Overview
overview
10Static
static
324192519fe...d9.exe
windows7-x64
124192519fe...d9.exe
windows10-2004-x64
74da95447ef...97.exe
windows7-x64
14da95447ef...97.exe
windows10-2004-x64
37d9ee189fe...2b.exe
windows7-x64
17d9ee189fe...2b.exe
windows10-2004-x64
3aa682ef8ad...47.exe
windows7-x64
7aa682ef8ad...47.exe
windows10-2004-x64
10df37a01547...a5.exe
windows7-x64
1df37a01547...a5.exe
windows10-2004-x64
7efe1804b12...e3.exe
windows7-x64
7efe1804b12...e3.exe
windows10-2004-x64
7Analysis
-
max time kernel
144s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
23-03-2023 11:22
Behavioral task
behavioral1
Sample
24192519fe48742134f892876e8754d9.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
24192519fe48742134f892876e8754d9.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
4da95447ef335d683699e9ba3f352797.exe
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
4da95447ef335d683699e9ba3f352797.exe
Resource
win10v2004-20230221-en
Behavioral task
behavioral5
Sample
7d9ee189fe6bcd4d1dc07ba570684e2b.exe
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
7d9ee189fe6bcd4d1dc07ba570684e2b.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
aa682ef8adea6576fcbdd35c69c7be47.exe
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
aa682ef8adea6576fcbdd35c69c7be47.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
df37a01547bcba1097616ca2da4fd2a5.exe
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
df37a01547bcba1097616ca2da4fd2a5.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
efe1804b12286c2f920959073f6267e3.exe
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
efe1804b12286c2f920959073f6267e3.exe
Resource
win10v2004-20230220-en
General
-
Target
df37a01547bcba1097616ca2da4fd2a5.exe
-
Size
1.0MB
-
MD5
df37a01547bcba1097616ca2da4fd2a5
-
SHA1
faf0fcfd48cd639c2d3bba52b0693fd3e6011bea
-
SHA256
a7e1b48391e14f6d4531435b17ff22f4b4d2f522ee1c95edba21bb331acb5194
-
SHA512
f649436c7a7b162f3d7744ff3309b2c6f13f65ce38d2286c9299458ae3e76337ad493e79d6e58d04dcc6da4ef7dc66c381443f7fa50231d3de64cb87fca9d44b
-
SSDEEP
24576:/5Ctn/z/eJUqr2RX5ICkmnhWmwHH3QJOLQs+U6k7x:1xx
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
df37a01547bcba1097616ca2da4fd2a5.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation df37a01547bcba1097616ca2da4fd2a5.exe -
Executes dropped EXE 1 IoCs
Processes:
123123.exepid process 3560 123123.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 4892 timeout.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
Processes:
df37a01547bcba1097616ca2da4fd2a5.exepid process 2348 df37a01547bcba1097616ca2da4fd2a5.exe 2348 df37a01547bcba1097616ca2da4fd2a5.exe 2348 df37a01547bcba1097616ca2da4fd2a5.exe 2348 df37a01547bcba1097616ca2da4fd2a5.exe 2348 df37a01547bcba1097616ca2da4fd2a5.exe 2348 df37a01547bcba1097616ca2da4fd2a5.exe 2348 df37a01547bcba1097616ca2da4fd2a5.exe 2348 df37a01547bcba1097616ca2da4fd2a5.exe 2348 df37a01547bcba1097616ca2da4fd2a5.exe 2348 df37a01547bcba1097616ca2da4fd2a5.exe 2348 df37a01547bcba1097616ca2da4fd2a5.exe 2348 df37a01547bcba1097616ca2da4fd2a5.exe 2348 df37a01547bcba1097616ca2da4fd2a5.exe 2348 df37a01547bcba1097616ca2da4fd2a5.exe 2348 df37a01547bcba1097616ca2da4fd2a5.exe 2348 df37a01547bcba1097616ca2da4fd2a5.exe 2348 df37a01547bcba1097616ca2da4fd2a5.exe 2348 df37a01547bcba1097616ca2da4fd2a5.exe 2348 df37a01547bcba1097616ca2da4fd2a5.exe 2348 df37a01547bcba1097616ca2da4fd2a5.exe 2348 df37a01547bcba1097616ca2da4fd2a5.exe 2348 df37a01547bcba1097616ca2da4fd2a5.exe 2348 df37a01547bcba1097616ca2da4fd2a5.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
df37a01547bcba1097616ca2da4fd2a5.exe123123.exedescription pid process Token: SeDebugPrivilege 2348 df37a01547bcba1097616ca2da4fd2a5.exe Token: SeDebugPrivilege 3560 123123.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
df37a01547bcba1097616ca2da4fd2a5.execmd.execmd.exedescription pid process target process PID 2348 wrote to memory of 1072 2348 df37a01547bcba1097616ca2da4fd2a5.exe cmd.exe PID 2348 wrote to memory of 1072 2348 df37a01547bcba1097616ca2da4fd2a5.exe cmd.exe PID 2348 wrote to memory of 3584 2348 df37a01547bcba1097616ca2da4fd2a5.exe cmd.exe PID 2348 wrote to memory of 3584 2348 df37a01547bcba1097616ca2da4fd2a5.exe cmd.exe PID 3584 wrote to memory of 4892 3584 cmd.exe timeout.exe PID 3584 wrote to memory of 4892 3584 cmd.exe timeout.exe PID 1072 wrote to memory of 64 1072 cmd.exe schtasks.exe PID 1072 wrote to memory of 64 1072 cmd.exe schtasks.exe PID 3584 wrote to memory of 3560 3584 cmd.exe 123123.exe PID 3584 wrote to memory of 3560 3584 cmd.exe 123123.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\df37a01547bcba1097616ca2da4fd2a5.exe"C:\Users\Admin\AppData\Local\Temp\df37a01547bcba1097616ca2da4fd2a5.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "123123" /tr '"C:\Users\Admin\AppData\Roaming\123123.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "123123" /tr '"C:\Users\Admin\AppData\Roaming\123123.exe"'3⤵
- Creates scheduled task(s)
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpB1C.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Roaming\123123.exe"C:\Users\Admin\AppData\Roaming\123123.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpB1C.tmp.batFilesize
149B
MD59a14dbbd5f8271d929536120a15d06f5
SHA1ebac07092ddab29d75f4f21ddb7b5377ec457516
SHA256e36b1e9e4ca598b467f6858745a105857590a2a19c51e5eca488c789b463ed81
SHA51203689fdf7654cecfec96243eb5e2d632b879020a130e4dfcc38ec510302007ef0f041f731898818762eb8bfe8b951188680b7aad935418a126f660be33e0fc4f
-
C:\Users\Admin\AppData\Roaming\123123.exeFilesize
1.0MB
MD5df37a01547bcba1097616ca2da4fd2a5
SHA1faf0fcfd48cd639c2d3bba52b0693fd3e6011bea
SHA256a7e1b48391e14f6d4531435b17ff22f4b4d2f522ee1c95edba21bb331acb5194
SHA512f649436c7a7b162f3d7744ff3309b2c6f13f65ce38d2286c9299458ae3e76337ad493e79d6e58d04dcc6da4ef7dc66c381443f7fa50231d3de64cb87fca9d44b
-
C:\Users\Admin\AppData\Roaming\123123.exeFilesize
1.0MB
MD5df37a01547bcba1097616ca2da4fd2a5
SHA1faf0fcfd48cd639c2d3bba52b0693fd3e6011bea
SHA256a7e1b48391e14f6d4531435b17ff22f4b4d2f522ee1c95edba21bb331acb5194
SHA512f649436c7a7b162f3d7744ff3309b2c6f13f65ce38d2286c9299458ae3e76337ad493e79d6e58d04dcc6da4ef7dc66c381443f7fa50231d3de64cb87fca9d44b
-
memory/2348-136-0x000002996EA20000-0x000002996EA30000-memory.dmpFilesize
64KB
-
memory/2348-133-0x000002996D160000-0x000002996D17C000-memory.dmpFilesize
112KB
-
memory/2348-134-0x000002996EA20000-0x000002996EA30000-memory.dmpFilesize
64KB
-
memory/2348-135-0x000002996EA20000-0x000002996EA30000-memory.dmpFilesize
64KB
-
memory/3560-145-0x0000024A1E5F0000-0x0000024A1E600000-memory.dmpFilesize
64KB
-
memory/3560-146-0x0000024A1E5F0000-0x0000024A1E600000-memory.dmpFilesize
64KB
-
memory/3560-147-0x0000024A1E5F0000-0x0000024A1E600000-memory.dmpFilesize
64KB
-
memory/3560-148-0x0000024A1E5F0000-0x0000024A1E600000-memory.dmpFilesize
64KB
-
memory/3560-149-0x0000024A1E5F0000-0x0000024A1E600000-memory.dmpFilesize
64KB
-
memory/3560-150-0x0000024A1E5F0000-0x0000024A1E600000-memory.dmpFilesize
64KB