 4092 wrote to memory of 4216 4092 cmd.exe 96 PID 4092 wrote to memory of 3504 4092 cmd.exe 97 PID 4092 wrote to memory of 3504 4092 cmd.exe 97 PID 4092 wrote to memory of 3504 4092 cmd.exe 97 PID 4092 wrote to memory of 3008 4092 cmd.exe 98 PID 4092 wrote to memory of 3008 4092 cmd.exe 98 PID 4092 wrote to memory of 3008 4092 cmd.exe 98 PID 4092 wrote to memory of 2916 4092 cmd.exe 99 PID 4092 wrote to memory of 2916 4092 cmd.exe 99 PID 4092 wrote to memory of 2916 4092 cmd.exe 99 PID 4092 wrote to memory of 1668 4092 cmd.exe 100 PID 4092 wrote to memory of 1668 4092 cmd.exe 100 PID 4092 wrote to memory of 1668 4092 cmd.exe 100 -
Views/modifies file attributes 1 TTPs 5 IoCs
pid Process 3324 attrib.exe 4524 attrib.exe 228 attrib.exe 3888 attrib.exe 3008 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f99ad202c43c98a4bd3d505f0680c663487c1f036a356815d7ac69b96e541b81.exe"C:\Users\Admin\AppData\Local\Temp\f99ad202c43c98a4bd3d505f0680c663487c1f036a356815d7ac69b96e541b81.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Program Files\Windows\system.exe"C:\Program Files\Windows\system.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Program Files\Windows"3⤵
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Program Files\Windows"4⤵
- Drops file in Program Files directory
- Views/modifies file attributes
PID:3324
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\sys.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\sys.exe"4⤵
- Views/modifies file attributes
PID:4524
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\WINDOWS\system32\qx.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\sys.exe" +R4⤵
- Views/modifies file attributes
PID:228
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:1012
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\sys.exe" /P users:R4⤵PID:652
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Program Files\Windows\sys.exe" +R4⤵
- Drops file in Program Files directory
- Views/modifies file attributes
PID:3888
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:4216
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Windows\sys.exe" /P users:R4⤵PID:3504
-
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Program Files\Windows\system.exe" +R4⤵
- Drops file in Program Files directory
- Views/modifies file attributes
PID:3008
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:2916
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Windows\system.exe" /P users:R4⤵PID:1668
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c del f99ad202c43c98a4bd3d505f0680c663487c1f036a356815d7ac69b96e541b81.exe2⤵PID:4780
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD592354536ece14660b60eb9f9cf8f8fc0
SHA1d9b1c9e38251b59f41414bbd53723e4501615855
SHA2565777f7aa46d43783a24fa12f7123c66811a9a2353ccec4fa0749fb09e7d7ac43
SHA5125988b1d62f10cdb311852ab9ad2b845805f0eb9fd5c99cd55db2964413b05498e1d3c4ece6ff3d4910fc0a0ab930ab43e6ead91a23371254f1e2cbc3be8a4d4c
-
Filesize
24KB
MD52a5ca6e007316349ff0929c2f6e66618
SHA19669551415d9698ee282d87b9c89562992aa3f97
SHA256cdfe87e6296fe09746f2e6ebf5f7835d75d8d9ba4efea1d3b2f270c1bbdeab02
SHA512beab8c6306dd16bc473b7eaa9832549bdb778f92cdf9c1ec88c9582d7a10df8285a9412afd7f786304b499c54f362f341ebfdad35592f71ff319891355e78a2f
-
Filesize
24KB
MD52a5ca6e007316349ff0929c2f6e66618
SHA19669551415d9698ee282d87b9c89562992aa3f97
SHA256cdfe87e6296fe09746f2e6ebf5f7835d75d8d9ba4efea1d3b2f270c1bbdeab02
SHA512beab8c6306dd16bc473b7eaa9832549bdb778f92cdf9c1ec88c9582d7a10df8285a9412afd7f786304b499c54f362f341ebfdad35592f71ff319891355e78a2f
-
Filesize
283B
MD532afcf0a6ae75e5d11229f30c1848e48
SHA1d1d59b121e12f93d27369d203566336d3d2afc15
SHA256fd274418081b46a7a9dc70f3afe8b6aa9c7545588a97eb23fc1813da50d073e3
SHA512d1bb3e135b046b76fa55f7542f8f6995ceb9d03b5f5a240e0e0e9745a9246b03a12ac3c459229f3909697fd8ae7b09abb0e99c6ca07ae0b39b4c89100ad58320
-
Filesize
72KB
MD592354536ece14660b60eb9f9cf8f8fc0
SHA1d9b1c9e38251b59f41414bbd53723e4501615855
SHA2565777f7aa46d43783a24fa12f7123c66811a9a2353ccec4fa0749fb09e7d7ac43
SHA5125988b1d62f10cdb311852ab9ad2b845805f0eb9fd5c99cd55db2964413b05498e1d3c4ece6ff3d4910fc0a0ab930ab43e6ead91a23371254f1e2cbc3be8a4d4c