Analysis
-
max time kernel
65s -
max time network
72s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 19:33
Static task
static1
Behavioral task
behavioral1
Sample
9065c7b76919ec998a819f4493d9c8674cdbe3dc839d06369884bbebc6d73448.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9065c7b76919ec998a819f4493d9c8674cdbe3dc839d06369884bbebc6d73448.exe
Resource
win10v2004-20220812-en
Errors
General
-
Target
9065c7b76919ec998a819f4493d9c8674cdbe3dc839d06369884bbebc6d73448.exe
-
Size
82KB
-
MD5
1f27c6d65d9be36f26b485888af90b91
-
SHA1
307b1fef84c3b919186a8cc1c5334550f582ee77
-
SHA256
9065c7b76919ec998a819f4493d9c8674cdbe3dc839d06369884bbebc6d73448
-
SHA512
d660a1fc1c21957cff53fca9caedb37e76611131d90e35dfca4c59c1898eb89d579abbff19e1ab835d30cdf95eeff8cc4af67bda739f77207349b645c99a61ad
-
SSDEEP
768:70ak0ylH/nUI0XDnDyTrTyXVUDen7e4/R9vHLGVR9+3hJpktLHNu9rSyZl2zCkCb:7KrlHPU/Tn3XODwzRpER9iq0l2AHyP
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 9065c7b76919ec998a819f4493d9c8674cdbe3dc839d06369884bbebc6d73448.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2577523026 = "C:\\Users\\Admin\\2577523026.exe" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "169" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2152 9065c7b76919ec998a819f4493d9c8674cdbe3dc839d06369884bbebc6d73448.exe Token: SeShutdownPrivilege 2300 shutdown.exe Token: SeRemoteShutdownPrivilege 2300 shutdown.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2120 LogonUI.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2152 wrote to memory of 3292 2152 9065c7b76919ec998a819f4493d9c8674cdbe3dc839d06369884bbebc6d73448.exe 79 PID 2152 wrote to memory of 3292 2152 9065c7b76919ec998a819f4493d9c8674cdbe3dc839d06369884bbebc6d73448.exe 79 PID 2152 wrote to memory of 3292 2152 9065c7b76919ec998a819f4493d9c8674cdbe3dc839d06369884bbebc6d73448.exe 79 PID 3292 wrote to memory of 4920 3292 cmd.exe 81 PID 3292 wrote to memory of 4920 3292 cmd.exe 81 PID 3292 wrote to memory of 4920 3292 cmd.exe 81 PID 2152 wrote to memory of 2300 2152 9065c7b76919ec998a819f4493d9c8674cdbe3dc839d06369884bbebc6d73448.exe 82 PID 2152 wrote to memory of 2300 2152 9065c7b76919ec998a819f4493d9c8674cdbe3dc839d06369884bbebc6d73448.exe 82 PID 2152 wrote to memory of 2300 2152 9065c7b76919ec998a819f4493d9c8674cdbe3dc839d06369884bbebc6d73448.exe 82 PID 2152 wrote to memory of 5016 2152 9065c7b76919ec998a819f4493d9c8674cdbe3dc839d06369884bbebc6d73448.exe 84 PID 2152 wrote to memory of 5016 2152 9065c7b76919ec998a819f4493d9c8674cdbe3dc839d06369884bbebc6d73448.exe 84 PID 2152 wrote to memory of 5016 2152 9065c7b76919ec998a819f4493d9c8674cdbe3dc839d06369884bbebc6d73448.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\9065c7b76919ec998a819f4493d9c8674cdbe3dc839d06369884bbebc6d73448.exe"C:\Users\Admin\AppData\Local\Temp\9065c7b76919ec998a819f4493d9c8674cdbe3dc839d06369884bbebc6d73448.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\cmd.execmd.exe /c REG ADD HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v 2577523026 /t REG_SZ /d "%userprofile%\2577523026.exe" /f2⤵
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v 2577523026 /t REG_SZ /d "C:\Users\Admin\2577523026.exe" /f3⤵
- Adds Run key to start application
PID:4920
-
-
-
C:\Windows\SysWOW64\shutdown.exe"C:\Windows\System32\shutdown.exe" /r /f /t 32⤵
- Suspicious use of AdjustPrivilegeToken
PID:2300
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\9065C7~1.EXE > nul2⤵PID:5016
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa39f3055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:2120