Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2023, 13:32
Behavioral task
behavioral1
Sample
24710356d2b88a67d0107cddc467cdc9.exe
Resource
win7-20230220-en
General
-
Target
24710356d2b88a67d0107cddc467cdc9.exe
-
Size
26KB
-
MD5
24710356d2b88a67d0107cddc467cdc9
-
SHA1
4e6f3384adfccf76198d00a03987781e3524105b
-
SHA256
3ad32746894dc3406c5a2b9bd3627c75e56887d2b92f0100e883d1cadbdad57b
-
SHA512
7abcc225cf02827801744d98f05816e0dd18602cbe567a6acb74ac9d49893a9eecbc67504847f24be6c62008c8482f72b3bb63eb0e694fb638d67e0df4c43e76
-
SSDEEP
384:r1LaRuc+oYiKJ0pjRB7Puth5M6ve1jCKsuatydbZN8Cr9131ctP1um7M84Sr6es8:rV+4foR6W1AJtIb4iEPg
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation 24710356d2b88a67d0107cddc467cdc9.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.lnk 24710356d2b88a67d0107cddc467cdc9.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.lnk sihost.exe -
Executes dropped EXE 1 IoCs
pid Process 4904 sihost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 33 IoCs
description pid Process Token: SeDebugPrivilege 4904 sihost.exe Token: 33 4904 sihost.exe Token: SeIncBasePriorityPrivilege 4904 sihost.exe Token: 33 4904 sihost.exe Token: SeIncBasePriorityPrivilege 4904 sihost.exe Token: 33 4904 sihost.exe Token: SeIncBasePriorityPrivilege 4904 sihost.exe Token: 33 4904 sihost.exe Token: SeIncBasePriorityPrivilege 4904 sihost.exe Token: 33 4904 sihost.exe Token: SeIncBasePriorityPrivilege 4904 sihost.exe Token: 33 4904 sihost.exe Token: SeIncBasePriorityPrivilege 4904 sihost.exe Token: 33 4904 sihost.exe Token: SeIncBasePriorityPrivilege 4904 sihost.exe Token: 33 4904 sihost.exe Token: SeIncBasePriorityPrivilege 4904 sihost.exe Token: 33 4904 sihost.exe Token: SeIncBasePriorityPrivilege 4904 sihost.exe Token: 33 4904 sihost.exe Token: SeIncBasePriorityPrivilege 4904 sihost.exe Token: 33 4904 sihost.exe Token: SeIncBasePriorityPrivilege 4904 sihost.exe Token: 33 4904 sihost.exe Token: SeIncBasePriorityPrivilege 4904 sihost.exe Token: 33 4904 sihost.exe Token: SeIncBasePriorityPrivilege 4904 sihost.exe Token: 33 4904 sihost.exe Token: SeIncBasePriorityPrivilege 4904 sihost.exe Token: 33 4904 sihost.exe Token: SeIncBasePriorityPrivilege 4904 sihost.exe Token: 33 4904 sihost.exe Token: SeIncBasePriorityPrivilege 4904 sihost.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3176 wrote to memory of 4904 3176 24710356d2b88a67d0107cddc467cdc9.exe 94 PID 3176 wrote to memory of 4904 3176 24710356d2b88a67d0107cddc467cdc9.exe 94 PID 3176 wrote to memory of 4904 3176 24710356d2b88a67d0107cddc467cdc9.exe 94 PID 3176 wrote to memory of 3696 3176 24710356d2b88a67d0107cddc467cdc9.exe 95 PID 3176 wrote to memory of 3696 3176 24710356d2b88a67d0107cddc467cdc9.exe 95 PID 3176 wrote to memory of 3696 3176 24710356d2b88a67d0107cddc467cdc9.exe 95 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 3696 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\24710356d2b88a67d0107cddc467cdc9.exe"C:\Users\Admin\AppData\Local\Temp\24710356d2b88a67d0107cddc467cdc9.exe"1⤵
- Checks computer location settings
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Users\Admin\AppData\Roaming\sihost.exe"C:\Users\Admin\AppData\Roaming\sihost.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4904
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Roaming\sihost.exe"2⤵
- Views/modifies file attributes
PID:3696
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5508a237605dfae8e1a3542015ad10336
SHA197a1df7577526c6f7294558258328cfa013563ac
SHA2564349e7126a1e6ff205d9bc8dc65262ce60bd1f376292b1f660e4c26c64596a75
SHA51242ccd46ce8f672ff7185e27fa813fe257e4b9b000717165cbd329979ad98144a6ad9fdbf5d903992e94b741b9e20369a258405699c518c914a95a6fc5183b3ac
-
Filesize
1020B
MD5405f13712e7504f837e4594b4cfb8e92
SHA1da176c45f57e123b76a0bb730ada862492a8cf82
SHA2560d73ba4a7dff41d64d8524e487216e33025325f231949ee04597ee75a589e2a6
SHA512f65ba065c52f5753166512c2c1b0c6fb55f012f6cd168b97362ce8db781dcc04a425df92c398521b7840368e421bd01671667e7f64678699d05f6bc20dcf0ad0
-
Filesize
26KB
MD524710356d2b88a67d0107cddc467cdc9
SHA14e6f3384adfccf76198d00a03987781e3524105b
SHA2563ad32746894dc3406c5a2b9bd3627c75e56887d2b92f0100e883d1cadbdad57b
SHA5127abcc225cf02827801744d98f05816e0dd18602cbe567a6acb74ac9d49893a9eecbc67504847f24be6c62008c8482f72b3bb63eb0e694fb638d67e0df4c43e76
-
Filesize
26KB
MD524710356d2b88a67d0107cddc467cdc9
SHA14e6f3384adfccf76198d00a03987781e3524105b
SHA2563ad32746894dc3406c5a2b9bd3627c75e56887d2b92f0100e883d1cadbdad57b
SHA5127abcc225cf02827801744d98f05816e0dd18602cbe567a6acb74ac9d49893a9eecbc67504847f24be6c62008c8482f72b3bb63eb0e694fb638d67e0df4c43e76
-
Filesize
26KB
MD524710356d2b88a67d0107cddc467cdc9
SHA14e6f3384adfccf76198d00a03987781e3524105b
SHA2563ad32746894dc3406c5a2b9bd3627c75e56887d2b92f0100e883d1cadbdad57b
SHA5127abcc225cf02827801744d98f05816e0dd18602cbe567a6acb74ac9d49893a9eecbc67504847f24be6c62008c8482f72b3bb63eb0e694fb638d67e0df4c43e76