Overview
overview
10Static
static
10020db58e3c...4c.exe
windows10-2004-x64
1006cbef0e90...f8.exe
windows10-2004-x64
9083c5b43df...fb.exe
windows10-2004-x64
1015cb04fa5c...4f.exe
windows10-2004-x64
922a1f50db9...85.exe
windows10-2004-x64
924cb5e44b6...8d.exe
windows10-2004-x64
1027c9f44e0c...d6.exe
windows10-2004-x64
102c2aa8458f...3d.exe
windows10-2004-x64
72e9e18954a...d1.exe
windows10-2004-x64
102ebb2a34dd...c6.exe
windows10-2004-x64
102fff52aa0c...21.exe
windows10-2004-x64
1037ca1cfa1f...60.exe
windows10-2004-x64
1038cd67a044...4c.exe
windows10-2004-x64
93d4f84e20d...96.exe
windows10-2004-x64
49cff73125...4b.exe
windows10-2004-x64
104c0153b979...a5.exe
windows10-2004-x64
104ded976d2e...5a.exe
windows10-2004-x64
104ee95ee627...68.exe
windows10-2004-x64
105b439daac4...d7.exe
windows10-2004-x64
1067df6d4554...78.exe
windows10-2004-x64
36b3bf710cf...2e.exe
windows10-2004-x64
76df64a0a92...fe.exe
windows10-2004-x64
1075b45fea60...34.exe
windows10-2004-x64
1082e6b71b99...5a.exe
windows10-2004-x64
108a6aa9e5d5...47.exe
windows10-2004-x64
108bcfb60733...fd.exe
windows10-2004-x64
108bf1319fd0...6c.exe
windows10-2004-x64
108d76a9a577...20.exe
windows10-2004-x64
108dd283ca01...4c.exe
windows10-2004-x64
108edaee2550...e7.exe
windows10-2004-x64
109bff71afad...75.exe
windows10-2004-x64
109d7fb7050c...20.exe
windows10-2004-x64
10Resubmissions
13-07-2024 09:54
240713-lxbx6swdmm 1013-07-2024 09:50
240713-lvbvdsyapd 1013-07-2024 09:46
240713-lr1dksyajd 10Analysis
-
max time kernel
93s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13-07-2024 09:46
Static task
static1
Behavioral task
behavioral1
Sample
020db58e3c552ead23b18bb04bb75781e51347dab4868d1fc55e2854a6647d4c.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
06cbef0e9051e2f54cf17e0d191f890d82cfec91bbc3e5bc429a2f364fd925f8.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
083c5b43df8bee2a6235c3f5038cc9860b4a4bfd1675d367a67fcfff93ccfcfb.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral4
Sample
15cb04fa5c58299e320c833b62a6e44ec67423aed9fcc969d5b90f4380ccf24f.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
22a1f50db97e2f91417a668d7c31379012b9f756d37a6697220b10aaf1f8b585.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral6
Sample
24cb5e44b68c9dd2a115de3415ee96e78d2180dfd287133c54dfa29c90c1088d.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
27c9f44e0c5de68792b684355a68ad83eba89cbe46cc9cf3a6efeb448c9f39d6.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral8
Sample
2c2aa8458f3d138a2cfaa38b2da75b541ccdad655b5db374733e4cecfb24833d.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
2e9e18954a73762ae06eaa6fa85c4dbdabf607fee4ec2ed016a689c7173dbfd1.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral10
Sample
2ebb2a34dd6633e785f67d118a8c778969e4e34d667cf554268997e13920a1c6.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
2fff52aa0c2fac4e53008cdf0bbea4ade2243bf42418330a03d5ce6f0d598421.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral12
Sample
37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
38cd67a044a7da3eea806129a3ae9616cfbe1f49a68997ac932e5214b1719f4c.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral14
Sample
3d4f84e20d5cf317edcefcc98bdd7e126078b25cdc56b816edbec532a8763096.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
49cff73125bdbed98cdda85572228372cecaedc8fa98fd48706fd23e6ad1ad4b.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral16
Sample
4c0153b979e65346c1d6f863086082ec5ef103cbf6b0f5e8652d61da678a8ca5.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
4ded976d2e5474b5ce1562ceb032981e23f170e7d6ec07fadd131aea82715a5a.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral18
Sample
4ee95ee6271482c7939ce3b9db210ffb7a73ceebb6500b978fa3e6fe1d6ea168.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
5b439daac4faa9078a6973301eaeed339f77bbbbcdaa46f3452c1fc90499a4d7.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral20
Sample
67df6d4554cb4c82c8f41d8257174c8c39059cd386744fc0f36ef84faede1478.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
6b3bf710cf4a0806b2c5eaa26d2d91ca57575248ff0298f6dee7180456f37d2e.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral22
Sample
6df64a0a921bd65006968d7eb146f7ceb60ffc1345575d39edec0eded41eb4fe.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral23
Sample
75b45fea6000b6cb5e88b786e164c777c410e11fdcf1ff99b66b43096223d734.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral24
Sample
82e6b71b99a6ec602cfbdc00e0bbaf34c719d7b6879b6e384004886d491ad45a.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
8a6aa9e5d58784428d0b1641e99f024438b20747993039e16b8d262f3f5fd347.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral26
Sample
8bcfb607330063b60948c0520fe2ccbce3562a9cc43a55ea45f16878fc6a9bfd.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
8bf1319fd0f77cd38f85d436e044f2d9e93e3f33844f20737117230b73b60f6c.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral28
Sample
8d76a9a577ea5ad52555a2824db6f5872548fe4bcc47d476cae57603386c4720.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
8dd283ca012e7a70a2673d2cc211c6a616ff23bc5bd3599a1da077ba946a044c.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral30
Sample
8edaee2550dde9df1fe2e8c26965be3817f0d66ba13510ac281bfdc8dde1dde7.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral31
Sample
9bff71afadddb02956bd74c517b4de581885b0d6ff007796d00d3c2190c30275.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral32
Sample
9d7fb7050cf315639502f812d25d49c19b14c93948827484c2514bbc87261920.exe
Resource
win10v2004-20240709-en
General
-
Target
22a1f50db97e2f91417a668d7c31379012b9f756d37a6697220b10aaf1f8b585.exe
-
Size
240KB
-
MD5
598b2a2bdfb474047a6d5b5f0469c27a
-
SHA1
a2d42ceb046e3bfcab1bb3dc9ef9e89f12e2bd66
-
SHA256
22a1f50db97e2f91417a668d7c31379012b9f756d37a6697220b10aaf1f8b585
-
SHA512
ff6930e0dd15d7fc23f3cd62b5213863ec0c59b8ada189960e52be1832c8a1b928ddb3debf9eca65bbd5203e7b191e55d79dd2c7592bed3e197bdfb5b200ddbf
-
SSDEEP
3072:PC4zn72NrvV9YhZv0FKbgx2HMdYlTYpu/EVarwBwCc45TEywugt45ZoIWpEzGVz1:Pn72NrvV9OCTE45Z1WpEKvmSx7ri
Malware Config
Signatures
-
Renames multiple (150) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\Control Panel\International\Geo\Nation 22a1f50db97e2f91417a668d7c31379012b9f756d37a6697220b10aaf1f8b585.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\discord = "C:\\Users\\Admin\\AppData\\Local\\discord.exe" 22a1f50db97e2f91417a668d7c31379012b9f756d37a6697220b10aaf1f8b585.exe -
Drops desktop.ini file(s) 10 IoCs
description ioc Process File created C:\Users\Admin\3D Objects\desktop.ini 22a1f50db97e2f91417a668d7c31379012b9f756d37a6697220b10aaf1f8b585.exe File created C:\Users\Admin\OneDrive\desktop.ini 22a1f50db97e2f91417a668d7c31379012b9f756d37a6697220b10aaf1f8b585.exe File created C:\Users\Admin\Desktop\desktop.ini 22a1f50db97e2f91417a668d7c31379012b9f756d37a6697220b10aaf1f8b585.exe File created C:\Users\Admin\Pictures\Saved Pictures\desktop.ini 22a1f50db97e2f91417a668d7c31379012b9f756d37a6697220b10aaf1f8b585.exe File created C:\Users\Admin\Videos\desktop.ini 22a1f50db97e2f91417a668d7c31379012b9f756d37a6697220b10aaf1f8b585.exe File created C:\Users\Admin\Pictures\Camera Roll\desktop.ini 22a1f50db97e2f91417a668d7c31379012b9f756d37a6697220b10aaf1f8b585.exe File created C:\Users\Admin\Music\desktop.ini 22a1f50db97e2f91417a668d7c31379012b9f756d37a6697220b10aaf1f8b585.exe File created C:\Users\Admin\Downloads\desktop.ini 22a1f50db97e2f91417a668d7c31379012b9f756d37a6697220b10aaf1f8b585.exe File created C:\Users\Admin\Documents\desktop.ini 22a1f50db97e2f91417a668d7c31379012b9f756d37a6697220b10aaf1f8b585.exe File created C:\Users\Admin\Pictures\desktop.ini 22a1f50db97e2f91417a668d7c31379012b9f756d37a6697220b10aaf1f8b585.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000_Classes\Local Settings 22a1f50db97e2f91417a668d7c31379012b9f756d37a6697220b10aaf1f8b585.exe -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\Ñ:\eulenCrack.exe cmd.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2916 NOTEPAD.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5000 22a1f50db97e2f91417a668d7c31379012b9f756d37a6697220b10aaf1f8b585.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5000 22a1f50db97e2f91417a668d7c31379012b9f756d37a6697220b10aaf1f8b585.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 5000 22a1f50db97e2f91417a668d7c31379012b9f756d37a6697220b10aaf1f8b585.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5000 wrote to memory of 2916 5000 22a1f50db97e2f91417a668d7c31379012b9f756d37a6697220b10aaf1f8b585.exe 86 PID 5000 wrote to memory of 2916 5000 22a1f50db97e2f91417a668d7c31379012b9f756d37a6697220b10aaf1f8b585.exe 86 PID 5000 wrote to memory of 2916 5000 22a1f50db97e2f91417a668d7c31379012b9f756d37a6697220b10aaf1f8b585.exe 86 PID 5000 wrote to memory of 4316 5000 22a1f50db97e2f91417a668d7c31379012b9f756d37a6697220b10aaf1f8b585.exe 87 PID 5000 wrote to memory of 4316 5000 22a1f50db97e2f91417a668d7c31379012b9f756d37a6697220b10aaf1f8b585.exe 87 PID 5000 wrote to memory of 4316 5000 22a1f50db97e2f91417a668d7c31379012b9f756d37a6697220b10aaf1f8b585.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\22a1f50db97e2f91417a668d7c31379012b9f756d37a6697220b10aaf1f8b585.exe"C:\Users\Admin\AppData\Local\Temp\22a1f50db97e2f91417a668d7c31379012b9f756d37a6697220b10aaf1f8b585.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Drops desktop.ini file(s)
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\README.txt2⤵
- Opens file in notepad (likely ransom note)
PID:2916
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\usb_maker.bat" "2⤵
- NTFS ADS
PID:4316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD58b926e674282e555448c3d236419cc02
SHA14a4e549641f3e780a6b1f1d02963919bd80919c3
SHA256a942687463c636d9ae805ed322285cb4454312924f9d6cdd8dfa28e5a9a4a925
SHA5125fa18988494427d99c2025d887484a8450042ccf52fd1883490f24dcbd5c61bf8a120a5b9edb15172957513f12db126e68677a5759349976af71cd0cdef0d162
-
Filesize
55B
MD5b93eb695a60a289d6ec60bf91ade3f47
SHA1162bbce41920668be61dd0c6cbf2686b3df721f0
SHA25665c12214995d2dca08255cbcce236746950a6a064b511fa9e98f7ce4d00ca3a1
SHA512b8aa02d79be5bee12a783c09dbad88774c07b1381760f4f4d8381a487911ee1403923bd75f1e4d27007ec1981be667fa9313fc635153c24ff6efddd202a58c15