Analysis
-
max time kernel
112s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
01-02-2023 14:47
Static task
static1
Behavioral task
behavioral1
Sample
a3a1f1bee14b0e117ca9698ca7d4a964.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a3a1f1bee14b0e117ca9698ca7d4a964.exe
Resource
win10v2004-20221111-en
General
-
Target
a3a1f1bee14b0e117ca9698ca7d4a964.exe
-
Size
2.7MB
-
MD5
a3a1f1bee14b0e117ca9698ca7d4a964
-
SHA1
c69838ade96ae8c914093516975929b84a86f098
-
SHA256
e5a5e82935acb5bf1706cd0e04a9bee5b0d995c4bf19ee3c363ceb9e6855ecab
-
SHA512
deaba5ffd966efaaabb864ac5886ebbb1c45f5286fb9a1897338d6fb6dcd733cd2f76ac769ca6795d3f7d1122c349879a339de1f8af9391853f3e2d448950773
-
SSDEEP
49152:dKfd3LCcCAwvevqw6m4OHoP45KBNu20Rt3CNuiO:ed3m06m4OIP45wN10Ro+
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Local\\System32\\RuntimeBroker.exe\"," a3a1f1bee14b0e117ca9698ca7d4a964.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation a3a1f1bee14b0e117ca9698ca7d4a964.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1980 set thread context of 3676 1980 a3a1f1bee14b0e117ca9698ca7d4a964.exe 84 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2800 powershell.exe 2800 powershell.exe 3676 a3a1f1bee14b0e117ca9698ca7d4a964.exe 3676 a3a1f1bee14b0e117ca9698ca7d4a964.exe 3676 a3a1f1bee14b0e117ca9698ca7d4a964.exe 3676 a3a1f1bee14b0e117ca9698ca7d4a964.exe 3676 a3a1f1bee14b0e117ca9698ca7d4a964.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2800 powershell.exe Token: SeDebugPrivilege 1980 a3a1f1bee14b0e117ca9698ca7d4a964.exe Token: SeDebugPrivilege 3676 a3a1f1bee14b0e117ca9698ca7d4a964.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1980 wrote to memory of 2800 1980 a3a1f1bee14b0e117ca9698ca7d4a964.exe 82 PID 1980 wrote to memory of 2800 1980 a3a1f1bee14b0e117ca9698ca7d4a964.exe 82 PID 1980 wrote to memory of 3676 1980 a3a1f1bee14b0e117ca9698ca7d4a964.exe 84 PID 1980 wrote to memory of 3676 1980 a3a1f1bee14b0e117ca9698ca7d4a964.exe 84 PID 1980 wrote to memory of 3676 1980 a3a1f1bee14b0e117ca9698ca7d4a964.exe 84 PID 1980 wrote to memory of 3676 1980 a3a1f1bee14b0e117ca9698ca7d4a964.exe 84 PID 1980 wrote to memory of 3676 1980 a3a1f1bee14b0e117ca9698ca7d4a964.exe 84 PID 1980 wrote to memory of 3676 1980 a3a1f1bee14b0e117ca9698ca7d4a964.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3a1f1bee14b0e117ca9698ca7d4a964.exe"C:\Users\Admin\AppData\Local\Temp\a3a1f1bee14b0e117ca9698ca7d4a964.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2800
-
-
C:\Users\Admin\AppData\Local\Temp\a3a1f1bee14b0e117ca9698ca7d4a964.exeC:\Users\Admin\AppData\Local\Temp\a3a1f1bee14b0e117ca9698ca7d4a964.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3676
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD577e686ae56571f3062d12e78a1521ab6
SHA1e58989b612e4a8fc880e1d9e74dddad546bc2cec
SHA2563890ac4a2b3e8c48b5531510af5e389b5ad4dc57d5ef166b05c2ebf61f20ba60
SHA5121219951d7ca3c1e3d0d482f607b423aee3f6cb8c31f63f7388e7d2dd26b9188a4f8093889a527efd8cddd94196d1fa0700cb99aadcc290a1ad326e0afcdf78a7