Overview
overview
10Static
static
324192519fe...d9.exe
windows7-x64
124192519fe...d9.exe
windows10-2004-x64
74da95447ef...97.exe
windows7-x64
14da95447ef...97.exe
windows10-2004-x64
37d9ee189fe...2b.exe
windows7-x64
17d9ee189fe...2b.exe
windows10-2004-x64
3aa682ef8ad...47.exe
windows7-x64
7aa682ef8ad...47.exe
windows10-2004-x64
10df37a01547...a5.exe
windows7-x64
1df37a01547...a5.exe
windows10-2004-x64
7efe1804b12...e3.exe
windows7-x64
7efe1804b12...e3.exe
windows10-2004-x64
7Analysis
-
max time kernel
143s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
23-03-2023 11:22
Behavioral task
behavioral1
Sample
24192519fe48742134f892876e8754d9.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
24192519fe48742134f892876e8754d9.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
4da95447ef335d683699e9ba3f352797.exe
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
4da95447ef335d683699e9ba3f352797.exe
Resource
win10v2004-20230221-en
Behavioral task
behavioral5
Sample
7d9ee189fe6bcd4d1dc07ba570684e2b.exe
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
7d9ee189fe6bcd4d1dc07ba570684e2b.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
aa682ef8adea6576fcbdd35c69c7be47.exe
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
aa682ef8adea6576fcbdd35c69c7be47.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
df37a01547bcba1097616ca2da4fd2a5.exe
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
df37a01547bcba1097616ca2da4fd2a5.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
efe1804b12286c2f920959073f6267e3.exe
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
efe1804b12286c2f920959073f6267e3.exe
Resource
win10v2004-20230220-en
General
-
Target
24192519fe48742134f892876e8754d9.exe
-
Size
1.0MB
-
MD5
24192519fe48742134f892876e8754d9
-
SHA1
cbe590d7c8682dad2d05c759df8afaf0a4b9e8a5
-
SHA256
0516bfd184b5240a1c441d9035faf17272bdb01651ad4458b85c59e6c27988bc
-
SHA512
01c4c300fa2d9747eed1aa8d489f1d95fbe70b9166e16b2117173c35dcaa64c8c1737b367ff8f117940b40383c883b4f52edb743ec97ac6049f737ad76440cf5
-
SSDEEP
24576:75Ctn/z/eJUqr2RX5ICkmnhWmwHH3QJOLQs+U6k7xF:pxxF
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
24192519fe48742134f892876e8754d9.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation 24192519fe48742134f892876e8754d9.exe -
Executes dropped EXE 1 IoCs
Processes:
123123.exepid process 236 123123.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 3104 timeout.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
Processes:
24192519fe48742134f892876e8754d9.exepid process 3668 24192519fe48742134f892876e8754d9.exe 3668 24192519fe48742134f892876e8754d9.exe 3668 24192519fe48742134f892876e8754d9.exe 3668 24192519fe48742134f892876e8754d9.exe 3668 24192519fe48742134f892876e8754d9.exe 3668 24192519fe48742134f892876e8754d9.exe 3668 24192519fe48742134f892876e8754d9.exe 3668 24192519fe48742134f892876e8754d9.exe 3668 24192519fe48742134f892876e8754d9.exe 3668 24192519fe48742134f892876e8754d9.exe 3668 24192519fe48742134f892876e8754d9.exe 3668 24192519fe48742134f892876e8754d9.exe 3668 24192519fe48742134f892876e8754d9.exe 3668 24192519fe48742134f892876e8754d9.exe 3668 24192519fe48742134f892876e8754d9.exe 3668 24192519fe48742134f892876e8754d9.exe 3668 24192519fe48742134f892876e8754d9.exe 3668 24192519fe48742134f892876e8754d9.exe 3668 24192519fe48742134f892876e8754d9.exe 3668 24192519fe48742134f892876e8754d9.exe 3668 24192519fe48742134f892876e8754d9.exe 3668 24192519fe48742134f892876e8754d9.exe 3668 24192519fe48742134f892876e8754d9.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
24192519fe48742134f892876e8754d9.exe123123.exedescription pid process Token: SeDebugPrivilege 3668 24192519fe48742134f892876e8754d9.exe Token: SeDebugPrivilege 236 123123.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
24192519fe48742134f892876e8754d9.execmd.execmd.exedescription pid process target process PID 3668 wrote to memory of 1116 3668 24192519fe48742134f892876e8754d9.exe cmd.exe PID 3668 wrote to memory of 1116 3668 24192519fe48742134f892876e8754d9.exe cmd.exe PID 3668 wrote to memory of 3340 3668 24192519fe48742134f892876e8754d9.exe cmd.exe PID 3668 wrote to memory of 3340 3668 24192519fe48742134f892876e8754d9.exe cmd.exe PID 1116 wrote to memory of 1348 1116 cmd.exe schtasks.exe PID 1116 wrote to memory of 1348 1116 cmd.exe schtasks.exe PID 3340 wrote to memory of 3104 3340 cmd.exe timeout.exe PID 3340 wrote to memory of 3104 3340 cmd.exe timeout.exe PID 3340 wrote to memory of 236 3340 cmd.exe 123123.exe PID 3340 wrote to memory of 236 3340 cmd.exe 123123.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\24192519fe48742134f892876e8754d9.exe"C:\Users\Admin\AppData\Local\Temp\24192519fe48742134f892876e8754d9.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "123123" /tr '"C:\Users\Admin\AppData\Roaming\123123.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "123123" /tr '"C:\Users\Admin\AppData\Roaming\123123.exe"'3⤵
- Creates scheduled task(s)
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp9DCB.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Roaming\123123.exe"C:\Users\Admin\AppData\Roaming\123123.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp9DCB.tmp.batFilesize
150B
MD53567c68467a75c7f0e65b0250649c98c
SHA15c507fe31d916d5bb0add1a56ea4894e8e93bf11
SHA256186d84560a614c5f8ed96e2e286adaf0684aaa03e4c2e76da967cb16b3e7b4da
SHA512e3b893ced6c9f2a072f12a4e483e37982da34da166c0bfb79fb8d5b99ffb59e17cb9a7f03c50d6248a0e311d7df1c7674a4447bf287c269498c50e274a01d5b7
-
C:\Users\Admin\AppData\Roaming\123123.exeFilesize
1.0MB
MD524192519fe48742134f892876e8754d9
SHA1cbe590d7c8682dad2d05c759df8afaf0a4b9e8a5
SHA2560516bfd184b5240a1c441d9035faf17272bdb01651ad4458b85c59e6c27988bc
SHA51201c4c300fa2d9747eed1aa8d489f1d95fbe70b9166e16b2117173c35dcaa64c8c1737b367ff8f117940b40383c883b4f52edb743ec97ac6049f737ad76440cf5
-
C:\Users\Admin\AppData\Roaming\123123.exeFilesize
1.0MB
MD524192519fe48742134f892876e8754d9
SHA1cbe590d7c8682dad2d05c759df8afaf0a4b9e8a5
SHA2560516bfd184b5240a1c441d9035faf17272bdb01651ad4458b85c59e6c27988bc
SHA51201c4c300fa2d9747eed1aa8d489f1d95fbe70b9166e16b2117173c35dcaa64c8c1737b367ff8f117940b40383c883b4f52edb743ec97ac6049f737ad76440cf5
-
memory/236-147-0x000001C3E9F20000-0x000001C3E9F30000-memory.dmpFilesize
64KB
-
memory/236-145-0x000001C3E9F20000-0x000001C3E9F30000-memory.dmpFilesize
64KB
-
memory/236-146-0x000001C3E9F20000-0x000001C3E9F30000-memory.dmpFilesize
64KB
-
memory/236-148-0x000001C3E9F20000-0x000001C3E9F30000-memory.dmpFilesize
64KB
-
memory/236-149-0x000001C3E9F20000-0x000001C3E9F30000-memory.dmpFilesize
64KB
-
memory/236-150-0x000001C3E9F20000-0x000001C3E9F30000-memory.dmpFilesize
64KB
-
memory/3668-136-0x000002E06E630000-0x000002E06E640000-memory.dmpFilesize
64KB
-
memory/3668-135-0x000002E06E630000-0x000002E06E640000-memory.dmpFilesize
64KB
-
memory/3668-134-0x000002E06E630000-0x000002E06E640000-memory.dmpFilesize
64KB
-
memory/3668-133-0x000002E06CAF0000-0x000002E06CB0C000-memory.dmpFilesize
112KB