Analysis
-
max time kernel
188s -
max time network
191s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2022 23:04
Static task
static1
Behavioral task
behavioral1
Sample
867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab.exe
Resource
win10v2004-20220812-en
General
-
Target
867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab.exe
-
Size
544KB
-
MD5
6fa77feaddddbd4f2a141337a56e6a60
-
SHA1
648cd353eeef00ebb2f8cd72fb54206799910bc4
-
SHA256
867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab
-
SHA512
664067108811e099d812197221081905afb6291e1a0469d82464950bc3621e8f1045ffe8f84922e19912da4bfca5366ee412173cff0ca71d2fd1664870f66aca
-
SSDEEP
3072:wuFAlQ80NH5ZVulAOL8OzsFxEgCBVa0edQOcJq99zgcRLQaA9waCuqQpa1Sp1VNd:bHNH5ZA8vIwQOb99zMdwI61gB4Q
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4784 svchost.exe 3656 svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\svchost.exe" 867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: svchost.exe File opened (read-only) \??\T: svchost.exe File opened (read-only) \??\W: svchost.exe File opened (read-only) \??\X: svchost.exe File opened (read-only) \??\Y: svchost.exe File opened (read-only) \??\I: svchost.exe File opened (read-only) \??\J: svchost.exe File opened (read-only) \??\R: svchost.exe File opened (read-only) \??\Z: svchost.exe File opened (read-only) \??\N: svchost.exe File opened (read-only) \??\O: svchost.exe File opened (read-only) \??\Q: svchost.exe File opened (read-only) \??\U: svchost.exe File opened (read-only) \??\V: svchost.exe File opened (read-only) \??\E: svchost.exe File opened (read-only) \??\F: svchost.exe File opened (read-only) \??\H: svchost.exe File opened (read-only) \??\K: svchost.exe File opened (read-only) \??\L: svchost.exe File opened (read-only) \??\P: svchost.exe File opened (read-only) \??\G: svchost.exe File opened (read-only) \??\M: svchost.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3236 set thread context of 3112 3236 867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab.exe 79 PID 4784 set thread context of 3656 4784 svchost.exe 81 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3236 867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab.exe 4784 svchost.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3236 wrote to memory of 3112 3236 867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab.exe 79 PID 3236 wrote to memory of 3112 3236 867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab.exe 79 PID 3236 wrote to memory of 3112 3236 867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab.exe 79 PID 3236 wrote to memory of 3112 3236 867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab.exe 79 PID 3236 wrote to memory of 3112 3236 867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab.exe 79 PID 3236 wrote to memory of 3112 3236 867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab.exe 79 PID 3236 wrote to memory of 3112 3236 867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab.exe 79 PID 3236 wrote to memory of 3112 3236 867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab.exe 79 PID 3236 wrote to memory of 3112 3236 867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab.exe 79 PID 3236 wrote to memory of 3112 3236 867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab.exe 79 PID 3236 wrote to memory of 3112 3236 867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab.exe 79 PID 3236 wrote to memory of 3112 3236 867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab.exe 79 PID 3236 wrote to memory of 3112 3236 867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab.exe 79 PID 3112 wrote to memory of 4784 3112 867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab.exe 80 PID 3112 wrote to memory of 4784 3112 867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab.exe 80 PID 3112 wrote to memory of 4784 3112 867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab.exe 80 PID 4784 wrote to memory of 3656 4784 svchost.exe 81 PID 4784 wrote to memory of 3656 4784 svchost.exe 81 PID 4784 wrote to memory of 3656 4784 svchost.exe 81 PID 4784 wrote to memory of 3656 4784 svchost.exe 81 PID 4784 wrote to memory of 3656 4784 svchost.exe 81 PID 4784 wrote to memory of 3656 4784 svchost.exe 81 PID 4784 wrote to memory of 3656 4784 svchost.exe 81 PID 4784 wrote to memory of 3656 4784 svchost.exe 81 PID 4784 wrote to memory of 3656 4784 svchost.exe 81 PID 4784 wrote to memory of 3656 4784 svchost.exe 81 PID 4784 wrote to memory of 3656 4784 svchost.exe 81 PID 4784 wrote to memory of 3656 4784 svchost.exe 81 PID 4784 wrote to memory of 3656 4784 svchost.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab.exe"C:\Users\Admin\AppData\Local\Temp\867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Users\Admin\AppData\Local\Temp\867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab.exe"C:\Users\Admin\AppData\Local\Temp\867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"4⤵
- Executes dropped EXE
- Enumerates connected drives
PID:3656
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
544KB
MD56fa77feaddddbd4f2a141337a56e6a60
SHA1648cd353eeef00ebb2f8cd72fb54206799910bc4
SHA256867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab
SHA512664067108811e099d812197221081905afb6291e1a0469d82464950bc3621e8f1045ffe8f84922e19912da4bfca5366ee412173cff0ca71d2fd1664870f66aca
-
Filesize
544KB
MD56fa77feaddddbd4f2a141337a56e6a60
SHA1648cd353eeef00ebb2f8cd72fb54206799910bc4
SHA256867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab
SHA512664067108811e099d812197221081905afb6291e1a0469d82464950bc3621e8f1045ffe8f84922e19912da4bfca5366ee412173cff0ca71d2fd1664870f66aca
-
Filesize
544KB
MD56fa77feaddddbd4f2a141337a56e6a60
SHA1648cd353eeef00ebb2f8cd72fb54206799910bc4
SHA256867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab
SHA512664067108811e099d812197221081905afb6291e1a0469d82464950bc3621e8f1045ffe8f84922e19912da4bfca5366ee412173cff0ca71d2fd1664870f66aca