Analysis
-
max time kernel
117s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 21:13
Behavioral task
behavioral1
Sample
608ad835f19dd01b461c3d6d540417717bad003ac58d735f3652c23c38e6ac20.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
608ad835f19dd01b461c3d6d540417717bad003ac58d735f3652c23c38e6ac20.exe
Resource
win10v2004-20220812-en
General
-
Target
608ad835f19dd01b461c3d6d540417717bad003ac58d735f3652c23c38e6ac20.exe
-
Size
8.7MB
-
MD5
79e3697f4088a2a17c20ba1d8d085250
-
SHA1
6be58799b742ada1a4093daf1583fd122828e920
-
SHA256
608ad835f19dd01b461c3d6d540417717bad003ac58d735f3652c23c38e6ac20
-
SHA512
1915aff015ebd942cad71a1bc966cc6697a105491bf20f286c089b6da395fd586a7140232b41ae140643b73cff955dfc3b380ee1f7b5623cc9b123c09dfe16a0
-
SSDEEP
98304:atztZtGtztxtGtztktGtztvtGtztHtGtzt:8BjABrAB6ABlABNAB
Malware Config
Signatures
-
Executes dropped EXE 13 IoCs
pid Process 4924 tmp240592296.exe 4812 tmp240593593.exe 4880 tmp240593765.exe 4788 tmp240593937.exe 1456 tmp240594265.exe 3400 tmp240594312.exe 4436 tmp240594562.exe 1624 tmp240594593.exe 3616 tmp240594656.exe 2984 tmp240594796.exe 2632 notpad.exe 4700 tmp240610109.exe 4936 tmp240610578.exe -
resource yara_rule behavioral2/memory/4720-132-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x000a000000022f71-138.dat upx behavioral2/files/0x000a000000022f71-137.dat upx behavioral2/memory/4812-144-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0006000000022f79-145.dat upx behavioral2/files/0x0006000000022f79-143.dat upx behavioral2/memory/4788-148-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4788-153-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0006000000022f7f-159.dat upx behavioral2/memory/4720-161-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3400-160-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0006000000022f7f-158.dat upx behavioral2/memory/1624-168-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0006000000022f7c-152.dat upx behavioral2/files/0x0006000000022f7c-151.dat upx behavioral2/files/0x0007000000022f84-170.dat upx behavioral2/files/0x0007000000022f84-171.dat upx behavioral2/memory/2632-172-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2632-178-0x0000000000400000-0x000000000041F000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240592296.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\notpad.exe tmp240592296.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240592296.exe File created C:\Windows\SysWOW64\fsb.tmp tmp240592296.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240592296.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240592296.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 4720 wrote to memory of 4924 4720 608ad835f19dd01b461c3d6d540417717bad003ac58d735f3652c23c38e6ac20.exe 79 PID 4720 wrote to memory of 4924 4720 608ad835f19dd01b461c3d6d540417717bad003ac58d735f3652c23c38e6ac20.exe 79 PID 4720 wrote to memory of 4924 4720 608ad835f19dd01b461c3d6d540417717bad003ac58d735f3652c23c38e6ac20.exe 79 PID 4720 wrote to memory of 4812 4720 608ad835f19dd01b461c3d6d540417717bad003ac58d735f3652c23c38e6ac20.exe 80 PID 4720 wrote to memory of 4812 4720 608ad835f19dd01b461c3d6d540417717bad003ac58d735f3652c23c38e6ac20.exe 80 PID 4720 wrote to memory of 4812 4720 608ad835f19dd01b461c3d6d540417717bad003ac58d735f3652c23c38e6ac20.exe 80 PID 4812 wrote to memory of 4880 4812 tmp240593593.exe 81 PID 4812 wrote to memory of 4880 4812 tmp240593593.exe 81 PID 4812 wrote to memory of 4880 4812 tmp240593593.exe 81 PID 4812 wrote to memory of 4788 4812 tmp240593593.exe 82 PID 4812 wrote to memory of 4788 4812 tmp240593593.exe 82 PID 4812 wrote to memory of 4788 4812 tmp240593593.exe 82 PID 4788 wrote to memory of 1456 4788 tmp240593937.exe 83 PID 4788 wrote to memory of 1456 4788 tmp240593937.exe 83 PID 4788 wrote to memory of 1456 4788 tmp240593937.exe 83 PID 4788 wrote to memory of 3400 4788 tmp240593937.exe 88 PID 4788 wrote to memory of 3400 4788 tmp240593937.exe 88 PID 4788 wrote to memory of 3400 4788 tmp240593937.exe 88 PID 3400 wrote to memory of 4436 3400 tmp240594312.exe 87 PID 3400 wrote to memory of 4436 3400 tmp240594312.exe 87 PID 3400 wrote to memory of 4436 3400 tmp240594312.exe 87 PID 3400 wrote to memory of 1624 3400 tmp240594312.exe 86 PID 3400 wrote to memory of 1624 3400 tmp240594312.exe 86 PID 3400 wrote to memory of 1624 3400 tmp240594312.exe 86 PID 1624 wrote to memory of 3616 1624 tmp240594593.exe 85 PID 1624 wrote to memory of 3616 1624 tmp240594593.exe 85 PID 1624 wrote to memory of 3616 1624 tmp240594593.exe 85 PID 1624 wrote to memory of 2984 1624 tmp240594593.exe 84 PID 1624 wrote to memory of 2984 1624 tmp240594593.exe 84 PID 1624 wrote to memory of 2984 1624 tmp240594593.exe 84 PID 4924 wrote to memory of 2632 4924 tmp240592296.exe 90 PID 4924 wrote to memory of 2632 4924 tmp240592296.exe 90 PID 4924 wrote to memory of 2632 4924 tmp240592296.exe 90 PID 2632 wrote to memory of 4700 2632 notpad.exe 91 PID 2632 wrote to memory of 4700 2632 notpad.exe 91 PID 2632 wrote to memory of 4700 2632 notpad.exe 91 PID 2632 wrote to memory of 4936 2632 notpad.exe 92 PID 2632 wrote to memory of 4936 2632 notpad.exe 92 PID 2632 wrote to memory of 4936 2632 notpad.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\608ad835f19dd01b461c3d6d540417717bad003ac58d735f3652c23c38e6ac20.exe"C:\Users\Admin\AppData\Local\Temp\608ad835f19dd01b461c3d6d540417717bad003ac58d735f3652c23c38e6ac20.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\tmp240592296.exeC:\Users\Admin\AppData\Local\Temp\tmp240592296.exe2⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\tmp240610109.exeC:\Users\Admin\AppData\Local\Temp\tmp240610109.exe4⤵
- Executes dropped EXE
PID:4700
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240610578.exeC:\Users\Admin\AppData\Local\Temp\tmp240610578.exe4⤵
- Executes dropped EXE
PID:4936
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240593593.exeC:\Users\Admin\AppData\Local\Temp\tmp240593593.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\tmp240593765.exeC:\Users\Admin\AppData\Local\Temp\tmp240593765.exe3⤵
- Executes dropped EXE
PID:4880
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240593937.exeC:\Users\Admin\AppData\Local\Temp\tmp240593937.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\tmp240594265.exeC:\Users\Admin\AppData\Local\Temp\tmp240594265.exe4⤵
- Executes dropped EXE
PID:1456
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240594312.exeC:\Users\Admin\AppData\Local\Temp\tmp240594312.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3400
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240594796.exeC:\Users\Admin\AppData\Local\Temp\tmp240594796.exe1⤵
- Executes dropped EXE
PID:2984
-
C:\Users\Admin\AppData\Local\Temp\tmp240594656.exeC:\Users\Admin\AppData\Local\Temp\tmp240594656.exe1⤵
- Executes dropped EXE
PID:3616
-
C:\Users\Admin\AppData\Local\Temp\tmp240594593.exeC:\Users\Admin\AppData\Local\Temp\tmp240594593.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1624
-
C:\Users\Admin\AppData\Local\Temp\tmp240594562.exeC:\Users\Admin\AppData\Local\Temp\tmp240594562.exe1⤵
- Executes dropped EXE
PID:4436
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
123KB
MD5d58fe1e8fe18394e0995986429b2ca3b
SHA1f73633b5b0b6c1224810f8472d16824cdeb132bc
SHA25670fbc4f3e0a397e371637013d3ae26c3a7a806abc97d0ad4267d2d74400e8da4
SHA512f2ae129f534bffa370e917c093b37ae993e1448e434dd283f09bbea896dab6c140bea37486a8cb93f3bf02eb1e987bfc9694fa52a85b5f74b07ada4b129d2634
-
Filesize
123KB
MD5d58fe1e8fe18394e0995986429b2ca3b
SHA1f73633b5b0b6c1224810f8472d16824cdeb132bc
SHA25670fbc4f3e0a397e371637013d3ae26c3a7a806abc97d0ad4267d2d74400e8da4
SHA512f2ae129f534bffa370e917c093b37ae993e1448e434dd283f09bbea896dab6c140bea37486a8cb93f3bf02eb1e987bfc9694fa52a85b5f74b07ada4b129d2634
-
Filesize
604KB
MD55929b9c23f95836c6149366e454ac3fe
SHA14e0ad0d87f71e29b47c351890c9509ff0a319939
SHA25635cb4e3e6e11540bdce92a1d580460fbdf152c7eec4b2bab0990d3c2bf4ea039
SHA5127ad7e0d568b8add6c3a2f52eac8a348282b9704f10a129e7aa6f4ca479bd01d20744012e8f26cbd230df3e2af1533ef016e72aec7101afde003e0e05350789bf
-
Filesize
604KB
MD55929b9c23f95836c6149366e454ac3fe
SHA14e0ad0d87f71e29b47c351890c9509ff0a319939
SHA25635cb4e3e6e11540bdce92a1d580460fbdf152c7eec4b2bab0990d3c2bf4ea039
SHA5127ad7e0d568b8add6c3a2f52eac8a348282b9704f10a129e7aa6f4ca479bd01d20744012e8f26cbd230df3e2af1533ef016e72aec7101afde003e0e05350789bf
-
Filesize
123KB
MD5d58fe1e8fe18394e0995986429b2ca3b
SHA1f73633b5b0b6c1224810f8472d16824cdeb132bc
SHA25670fbc4f3e0a397e371637013d3ae26c3a7a806abc97d0ad4267d2d74400e8da4
SHA512f2ae129f534bffa370e917c093b37ae993e1448e434dd283f09bbea896dab6c140bea37486a8cb93f3bf02eb1e987bfc9694fa52a85b5f74b07ada4b129d2634
-
Filesize
123KB
MD5d58fe1e8fe18394e0995986429b2ca3b
SHA1f73633b5b0b6c1224810f8472d16824cdeb132bc
SHA25670fbc4f3e0a397e371637013d3ae26c3a7a806abc97d0ad4267d2d74400e8da4
SHA512f2ae129f534bffa370e917c093b37ae993e1448e434dd283f09bbea896dab6c140bea37486a8cb93f3bf02eb1e987bfc9694fa52a85b5f74b07ada4b129d2634
-
Filesize
470KB
MD5445e69fdab59983dd16d8b6a883250fd
SHA160868b848296c467aa8963263ca7d85e3786e57e
SHA256aadd8c840d64d9dffb1af59bdbbfecd6fb5e8b68eb7070b2ac1cb2c33f01898d
SHA51214d99b4f1c55326861b64d63259cd62fb6a12ce49dfc1cc48c181645334812db95615fdfd5632f5049bed975b9eaf2403005389c492e6b747408c3e31f33a904
-
Filesize
470KB
MD5445e69fdab59983dd16d8b6a883250fd
SHA160868b848296c467aa8963263ca7d85e3786e57e
SHA256aadd8c840d64d9dffb1af59bdbbfecd6fb5e8b68eb7070b2ac1cb2c33f01898d
SHA51214d99b4f1c55326861b64d63259cd62fb6a12ce49dfc1cc48c181645334812db95615fdfd5632f5049bed975b9eaf2403005389c492e6b747408c3e31f33a904
-
Filesize
123KB
MD5d58fe1e8fe18394e0995986429b2ca3b
SHA1f73633b5b0b6c1224810f8472d16824cdeb132bc
SHA25670fbc4f3e0a397e371637013d3ae26c3a7a806abc97d0ad4267d2d74400e8da4
SHA512f2ae129f534bffa370e917c093b37ae993e1448e434dd283f09bbea896dab6c140bea37486a8cb93f3bf02eb1e987bfc9694fa52a85b5f74b07ada4b129d2634
-
Filesize
123KB
MD5d58fe1e8fe18394e0995986429b2ca3b
SHA1f73633b5b0b6c1224810f8472d16824cdeb132bc
SHA25670fbc4f3e0a397e371637013d3ae26c3a7a806abc97d0ad4267d2d74400e8da4
SHA512f2ae129f534bffa370e917c093b37ae993e1448e434dd283f09bbea896dab6c140bea37486a8cb93f3bf02eb1e987bfc9694fa52a85b5f74b07ada4b129d2634
-
Filesize
335KB
MD55a9c79aa36b764c745b177eca44ffc38
SHA1698fc30a496cdb13d820e82ef2eded5b31fc4d39
SHA2566331de09ae2ca9deef3b73c30c797220defce425fb89c3109a9d7ce7704c18d1
SHA5126939ac545d3675c15d42cad54675d9c986891ab026aac9ef5e7167d3e509fe4ad895a417e5c3c05613eed6ccd1bf19ebbff0fe710ae2e73eb912b421065ca845
-
Filesize
335KB
MD55a9c79aa36b764c745b177eca44ffc38
SHA1698fc30a496cdb13d820e82ef2eded5b31fc4d39
SHA2566331de09ae2ca9deef3b73c30c797220defce425fb89c3109a9d7ce7704c18d1
SHA5126939ac545d3675c15d42cad54675d9c986891ab026aac9ef5e7167d3e509fe4ad895a417e5c3c05613eed6ccd1bf19ebbff0fe710ae2e73eb912b421065ca845
-
Filesize
123KB
MD5d58fe1e8fe18394e0995986429b2ca3b
SHA1f73633b5b0b6c1224810f8472d16824cdeb132bc
SHA25670fbc4f3e0a397e371637013d3ae26c3a7a806abc97d0ad4267d2d74400e8da4
SHA512f2ae129f534bffa370e917c093b37ae993e1448e434dd283f09bbea896dab6c140bea37486a8cb93f3bf02eb1e987bfc9694fa52a85b5f74b07ada4b129d2634
-
Filesize
123KB
MD5d58fe1e8fe18394e0995986429b2ca3b
SHA1f73633b5b0b6c1224810f8472d16824cdeb132bc
SHA25670fbc4f3e0a397e371637013d3ae26c3a7a806abc97d0ad4267d2d74400e8da4
SHA512f2ae129f534bffa370e917c093b37ae993e1448e434dd283f09bbea896dab6c140bea37486a8cb93f3bf02eb1e987bfc9694fa52a85b5f74b07ada4b129d2634
-
Filesize
201KB
MD52280cf04f6dc9d3f8edf4d91ae30c52b
SHA1964329c715430e8a670dc959de2db0d09616c0cb
SHA256e025ea0d8b3b4aebad30d407d8e2b34cbf8d65e3eb26fe31db0a81ebfcf8f5c5
SHA5121c0244e0d3b6619417136056cb0ec4f972649251f8105595a3aeebdcfc4a9784a83c710b4cf56fd81e8f3cde2b4e25eea6e1fd745ab936b24adfd92086de412b
-
Filesize
201KB
MD52280cf04f6dc9d3f8edf4d91ae30c52b
SHA1964329c715430e8a670dc959de2db0d09616c0cb
SHA256e025ea0d8b3b4aebad30d407d8e2b34cbf8d65e3eb26fe31db0a81ebfcf8f5c5
SHA5121c0244e0d3b6619417136056cb0ec4f972649251f8105595a3aeebdcfc4a9784a83c710b4cf56fd81e8f3cde2b4e25eea6e1fd745ab936b24adfd92086de412b
-
Filesize
123KB
MD5d58fe1e8fe18394e0995986429b2ca3b
SHA1f73633b5b0b6c1224810f8472d16824cdeb132bc
SHA25670fbc4f3e0a397e371637013d3ae26c3a7a806abc97d0ad4267d2d74400e8da4
SHA512f2ae129f534bffa370e917c093b37ae993e1448e434dd283f09bbea896dab6c140bea37486a8cb93f3bf02eb1e987bfc9694fa52a85b5f74b07ada4b129d2634
-
Filesize
123KB
MD5d58fe1e8fe18394e0995986429b2ca3b
SHA1f73633b5b0b6c1224810f8472d16824cdeb132bc
SHA25670fbc4f3e0a397e371637013d3ae26c3a7a806abc97d0ad4267d2d74400e8da4
SHA512f2ae129f534bffa370e917c093b37ae993e1448e434dd283f09bbea896dab6c140bea37486a8cb93f3bf02eb1e987bfc9694fa52a85b5f74b07ada4b129d2634
-
Filesize
67KB
MD55e28284f9b5f9097640d58a73d38ad4c
SHA17a90f8b051bc82cc9cadbcc9ba345ced02891a6c
SHA256865f34fe7ba81e9622ddbdfc511547d190367bbf3dad21ceb6da3eec621044f5
SHA512cb7218cfea8813ae8c7acf6f7511aecbeb9d697986e0eb8538065bf9e3e9c6ced9c29270eb677f5acf08d2e94b21018d8c4a376aa646fa73ce831fc87d448934
-
Filesize
67KB
MD55e28284f9b5f9097640d58a73d38ad4c
SHA17a90f8b051bc82cc9cadbcc9ba345ced02891a6c
SHA256865f34fe7ba81e9622ddbdfc511547d190367bbf3dad21ceb6da3eec621044f5
SHA512cb7218cfea8813ae8c7acf6f7511aecbeb9d697986e0eb8538065bf9e3e9c6ced9c29270eb677f5acf08d2e94b21018d8c4a376aa646fa73ce831fc87d448934
-
Filesize
123KB
MD5d58fe1e8fe18394e0995986429b2ca3b
SHA1f73633b5b0b6c1224810f8472d16824cdeb132bc
SHA25670fbc4f3e0a397e371637013d3ae26c3a7a806abc97d0ad4267d2d74400e8da4
SHA512f2ae129f534bffa370e917c093b37ae993e1448e434dd283f09bbea896dab6c140bea37486a8cb93f3bf02eb1e987bfc9694fa52a85b5f74b07ada4b129d2634
-
Filesize
123KB
MD5d58fe1e8fe18394e0995986429b2ca3b
SHA1f73633b5b0b6c1224810f8472d16824cdeb132bc
SHA25670fbc4f3e0a397e371637013d3ae26c3a7a806abc97d0ad4267d2d74400e8da4
SHA512f2ae129f534bffa370e917c093b37ae993e1448e434dd283f09bbea896dab6c140bea37486a8cb93f3bf02eb1e987bfc9694fa52a85b5f74b07ada4b129d2634
-
Filesize
162KB
MD5e92d3a824a0578a50d2dd81b5060145f
SHA150ef7c645fd5cbb95d50fbaddf6213800f9296ec
SHA25687f53bc444c05230ce439dbb127c03f2e374067d6fb08e91c834371fd9ecf661
SHA51240d0ac6fa5a424b099923fcdb465e9a2f44569af1c75cf05323315a8720517316a7e8627be248cff3a83382fb6db1cf026161f627a39bc1908e63f67a34c0fd5
-
Filesize
296KB
MD564dc26441d16d0d2c9761c08a1f5fa60
SHA12fdeb240241d4e0e131fa1de34173c3d8eb6360e
SHA2565e86a3a641752af6f89a7ec7add17e347818720aa9051e334eb37ad6ad2bba4e
SHA512cc662645a655f4e1ee7ff556bf5363377b2789b5f0552f4208906a43970d384c5faa9cc6065b1ca65d753672cbdf06076424146bc630b6f747b1058b648d6942
-
Filesize
296KB
MD564dc26441d16d0d2c9761c08a1f5fa60
SHA12fdeb240241d4e0e131fa1de34173c3d8eb6360e
SHA2565e86a3a641752af6f89a7ec7add17e347818720aa9051e334eb37ad6ad2bba4e
SHA512cc662645a655f4e1ee7ff556bf5363377b2789b5f0552f4208906a43970d384c5faa9cc6065b1ca65d753672cbdf06076424146bc630b6f747b1058b648d6942