Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2022 23:52
Static task
static1
Behavioral task
behavioral1
Sample
adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe
Resource
win7-20220812-en
General
-
Target
adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe
-
Size
47KB
-
MD5
7b3d705446a11e471cf9f65c0557f60a
-
SHA1
f4cbd006b13542ee9381bfdbbff25899aad1927b
-
SHA256
adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1
-
SHA512
0b6338e69fe7c67cfc230660c04e25baea7a1b0d3cd5b5341d8e714f320ce4211ef6d5a8cb3c50d006a8a0b2aa85b801356dbe536b9f80e4b445f761afcc617f
-
SSDEEP
768:F00wb76/OQvuoZ1XC/6FTi/wcdNLOlPwZvg4SjI/Ge7mC:FGOvuoZ1XCy14wcu2SjIqC
Malware Config
Extracted
bitrat
1.38
windowsnonbooterminernet.8h.re:63803
-
communication_password
49c0c6521276aefdf9f6763ef24c5c1a
-
tor_process
tor
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe -
Drops startup file 2 IoCs
Processes:
cmd.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe cmd.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exepid process 3412 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe 3412 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe 3412 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe 3412 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exedescription pid process target process PID 400 set thread context of 3412 400 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 45 IoCs
Processes:
adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exepid process 400 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe 400 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe 400 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe 400 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe 400 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe 400 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe 400 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe 400 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe 400 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe 400 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe 400 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe 400 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe 400 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe 400 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe 400 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe 400 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe 400 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe 400 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe 400 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe 400 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe 400 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe 400 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe 400 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe 400 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe 400 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe 400 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe 400 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe 400 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe 400 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe 400 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe 400 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe 400 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe 400 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe 400 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe 400 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe 400 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe 400 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe 400 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe 400 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe 400 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe 400 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe 400 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe 400 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe 400 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe 400 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exeadeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exedescription pid process Token: SeDebugPrivilege 400 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe Token: SeShutdownPrivilege 3412 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exepid process 3412 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe 3412 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exedescription pid process target process PID 400 wrote to memory of 224 400 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe cmd.exe PID 400 wrote to memory of 224 400 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe cmd.exe PID 400 wrote to memory of 224 400 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe cmd.exe PID 400 wrote to memory of 3412 400 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe PID 400 wrote to memory of 3412 400 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe PID 400 wrote to memory of 3412 400 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe PID 400 wrote to memory of 3412 400 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe PID 400 wrote to memory of 3412 400 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe PID 400 wrote to memory of 3412 400 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe PID 400 wrote to memory of 3412 400 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe PID 400 wrote to memory of 3412 400 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe PID 400 wrote to memory of 3412 400 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe PID 400 wrote to memory of 3412 400 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe PID 400 wrote to memory of 3412 400 adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe"C:\Users\Admin\AppData\Local\Temp\adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c Copy "C:\Users\Admin\AppData\Local\Temp\adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe"2⤵
- Drops startup file
PID:224
-
-
C:\Users\Admin\AppData\Local\Temp\adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe"C:\Users\Admin\AppData\Local\Temp\adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3412
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1.exe
Filesize47KB
MD57b3d705446a11e471cf9f65c0557f60a
SHA1f4cbd006b13542ee9381bfdbbff25899aad1927b
SHA256adeac73d9683edb8ce2e8bd1c91211cd35bd1bbb4efae92d392cefd8a04580a1
SHA5120b6338e69fe7c67cfc230660c04e25baea7a1b0d3cd5b5341d8e714f320ce4211ef6d5a8cb3c50d006a8a0b2aa85b801356dbe536b9f80e4b445f761afcc617f