Analysis
-
max time kernel
152s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2022 11:58
Static task
static1
Behavioral task
behavioral1
Sample
2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe
Resource
win10v2004-20220901-en
General
-
Target
2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe
-
Size
1.1MB
-
MD5
3eaddb3179329c7da894faceb195e8f7
-
SHA1
4df9a59f4d8157f08e8668e396993e67b3798adc
-
SHA256
2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3
-
SHA512
066ff9953464a020e69a6a4de4ececa2d30236dc3829b16e3965f2b579f21f1613e523f2e3d5b7e8e0b5f458ef4214a49cc8d0fa01e8d7db8617d96aafe56cf7
-
SSDEEP
24576:KJeJfAqkjp98zHpieToVKkSBcJ9nPx/igrp:geJfAJGpL8VKBsnP8
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe regsvr.exe" 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe " 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "0" 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe -
Disables Task Manager via registry modification
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Msn Messsenger = "C:\\Windows\\system32\\regsvr.exe" 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\a: 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe File opened (read-only) \??\o: 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe File opened (read-only) \??\r: 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe File opened (read-only) \??\y: 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe File opened (read-only) \??\b: 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe File opened (read-only) \??\e: 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe File opened (read-only) \??\f: 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe File opened (read-only) \??\h: 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe File opened (read-only) \??\l: 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe File opened (read-only) \??\u: 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe File opened (read-only) \??\x: 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe File opened (read-only) \??\i: 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe File opened (read-only) \??\j: 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe File opened (read-only) \??\p: 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe File opened (read-only) \??\q: 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe File opened (read-only) \??\s: 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe File opened (read-only) \??\t: 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe File opened (read-only) \??\z: 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe File opened (read-only) \??\g: 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe File opened (read-only) \??\k: 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe File opened (read-only) \??\m: 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe File opened (read-only) \??\n: 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe File opened (read-only) \??\v: 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe File opened (read-only) \??\w: 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/4868-132-0x0000000000400000-0x00000000004BA000-memory.dmp autoit_exe behavioral2/memory/4868-137-0x0000000000400000-0x00000000004BA000-memory.dmp autoit_exe -
Drops file in System32 directory 8 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\regsvr.exe 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe File created C:\Windows\SysWOW64\svchost .exe 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe File opened for modification C:\Windows\SysWOW64\svchost .exe 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe File opened for modification C:\Windows\SysWOW64\setup.ini 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe File created C:\Windows\SysWOW64\setting.ini 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe File opened for modification C:\Windows\SysWOW64\setting.ini 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe File opened for modification C:\Windows\SysWOW64\28463 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe File created C:\Windows\SysWOW64\regsvr.exe 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\regsvr.exe 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe File opened for modification C:\Windows\regsvr.exe 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4868 wrote to memory of 4584 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 81 PID 4868 wrote to memory of 4584 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 81 PID 4868 wrote to memory of 4584 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 81 PID 4584 wrote to memory of 3244 4584 cmd.exe 83 PID 4584 wrote to memory of 3244 4584 cmd.exe 83 PID 4584 wrote to memory of 3244 4584 cmd.exe 83 PID 4868 wrote to memory of 3508 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 84 PID 4868 wrote to memory of 3508 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 84 PID 4868 wrote to memory of 3508 4868 2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe 84 PID 3508 wrote to memory of 612 3508 cmd.exe 86 PID 3508 wrote to memory of 612 3508 cmd.exe 86 PID 3508 wrote to memory of 612 3508 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe"C:\Users\Admin\AppData\Local\Temp\2404a64dc7eb01e38b3925e5a804f728a2ff0c91ffdad0169b44ffa30310ebe3.exe"1⤵
- Modifies WinLogon for persistence
- Disables RegEdit via registry modification
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT /delete /yes2⤵
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\SysWOW64\at.exeAT /delete /yes3⤵PID:3244
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\svchost .exe2⤵
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Windows\SysWOW64\at.exeAT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\svchost .exe3⤵PID:612
-
-