Analysis
-
max time kernel
91s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2022 07:00
Static task
static1
Behavioral task
behavioral1
Sample
b77420a16dc2e3bed70e63fb428ff66c51ba35902c4467b86804e43d6d26b03a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b77420a16dc2e3bed70e63fb428ff66c51ba35902c4467b86804e43d6d26b03a.exe
Resource
win10v2004-20220812-en
General
-
Target
b77420a16dc2e3bed70e63fb428ff66c51ba35902c4467b86804e43d6d26b03a.exe
-
Size
477KB
-
MD5
acf13908b651c82d76391dda3574c6e0
-
SHA1
ff0d66a8e6b6ab2ea79cf5e4962047098b82a4ba
-
SHA256
b77420a16dc2e3bed70e63fb428ff66c51ba35902c4467b86804e43d6d26b03a
-
SHA512
2cc12305e375ff980a6edb39f676a90e249d76becfa0646f90623104a90229fc2af28feb10c08b6e4c32debbdcf9d67aa19e389352e70f7c75358fd9257533bf
-
SSDEEP
12288:w8blFZ0oXr/5NliDenCEkvjnVwEvLPwzJzu9OX2Ukx5vcEi0/3IWV2//c9Yc:w8blFZ0oXrHkjVwEvLPg3/O
Malware Config
Signatures
-
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\disableregistrytools = "1" reg.exe -
Disables Task Manager via registry modification
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\drivers\config.sys b77420a16dc2e3bed70e63fb428ff66c51ba35902c4467b86804e43d6d26b03a.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation b77420a16dc2e3bed70e63fb428ff66c51ba35902c4467b86804e43d6d26b03a.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SVXHOST = "C:\\Windows\\system32\\svxhost.exe" b77420a16dc2e3bed70e63fb428ff66c51ba35902c4467b86804e43d6d26b03a.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\svxhost.exe b77420a16dc2e3bed70e63fb428ff66c51ba35902c4467b86804e43d6d26b03a.exe File opened for modification C:\Windows\SysWOW64\svxhost.exe b77420a16dc2e3bed70e63fb428ff66c51ba35902c4467b86804e43d6d26b03a.exe File opened for modification C:\WINDOWS\SysWOW64\log.txt b77420a16dc2e3bed70e63fb428ff66c51ba35902c4467b86804e43d6d26b03a.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\up.cmd b77420a16dc2e3bed70e63fb428ff66c51ba35902c4467b86804e43d6d26b03a.exe File created C:\WINDOWS\syf.cmd b77420a16dc2e3bed70e63fb428ff66c51ba35902c4467b86804e43d6d26b03a.exe File created C:\WINDOWS\fresh.cmd b77420a16dc2e3bed70e63fb428ff66c51ba35902c4467b86804e43d6d26b03a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs .reg file with regedit 1 IoCs
pid Process 776 regedit.exe -
Runs net.exe
-
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 904 wrote to memory of 8 904 b77420a16dc2e3bed70e63fb428ff66c51ba35902c4467b86804e43d6d26b03a.exe 79 PID 904 wrote to memory of 8 904 b77420a16dc2e3bed70e63fb428ff66c51ba35902c4467b86804e43d6d26b03a.exe 79 PID 904 wrote to memory of 8 904 b77420a16dc2e3bed70e63fb428ff66c51ba35902c4467b86804e43d6d26b03a.exe 79 PID 904 wrote to memory of 1528 904 b77420a16dc2e3bed70e63fb428ff66c51ba35902c4467b86804e43d6d26b03a.exe 81 PID 904 wrote to memory of 1528 904 b77420a16dc2e3bed70e63fb428ff66c51ba35902c4467b86804e43d6d26b03a.exe 81 PID 904 wrote to memory of 1528 904 b77420a16dc2e3bed70e63fb428ff66c51ba35902c4467b86804e43d6d26b03a.exe 81 PID 8 wrote to memory of 1652 8 cmd.exe 83 PID 8 wrote to memory of 1652 8 cmd.exe 83 PID 8 wrote to memory of 1652 8 cmd.exe 83 PID 1528 wrote to memory of 4984 1528 cmd.exe 84 PID 1528 wrote to memory of 4984 1528 cmd.exe 84 PID 1528 wrote to memory of 4984 1528 cmd.exe 84 PID 4984 wrote to memory of 3516 4984 net.exe 85 PID 4984 wrote to memory of 3516 4984 net.exe 85 PID 4984 wrote to memory of 3516 4984 net.exe 85 PID 1528 wrote to memory of 1460 1528 cmd.exe 86 PID 1528 wrote to memory of 1460 1528 cmd.exe 86 PID 1528 wrote to memory of 1460 1528 cmd.exe 86 PID 1460 wrote to memory of 3520 1460 net.exe 87 PID 1460 wrote to memory of 3520 1460 net.exe 87 PID 1460 wrote to memory of 3520 1460 net.exe 87 PID 1528 wrote to memory of 776 1528 cmd.exe 88 PID 1528 wrote to memory of 776 1528 cmd.exe 88 PID 1528 wrote to memory of 776 1528 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\b77420a16dc2e3bed70e63fb428ff66c51ba35902c4467b86804e43d6d26b03a.exe"C:\Users\Admin\AppData\Local\Temp\b77420a16dc2e3bed70e63fb428ff66c51ba35902c4467b86804e43d6d26b03a.exe"1⤵
- Drops file in Drivers directory
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\WINDOWS\syf.cmd" "2⤵
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Windows\SysWOW64\reg.exereg add HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v disableregistrytools /t REG_DWORD /d 1 /f3⤵
- Disables RegEdit via registry modification
PID:1652
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\WINDOWS\up.cmd" "2⤵
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\net.exenet stop Security Center3⤵
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Security Center4⤵PID:3516
-
-
-
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵PID:3520
-
-
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp.\kij.reg3⤵
- Runs .reg file with regedit
PID:776
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
277B
MD5760776cff6f8d1efeb385795571eab6b
SHA1d46945b4718ec40a04817473db3b3a8aed04e4cf
SHA2567e1d14fa4078548b582f6767d786c82b1162333993ce68ba812a26671f6d0d0c
SHA512cf72f32cd041d2ec728a9099453c4c105b691bd7fd839823e449dc852d39e7d38de61f1856f9e64ef5067cf967903c9a449a41450014507fb9510fbad1f3d3df
-
Filesize
146B
MD598909a52071d95321d93fb925a6a08c6
SHA13005d9f32dbaafd9b635165706cfaf1ee845259f
SHA2566e505012e027a6d94bdbdc62008ed3188cb50768afc8cfa045ea82c4775f4ea9
SHA512ff7cfeebe358375a0f1492d240b47787f5632228fc40cdc606f37c420dbd99b83bd375e77fb4b6f53af7c6990a859f58fdd1d67c4a02ba0fa970fe409de24524
-
Filesize
659B
MD53317900ab5df93f2b01c17e2419c1416
SHA150835be300f4188de57777610bd113e3177b3e78
SHA25650685526578bcbccfbae644ea19d63b3c87a312fecbfde8ca81ed58249a5b6ac
SHA51296bcdd5afcdb97b2d51d25d784824518b7df346189b3f0f43573236e0bd841daeb70a8e1e368d8bc8025a1cef4fac6aebc36382679492c78d4f56b95333b2614