Analysis
-
max time kernel
31s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2022 09:46
Static task
static1
Behavioral task
behavioral1
Sample
88ee10201f9de0dcd2ae332e70431316a05c5c5169a07b7f2b636b6e8ef7e96e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
88ee10201f9de0dcd2ae332e70431316a05c5c5169a07b7f2b636b6e8ef7e96e.exe
Resource
win10v2004-20220901-en
General
-
Target
88ee10201f9de0dcd2ae332e70431316a05c5c5169a07b7f2b636b6e8ef7e96e.exe
-
Size
172KB
-
MD5
ecfa3d3c258f1efb61df9848d865ffff
-
SHA1
93290b217d946b3d04a78a5750bab3b1a785d778
-
SHA256
88ee10201f9de0dcd2ae332e70431316a05c5c5169a07b7f2b636b6e8ef7e96e
-
SHA512
9c6a579d43746a88657736a56e8c44b610a3c33505853d966d66eeb0f2c85bf3da141e704e7df0c89f3a9acd2ab01be984975db45405bc6329a2838b7766bb2e
-
SSDEEP
3072:MzLFlCb3NwJAewZFIBtcH//2J399KVpT:+LU3mJxw5f/2Jt9Kz
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 88ee10201f9de0dcd2ae332e70431316a05c5c5169a07b7f2b636b6e8ef7e96e.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" tptem.exe -
Executes dropped EXE 1 IoCs
pid Process 5044 tptem.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 88ee10201f9de0dcd2ae332e70431316a05c5c5169a07b7f2b636b6e8ef7e96e.exe -
Adds Run key to start application 2 TTPs 17 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tptem = "C:\\Users\\Admin\\tptem.exe /p" tptem.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run\ tptem.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tptem = "C:\\Users\\Admin\\tptem.exe /h" tptem.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tptem = "C:\\Users\\Admin\\tptem.exe /g" tptem.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tptem = "C:\\Users\\Admin\\tptem.exe /x" tptem.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tptem = "C:\\Users\\Admin\\tptem.exe /m" tptem.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tptem = "C:\\Users\\Admin\\tptem.exe /a" tptem.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tptem = "C:\\Users\\Admin\\tptem.exe /u" tptem.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tptem = "C:\\Users\\Admin\\tptem.exe /w" tptem.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tptem = "C:\\Users\\Admin\\tptem.exe /v" tptem.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 88ee10201f9de0dcd2ae332e70431316a05c5c5169a07b7f2b636b6e8ef7e96e.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tptem = "C:\\Users\\Admin\\tptem.exe /n" 88ee10201f9de0dcd2ae332e70431316a05c5c5169a07b7f2b636b6e8ef7e96e.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tptem = "C:\\Users\\Admin\\tptem.exe /j" tptem.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tptem = "C:\\Users\\Admin\\tptem.exe /z" tptem.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tptem = "C:\\Users\\Admin\\tptem.exe /r" tptem.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tptem = "C:\\Users\\Admin\\tptem.exe /q" tptem.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tptem = "C:\\Users\\Admin\\tptem.exe /o" tptem.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 384 88ee10201f9de0dcd2ae332e70431316a05c5c5169a07b7f2b636b6e8ef7e96e.exe 384 88ee10201f9de0dcd2ae332e70431316a05c5c5169a07b7f2b636b6e8ef7e96e.exe 5044 tptem.exe 5044 tptem.exe 5044 tptem.exe 5044 tptem.exe 5044 tptem.exe 5044 tptem.exe 5044 tptem.exe 5044 tptem.exe 5044 tptem.exe 5044 tptem.exe 5044 tptem.exe 5044 tptem.exe 5044 tptem.exe 5044 tptem.exe 5044 tptem.exe 5044 tptem.exe 5044 tptem.exe 5044 tptem.exe 5044 tptem.exe 5044 tptem.exe 5044 tptem.exe 5044 tptem.exe 5044 tptem.exe 5044 tptem.exe 5044 tptem.exe 5044 tptem.exe 5044 tptem.exe 5044 tptem.exe 5044 tptem.exe 5044 tptem.exe 5044 tptem.exe 5044 tptem.exe 5044 tptem.exe 5044 tptem.exe 5044 tptem.exe 5044 tptem.exe 5044 tptem.exe 5044 tptem.exe 5044 tptem.exe 5044 tptem.exe 5044 tptem.exe 5044 tptem.exe 5044 tptem.exe 5044 tptem.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 384 88ee10201f9de0dcd2ae332e70431316a05c5c5169a07b7f2b636b6e8ef7e96e.exe 5044 tptem.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 384 wrote to memory of 5044 384 88ee10201f9de0dcd2ae332e70431316a05c5c5169a07b7f2b636b6e8ef7e96e.exe 81 PID 384 wrote to memory of 5044 384 88ee10201f9de0dcd2ae332e70431316a05c5c5169a07b7f2b636b6e8ef7e96e.exe 81 PID 384 wrote to memory of 5044 384 88ee10201f9de0dcd2ae332e70431316a05c5c5169a07b7f2b636b6e8ef7e96e.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\88ee10201f9de0dcd2ae332e70431316a05c5c5169a07b7f2b636b6e8ef7e96e.exe"C:\Users\Admin\AppData\Local\Temp\88ee10201f9de0dcd2ae332e70431316a05c5c5169a07b7f2b636b6e8ef7e96e.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Users\Admin\tptem.exe"C:\Users\Admin\tptem.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5044
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD503f2c4cd21a24edb4a5a25f688afe47e
SHA19a3b34f0c2a8e780c3cf547e17090fb9cf398af5
SHA25692f349f9df81338f8822f43eb03a215f1de0d573bce18ccdcc57c50497fc6b64
SHA51240b8cd9c5a86508ea472382bd7e643b0ac1702aa07539f2bf893bec1781b5e17dca5628391cf761c28e85e1bf3ba8443007c4e4e6e24a74e3d6ddae117df75eb
-
Filesize
172KB
MD503f2c4cd21a24edb4a5a25f688afe47e
SHA19a3b34f0c2a8e780c3cf547e17090fb9cf398af5
SHA25692f349f9df81338f8822f43eb03a215f1de0d573bce18ccdcc57c50497fc6b64
SHA51240b8cd9c5a86508ea472382bd7e643b0ac1702aa07539f2bf893bec1781b5e17dca5628391cf761c28e85e1bf3ba8443007c4e4e6e24a74e3d6ddae117df75eb