Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2022 17:49
Static task
static1
Behavioral task
behavioral1
Sample
Ogtnuzcwp.exe
Resource
win10v2004-20220901-en
windows10-2004-x64
9 signatures
150 seconds
General
-
Target
Ogtnuzcwp.exe
-
Size
191.5MB
-
MD5
b7942b563ef73b7df7f0abce7fc7290b
-
SHA1
339d4ef4a46aefc0aec231b5bbacd4cdb788706e
-
SHA256
72aef4d4f2fe2f4efdd52202964e7ecf6ec9f3e9ca95c8ca27ac571c4405fd9a
-
SHA512
4f8f892b19a9b457e97cf2cd5033188d68516d78eef61377e7df75290e9dc28f3e4d7780cc0e901ca80e55a5f293b3ffa279ed56997c1b376df8ccefed882ec5
-
SSDEEP
49152:BkQTA+pPOabdz+k/sYjI8IKJY/MNQqQUl1:BaPabdz+k/ELKJcsv
Score
10/10
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Roaming\\Hpyjpn\\Ogtnuzcwp.exe\"," Ogtnuzcwp.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" InstallUtil.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Ogtnuzcwp.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 21 eth0.me -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4556 set thread context of 3532 4556 Ogtnuzcwp.exe 84 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5036 powershell.exe 5036 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4556 Ogtnuzcwp.exe Token: SeDebugPrivilege 5036 powershell.exe Token: SeDebugPrivilege 3532 InstallUtil.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4556 wrote to memory of 3360 4556 Ogtnuzcwp.exe 81 PID 4556 wrote to memory of 3360 4556 Ogtnuzcwp.exe 81 PID 4556 wrote to memory of 3360 4556 Ogtnuzcwp.exe 81 PID 3360 wrote to memory of 5036 3360 cmd.exe 83 PID 3360 wrote to memory of 5036 3360 cmd.exe 83 PID 3360 wrote to memory of 5036 3360 cmd.exe 83 PID 4556 wrote to memory of 3532 4556 Ogtnuzcwp.exe 84 PID 4556 wrote to memory of 3532 4556 Ogtnuzcwp.exe 84 PID 4556 wrote to memory of 3532 4556 Ogtnuzcwp.exe 84 PID 4556 wrote to memory of 3532 4556 Ogtnuzcwp.exe 84 PID 4556 wrote to memory of 3532 4556 Ogtnuzcwp.exe 84 PID 4556 wrote to memory of 3532 4556 Ogtnuzcwp.exe 84 PID 4556 wrote to memory of 3532 4556 Ogtnuzcwp.exe 84 PID 4556 wrote to memory of 3532 4556 Ogtnuzcwp.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\Ogtnuzcwp.exe"C:\Users\Admin\AppData\Local\Temp\Ogtnuzcwp.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell -ENC cwBlAHQALQBtAHAAcAByAGUAZgBlAHIAZQBuAGMAZQAgAC0AZQB4AGMAbAB1AHMAaQBvAG4AcABhAHQAaAAgAEMAOgBcAA==2⤵
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -ENC cwBlAHQALQBtAHAAcAByAGUAZgBlAHIAZQBuAGMAZQAgAC0AZQB4AGMAbAB1AHMAaQBvAG4AcABhAHQAaAAgAEMAOgBcAA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5036
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵
- UAC bypass
- Suspicious use of AdjustPrivilegeToken
PID:3532
-