Analysis
-
max time kernel
108s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
14/01/2023, 09:22
Static task
static1
Behavioral task
behavioral1
Sample
804826c7da65f0ef6aba984fc65cd2e701f4d26ef52fedd3dcea5808c4c70542.exe
Resource
win10v2004-20221111-en
General
-
Target
804826c7da65f0ef6aba984fc65cd2e701f4d26ef52fedd3dcea5808c4c70542.exe
-
Size
5.7MB
-
MD5
0b58bcd32bc93b428e389f8976665749
-
SHA1
8e7d64a9d31d71ca9048cb1a52893ab763869153
-
SHA256
804826c7da65f0ef6aba984fc65cd2e701f4d26ef52fedd3dcea5808c4c70542
-
SHA512
fb8aadc29d76a0b03b417560b885c90767752dc7d8c3fc289bc76f14d54240c90d0779ee2ca1846cf69750085896cfa6711e4bcc5bdacab024df7b4a59255a2f
-
SSDEEP
98304:I0LLudgk03bPi/IIZKySE89KUXPf8L5gaXjelb4e+LfvfyW8A/:I0cg53b6/ImKRHnoKHl/2d
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3980 WindowsPaint-Ver2.0.1.8.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 804826c7da65f0ef6aba984fc65cd2e701f4d26ef52fedd3dcea5808c4c70542.exe -
Modifies file permissions 1 TTPs 3 IoCs
pid Process 4936 icacls.exe 3152 icacls.exe 872 icacls.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4684 schtasks.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4740 wrote to memory of 4684 4740 804826c7da65f0ef6aba984fc65cd2e701f4d26ef52fedd3dcea5808c4c70542.exe 82 PID 4740 wrote to memory of 4684 4740 804826c7da65f0ef6aba984fc65cd2e701f4d26ef52fedd3dcea5808c4c70542.exe 82 PID 4740 wrote to memory of 4936 4740 804826c7da65f0ef6aba984fc65cd2e701f4d26ef52fedd3dcea5808c4c70542.exe 84 PID 4740 wrote to memory of 4936 4740 804826c7da65f0ef6aba984fc65cd2e701f4d26ef52fedd3dcea5808c4c70542.exe 84 PID 4740 wrote to memory of 3152 4740 804826c7da65f0ef6aba984fc65cd2e701f4d26ef52fedd3dcea5808c4c70542.exe 86 PID 4740 wrote to memory of 3152 4740 804826c7da65f0ef6aba984fc65cd2e701f4d26ef52fedd3dcea5808c4c70542.exe 86 PID 4740 wrote to memory of 872 4740 804826c7da65f0ef6aba984fc65cd2e701f4d26ef52fedd3dcea5808c4c70542.exe 88 PID 4740 wrote to memory of 872 4740 804826c7da65f0ef6aba984fc65cd2e701f4d26ef52fedd3dcea5808c4c70542.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\804826c7da65f0ef6aba984fc65cd2e701f4d26ef52fedd3dcea5808c4c70542.exe"C:\Users\Admin\AppData\Local\Temp\804826c7da65f0ef6aba984fc65cd2e701f4d26ef52fedd3dcea5808c4c70542.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /TN "Windows\IntelComputingTooIklt\IntelPaint2.0.1.8." /TR "C:\ProgramData\MsiBoostSasum\WindowsPaint-Ver2.0.1.8.exe" /SC MINUTE2⤵
- Creates scheduled task(s)
PID:4684
-
-
C:\Windows\System32\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\MsiBoostSasum" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"2⤵
- Modifies file permissions
PID:4936
-
-
C:\Windows\System32\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\MsiBoostSasum" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"2⤵
- Modifies file permissions
PID:3152
-
-
C:\Windows\System32\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\MsiBoostSasum" /inheritance:e /deny "admin:(R,REA,RA,RD)"2⤵
- Modifies file permissions
PID:872
-
-
C:\ProgramData\MsiBoostSasum\WindowsPaint-Ver2.0.1.8.exeC:\ProgramData\MsiBoostSasum\WindowsPaint-Ver2.0.1.8.exe1⤵
- Executes dropped EXE
PID:3980
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
568.8MB
MD502281127a2516e07ae1e5916e2b2a415
SHA14e8a23ecdc6215134be708996e3b35e0facea11c
SHA256ff7398da090885fd0e0e8c59bb2339c354a0dc2ca715aba86aa9d9a04e5bfa9f
SHA512372c04345ecbe405dad3626b2f91cfb1be438b39a869c1a4740de22bc29a42deb1cb7eee998269fe0f5ea4c08d5b2e947908c716dad5451ed025e612e115333a
-
Filesize
568.8MB
MD502281127a2516e07ae1e5916e2b2a415
SHA14e8a23ecdc6215134be708996e3b35e0facea11c
SHA256ff7398da090885fd0e0e8c59bb2339c354a0dc2ca715aba86aa9d9a04e5bfa9f
SHA512372c04345ecbe405dad3626b2f91cfb1be438b39a869c1a4740de22bc29a42deb1cb7eee998269fe0f5ea4c08d5b2e947908c716dad5451ed025e612e115333a