Analysis
-
max time kernel
4264987s -
max time network
44s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
17-01-2022 06:42
Static task
static1
Behavioral task
behavioral1
Sample
6a571c4f162b1cd1c46abf16add0c1c1.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
6a571c4f162b1cd1c46abf16add0c1c1.exe
Resource
win10v2004-en-20220113
General
-
Target
6a571c4f162b1cd1c46abf16add0c1c1.exe
-
Size
4.1MB
-
MD5
6a571c4f162b1cd1c46abf16add0c1c1
-
SHA1
4ff32013415028c03f5687535f3d144623c1e081
-
SHA256
3ec3d7b4b3eeae490ae2f97ac7d52c0bec674384225d26a68d7b89ec84c60eaa
-
SHA512
97e387cd027ad83ae90fe016bbdd246195e566ad4b0764015751277ca39906ba17648b2a2e9943015f00b58b0c5610ff636a8b065e8d452f993cf61b46f999b9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2088 321.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation 6a571c4f162b1cd1c46abf16add0c1c1.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MusNotification.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MusNotification.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings 6a571c4f162b1cd1c46abf16add0c1c1.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3936 wrote to memory of 3632 3936 6a571c4f162b1cd1c46abf16add0c1c1.exe 56 PID 3936 wrote to memory of 3632 3936 6a571c4f162b1cd1c46abf16add0c1c1.exe 56 PID 3936 wrote to memory of 3632 3936 6a571c4f162b1cd1c46abf16add0c1c1.exe 56 PID 3936 wrote to memory of 2088 3936 6a571c4f162b1cd1c46abf16add0c1c1.exe 63 PID 3936 wrote to memory of 2088 3936 6a571c4f162b1cd1c46abf16add0c1c1.exe 63 PID 3936 wrote to memory of 2088 3936 6a571c4f162b1cd1c46abf16add0c1c1.exe 63
Processes
-
C:\Users\Admin\AppData\Local\Temp\6a571c4f162b1cd1c46abf16add0c1c1.exe"C:\Users\Admin\AppData\Local\Temp\6a571c4f162b1cd1c46abf16add0c1c1.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\lll.vbs"2⤵PID:3632
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\321.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\321.exe"2⤵
- Executes dropped EXE
PID:2088
-
-
C:\Windows\system32\MusNotification.exeC:\Windows\system32\MusNotification.exe1⤵
- Checks processor information in registry
PID:1788