Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2022 07:07
Behavioral task
behavioral1
Sample
ba028a926d29c6e6099385b893cc31fc22c42bfd55cffde514397b648bbfa074.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ba028a926d29c6e6099385b893cc31fc22c42bfd55cffde514397b648bbfa074.exe
Resource
win10v2004-20220812-en
General
-
Target
ba028a926d29c6e6099385b893cc31fc22c42bfd55cffde514397b648bbfa074.exe
-
Size
544KB
-
MD5
29822b39493b8f61502166c43df96d9c
-
SHA1
0c0bc4af21d59af00a6a7f991b3f97bfeb624ba7
-
SHA256
ba028a926d29c6e6099385b893cc31fc22c42bfd55cffde514397b648bbfa074
-
SHA512
63b1d7dfbad8a81c42d3629deba18e0c5a0df289dd14cae442da6feddaba9b14dc857cfeb6e761572754eb9ff788c1a4a968b3c8dfcf4d4146b247e9b75a7066
-
SSDEEP
12288:YBMmKGnhDT+JlCdc9ecOdQv/8Gxj7zShD0dty2S:6MmnDC+dgendIxFNb
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Users\\Admin\\AppData\\Roaming\\lsass.exe\"" ba028a926d29c6e6099385b893cc31fc22c42bfd55cffde514397b648bbfa074.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Users\\Admin\\AppData\\Roaming\\lsass.exe\"" lsass.exe -
Executes dropped EXE 2 IoCs
pid Process 4924 lsass.exe 4808 lsass.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 4936 netsh.exe -
resource yara_rule behavioral2/memory/4904-132-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral2/memory/4904-136-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral2/files/0x000300000000071d-141.dat upx behavioral2/files/0x000300000000071d-142.dat upx behavioral2/memory/4924-145-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral2/files/0x000300000000071d-147.dat upx behavioral2/memory/4924-149-0x0000000000400000-0x00000000004B6000-memory.dmp upx -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\lsass.exe\"" lsass.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\lsass.exe\"" lsass.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run ba028a926d29c6e6099385b893cc31fc22c42bfd55cffde514397b648bbfa074.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\lsass.exe\"" ba028a926d29c6e6099385b893cc31fc22c42bfd55cffde514397b648bbfa074.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run ba028a926d29c6e6099385b893cc31fc22c42bfd55cffde514397b648bbfa074.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\lsass.exe\"" ba028a926d29c6e6099385b893cc31fc22c42bfd55cffde514397b648bbfa074.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run lsass.exe -
AutoIT Executable 4 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/4904-132-0x0000000000400000-0x00000000004B6000-memory.dmp autoit_exe behavioral2/memory/4904-136-0x0000000000400000-0x00000000004B6000-memory.dmp autoit_exe behavioral2/memory/4924-145-0x0000000000400000-0x00000000004B6000-memory.dmp autoit_exe behavioral2/memory/4924-149-0x0000000000400000-0x00000000004B6000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4904 set thread context of 4840 4904 ba028a926d29c6e6099385b893cc31fc22c42bfd55cffde514397b648bbfa074.exe 83 PID 4924 set thread context of 4808 4924 lsass.exe 87 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4840 ba028a926d29c6e6099385b893cc31fc22c42bfd55cffde514397b648bbfa074.exe 4808 lsass.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 4904 wrote to memory of 4840 4904 ba028a926d29c6e6099385b893cc31fc22c42bfd55cffde514397b648bbfa074.exe 83 PID 4904 wrote to memory of 4840 4904 ba028a926d29c6e6099385b893cc31fc22c42bfd55cffde514397b648bbfa074.exe 83 PID 4904 wrote to memory of 4840 4904 ba028a926d29c6e6099385b893cc31fc22c42bfd55cffde514397b648bbfa074.exe 83 PID 4904 wrote to memory of 4840 4904 ba028a926d29c6e6099385b893cc31fc22c42bfd55cffde514397b648bbfa074.exe 83 PID 4904 wrote to memory of 4840 4904 ba028a926d29c6e6099385b893cc31fc22c42bfd55cffde514397b648bbfa074.exe 83 PID 4904 wrote to memory of 4840 4904 ba028a926d29c6e6099385b893cc31fc22c42bfd55cffde514397b648bbfa074.exe 83 PID 4904 wrote to memory of 4840 4904 ba028a926d29c6e6099385b893cc31fc22c42bfd55cffde514397b648bbfa074.exe 83 PID 4840 wrote to memory of 4936 4840 ba028a926d29c6e6099385b893cc31fc22c42bfd55cffde514397b648bbfa074.exe 84 PID 4840 wrote to memory of 4936 4840 ba028a926d29c6e6099385b893cc31fc22c42bfd55cffde514397b648bbfa074.exe 84 PID 4840 wrote to memory of 4936 4840 ba028a926d29c6e6099385b893cc31fc22c42bfd55cffde514397b648bbfa074.exe 84 PID 4840 wrote to memory of 4924 4840 ba028a926d29c6e6099385b893cc31fc22c42bfd55cffde514397b648bbfa074.exe 86 PID 4840 wrote to memory of 4924 4840 ba028a926d29c6e6099385b893cc31fc22c42bfd55cffde514397b648bbfa074.exe 86 PID 4840 wrote to memory of 4924 4840 ba028a926d29c6e6099385b893cc31fc22c42bfd55cffde514397b648bbfa074.exe 86 PID 4924 wrote to memory of 4808 4924 lsass.exe 87 PID 4924 wrote to memory of 4808 4924 lsass.exe 87 PID 4924 wrote to memory of 4808 4924 lsass.exe 87 PID 4924 wrote to memory of 4808 4924 lsass.exe 87 PID 4924 wrote to memory of 4808 4924 lsass.exe 87 PID 4924 wrote to memory of 4808 4924 lsass.exe 87 PID 4924 wrote to memory of 4808 4924 lsass.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba028a926d29c6e6099385b893cc31fc22c42bfd55cffde514397b648bbfa074.exe"C:\Users\Admin\AppData\Local\Temp\ba028a926d29c6e6099385b893cc31fc22c42bfd55cffde514397b648bbfa074.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\ba028a926d29c6e6099385b893cc31fc22c42bfd55cffde514397b648bbfa074.exe"C:\Users\Admin\AppData\Local\Temp\ba028a926d29c6e6099385b893cc31fc22c42bfd55cffde514397b648bbfa074.exe"2⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram program = C:\Users\Admin\AppData\Roaming\lsass.exename = Nero mode = ENABLE3⤵
- Modifies Windows Firewall
PID:4936
-
-
C:\Users\Admin\AppData\Roaming\lsass.exe"C:\Users\Admin\AppData\Roaming\lsass.exe" /d C:\Users\Admin\AppData\Local\Temp\ba028a926d29c6e6099385b893cc31fc22c42bfd55cffde514397b648bbfa074.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Users\Admin\AppData\Roaming\lsass.exe"C:\Users\Admin\AppData\Roaming\lsass.exe"4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:4808
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
544KB
MD5c53a8b7ec68db3d859b8ad2a39cf7d98
SHA138d6a8d24dc316dfb184d88a7e6cef6480a89ed1
SHA2562e7f807e3d0b881e45416a822edabbd4ea4dc8499b2541461f748271953aeb67
SHA5125c59f9ea1136d5e764fa82407fa93c425b1070dbb6f4ab19395b274b7df44c62661be562c0e0ab6af9c675b6874b82fe0fb8601c543609b6c32669e395f79b5b
-
Filesize
544KB
MD5c53a8b7ec68db3d859b8ad2a39cf7d98
SHA138d6a8d24dc316dfb184d88a7e6cef6480a89ed1
SHA2562e7f807e3d0b881e45416a822edabbd4ea4dc8499b2541461f748271953aeb67
SHA5125c59f9ea1136d5e764fa82407fa93c425b1070dbb6f4ab19395b274b7df44c62661be562c0e0ab6af9c675b6874b82fe0fb8601c543609b6c32669e395f79b5b
-
Filesize
544KB
MD5c53a8b7ec68db3d859b8ad2a39cf7d98
SHA138d6a8d24dc316dfb184d88a7e6cef6480a89ed1
SHA2562e7f807e3d0b881e45416a822edabbd4ea4dc8499b2541461f748271953aeb67
SHA5125c59f9ea1136d5e764fa82407fa93c425b1070dbb6f4ab19395b274b7df44c62661be562c0e0ab6af9c675b6874b82fe0fb8601c543609b6c32669e395f79b5b