Analysis
-
max time kernel
144s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2023 20:26
Static task
static1
Behavioral task
behavioral1
Sample
de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe
Resource
win7-20221111-en
General
-
Target
de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe
-
Size
4.8MB
-
MD5
94a2ebdbfca94ca574691295689b6b9c
-
SHA1
92fff5c4d9f2a4427a3b5317b3391d40197f5f6a
-
SHA256
de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2
-
SHA512
6dc1b78178e31219fa02635879b928622fa40bb7218dcf4cacc5490f47a25060c645ee21b4d0e72b32f25a82928ac43138b08faceba2a195d84cfeb5979a3675
-
SSDEEP
98304:lRA8Y/PdoOGmGHpmxf42MwZMHGI0T4Nu4lfPGb/wJGo+cvw:TAB1h6e42MW4C4M4Jeb6R
Malware Config
Extracted
bitrat
1.34
193.239.147.77:6505
-
communication_password
c398335f85d477cb4802c03bad3916fd
-
tor_process
tor
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exepid process 1696 de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe 1696 de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe 1696 de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe 1696 de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exedescription pid process target process PID 4868 set thread context of 1696 4868 de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exedescription pid process Token: SeShutdownPrivilege 1696 de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exepid process 1696 de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe 1696 de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exedescription pid process target process PID 4868 wrote to memory of 2276 4868 de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe schtasks.exe PID 4868 wrote to memory of 2276 4868 de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe schtasks.exe PID 4868 wrote to memory of 2276 4868 de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe schtasks.exe PID 4868 wrote to memory of 1696 4868 de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe PID 4868 wrote to memory of 1696 4868 de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe PID 4868 wrote to memory of 1696 4868 de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe PID 4868 wrote to memory of 1696 4868 de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe PID 4868 wrote to memory of 1696 4868 de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe PID 4868 wrote to memory of 1696 4868 de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe PID 4868 wrote to memory of 1696 4868 de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe PID 4868 wrote to memory of 1696 4868 de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe PID 4868 wrote to memory of 1696 4868 de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe PID 4868 wrote to memory of 1696 4868 de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe PID 4868 wrote to memory of 1696 4868 de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe"C:\Users\Admin\AppData\Local\Temp\de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\EExmhb" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4467.tmp"2⤵
- Creates scheduled task(s)
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe"C:\Users\Admin\AppData\Local\Temp\de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1696
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ba365bb9d5c48e32aa3d299d7697c61b
SHA1f878dc206df5806c7c69360da6e92a2a666d714d
SHA2566fc9042925a801b824230dea1cce8868a11babf7d1af83f52ea3a28b6f60e117
SHA5128bf872d8fd6e3f34c38723cba137ed080a5803564a95cc24c8fce4540fe5ae27c032cd065ef5e4c7152e51ba5df9eef6d8ee84c5cd0f6bb66bdd75eb39e1b131