Analysis
-
max time kernel
155s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 23:22
Static task
static1
Behavioral task
behavioral1
Sample
033d729bf0b64c4eb70fc866bbc9a427971e1dd0be43ff335f49b58300b473d0.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
033d729bf0b64c4eb70fc866bbc9a427971e1dd0be43ff335f49b58300b473d0.exe
Resource
win10v2004-20220812-en
General
-
Target
033d729bf0b64c4eb70fc866bbc9a427971e1dd0be43ff335f49b58300b473d0.exe
-
Size
260KB
-
MD5
39d7570310dde337c4e7138395c0d262
-
SHA1
124e3a5c1626e110c7e7a491fb93722d43689fd7
-
SHA256
033d729bf0b64c4eb70fc866bbc9a427971e1dd0be43ff335f49b58300b473d0
-
SHA512
7a7c7019a724d1aff0cfa20f1e638c7587ea57ecd40c70b5f450a9b39295ced76e4d9a2ce79bc2a50ea72d630660546013c50f93baea5ddb0d9b8c3906ca09ff
-
SSDEEP
3072:ygfAlNtvh25n/kZoSUjMqXnpWAkpAmTSrMaIOYt/jo7LAtPhjjtZnfHFEoWBfGVR:ydYgTSrMaIl/jcLijfHFEHWzXvjT85R
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" mwdep.exe -
Executes dropped EXE 1 IoCs
pid Process 4092 mwdep.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 033d729bf0b64c4eb70fc866bbc9a427971e1dd0be43ff335f49b58300b473d0.exe -
Adds Run key to start application 2 TTPs 53 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mwdep = "C:\\Users\\Admin\\mwdep.exe /t" mwdep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mwdep = "C:\\Users\\Admin\\mwdep.exe /A" mwdep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mwdep = "C:\\Users\\Admin\\mwdep.exe /K" mwdep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mwdep = "C:\\Users\\Admin\\mwdep.exe /J" mwdep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mwdep = "C:\\Users\\Admin\\mwdep.exe /N" mwdep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mwdep = "C:\\Users\\Admin\\mwdep.exe /Z" mwdep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mwdep = "C:\\Users\\Admin\\mwdep.exe /p" mwdep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mwdep = "C:\\Users\\Admin\\mwdep.exe /Q" mwdep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mwdep = "C:\\Users\\Admin\\mwdep.exe /D" mwdep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mwdep = "C:\\Users\\Admin\\mwdep.exe /U" mwdep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mwdep = "C:\\Users\\Admin\\mwdep.exe /I" mwdep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mwdep = "C:\\Users\\Admin\\mwdep.exe /r" mwdep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mwdep = "C:\\Users\\Admin\\mwdep.exe /f" mwdep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mwdep = "C:\\Users\\Admin\\mwdep.exe /e" mwdep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mwdep = "C:\\Users\\Admin\\mwdep.exe /L" mwdep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mwdep = "C:\\Users\\Admin\\mwdep.exe /b" mwdep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mwdep = "C:\\Users\\Admin\\mwdep.exe /o" mwdep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mwdep = "C:\\Users\\Admin\\mwdep.exe /O" mwdep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mwdep = "C:\\Users\\Admin\\mwdep.exe /d" mwdep.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run\ mwdep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mwdep = "C:\\Users\\Admin\\mwdep.exe /E" mwdep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mwdep = "C:\\Users\\Admin\\mwdep.exe /s" mwdep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mwdep = "C:\\Users\\Admin\\mwdep.exe /w" mwdep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mwdep = "C:\\Users\\Admin\\mwdep.exe /c" mwdep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mwdep = "C:\\Users\\Admin\\mwdep.exe /B" mwdep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mwdep = "C:\\Users\\Admin\\mwdep.exe /h" mwdep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mwdep = "C:\\Users\\Admin\\mwdep.exe /W" mwdep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mwdep = "C:\\Users\\Admin\\mwdep.exe /C" mwdep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mwdep = "C:\\Users\\Admin\\mwdep.exe /q" mwdep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mwdep = "C:\\Users\\Admin\\mwdep.exe /S" mwdep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mwdep = "C:\\Users\\Admin\\mwdep.exe /k" mwdep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mwdep = "C:\\Users\\Admin\\mwdep.exe /P" mwdep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mwdep = "C:\\Users\\Admin\\mwdep.exe /R" mwdep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mwdep = "C:\\Users\\Admin\\mwdep.exe /H" mwdep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mwdep = "C:\\Users\\Admin\\mwdep.exe /i" mwdep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mwdep = "C:\\Users\\Admin\\mwdep.exe /y" mwdep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mwdep = "C:\\Users\\Admin\\mwdep.exe /u" mwdep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mwdep = "C:\\Users\\Admin\\mwdep.exe /j" mwdep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mwdep = "C:\\Users\\Admin\\mwdep.exe /F" mwdep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mwdep = "C:\\Users\\Admin\\mwdep.exe /m" mwdep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mwdep = "C:\\Users\\Admin\\mwdep.exe /l" mwdep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mwdep = "C:\\Users\\Admin\\mwdep.exe /v" mwdep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mwdep = "C:\\Users\\Admin\\mwdep.exe /a" mwdep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mwdep = "C:\\Users\\Admin\\mwdep.exe /X" mwdep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mwdep = "C:\\Users\\Admin\\mwdep.exe /M" mwdep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mwdep = "C:\\Users\\Admin\\mwdep.exe /Y" mwdep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mwdep = "C:\\Users\\Admin\\mwdep.exe /x" mwdep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mwdep = "C:\\Users\\Admin\\mwdep.exe /T" mwdep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mwdep = "C:\\Users\\Admin\\mwdep.exe /G" mwdep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mwdep = "C:\\Users\\Admin\\mwdep.exe /z" mwdep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mwdep = "C:\\Users\\Admin\\mwdep.exe /n" mwdep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mwdep = "C:\\Users\\Admin\\mwdep.exe /g" mwdep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mwdep = "C:\\Users\\Admin\\mwdep.exe /V" mwdep.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4092 mwdep.exe 4092 mwdep.exe 4092 mwdep.exe 4092 mwdep.exe 4092 mwdep.exe 4092 mwdep.exe 4092 mwdep.exe 4092 mwdep.exe 4092 mwdep.exe 4092 mwdep.exe 4092 mwdep.exe 4092 mwdep.exe 4092 mwdep.exe 4092 mwdep.exe 4092 mwdep.exe 4092 mwdep.exe 4092 mwdep.exe 4092 mwdep.exe 4092 mwdep.exe 4092 mwdep.exe 4092 mwdep.exe 4092 mwdep.exe 4092 mwdep.exe 4092 mwdep.exe 4092 mwdep.exe 4092 mwdep.exe 4092 mwdep.exe 4092 mwdep.exe 4092 mwdep.exe 4092 mwdep.exe 4092 mwdep.exe 4092 mwdep.exe 4092 mwdep.exe 4092 mwdep.exe 4092 mwdep.exe 4092 mwdep.exe 4092 mwdep.exe 4092 mwdep.exe 4092 mwdep.exe 4092 mwdep.exe 4092 mwdep.exe 4092 mwdep.exe 4092 mwdep.exe 4092 mwdep.exe 4092 mwdep.exe 4092 mwdep.exe 4092 mwdep.exe 4092 mwdep.exe 4092 mwdep.exe 4092 mwdep.exe 4092 mwdep.exe 4092 mwdep.exe 4092 mwdep.exe 4092 mwdep.exe 4092 mwdep.exe 4092 mwdep.exe 4092 mwdep.exe 4092 mwdep.exe 4092 mwdep.exe 4092 mwdep.exe 4092 mwdep.exe 4092 mwdep.exe 4092 mwdep.exe 4092 mwdep.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3108 033d729bf0b64c4eb70fc866bbc9a427971e1dd0be43ff335f49b58300b473d0.exe 4092 mwdep.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3108 wrote to memory of 4092 3108 033d729bf0b64c4eb70fc866bbc9a427971e1dd0be43ff335f49b58300b473d0.exe 80 PID 3108 wrote to memory of 4092 3108 033d729bf0b64c4eb70fc866bbc9a427971e1dd0be43ff335f49b58300b473d0.exe 80 PID 3108 wrote to memory of 4092 3108 033d729bf0b64c4eb70fc866bbc9a427971e1dd0be43ff335f49b58300b473d0.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\033d729bf0b64c4eb70fc866bbc9a427971e1dd0be43ff335f49b58300b473d0.exe"C:\Users\Admin\AppData\Local\Temp\033d729bf0b64c4eb70fc866bbc9a427971e1dd0be43ff335f49b58300b473d0.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Users\Admin\mwdep.exe"C:\Users\Admin\mwdep.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4092
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
260KB
MD5cc783733b9274dd666c42476eeb29d96
SHA1d13f8ccf4d89b952c25fe61c5b79bda443c64f93
SHA25697c8055295db00158874d2db9ce68d70253d5f9f3916e52dc1ac1abf8f33b952
SHA5128e0c9740613f4e624181972a07f9b56f62fa9503a36496c9f8e06b53cb645bd0a6c945329c91f6815e174604eb04ef30fa58b4b7fc312df43f1c80af2799acda
-
Filesize
260KB
MD5cc783733b9274dd666c42476eeb29d96
SHA1d13f8ccf4d89b952c25fe61c5b79bda443c64f93
SHA25697c8055295db00158874d2db9ce68d70253d5f9f3916e52dc1ac1abf8f33b952
SHA5128e0c9740613f4e624181972a07f9b56f62fa9503a36496c9f8e06b53cb645bd0a6c945329c91f6815e174604eb04ef30fa58b4b7fc312df43f1c80af2799acda