Analysis
-
max time kernel
72s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
19-02-2022 08:50
Static task
static1
Behavioral task
behavioral1
Sample
03059f141d8a25d75bb0ec98484bb6008da5dded3899576c700c80a0cbbc1dea.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
03059f141d8a25d75bb0ec98484bb6008da5dded3899576c700c80a0cbbc1dea.exe
Resource
win10v2004-en-20220113
General
-
Target
03059f141d8a25d75bb0ec98484bb6008da5dded3899576c700c80a0cbbc1dea.exe
-
Size
1.4MB
-
MD5
760cbfb1910baf7a2ab4e281c5c555b3
-
SHA1
cb77fbd21e24dd609f4f4de1cbefcb1f8f30aaf9
-
SHA256
03059f141d8a25d75bb0ec98484bb6008da5dded3899576c700c80a0cbbc1dea
-
SHA512
ce35e5217e5513fe96d2ae1e579d5697f5a88cf4d3085352a41eae73ae75ea259c7e497e01a1265aaaf145afd7c62db6252cfaa0d7a395b5360ac4842c895739
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1348 mQVvD.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation 03059f141d8a25d75bb0ec98484bb6008da5dded3899576c700c80a0cbbc1dea.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation mQVvD.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchos = "C:\\users\\Public\\mQVvD.exe" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1348 mQVvD.exe 1348 mQVvD.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1348 mQVvD.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4560 wrote to memory of 1348 4560 03059f141d8a25d75bb0ec98484bb6008da5dded3899576c700c80a0cbbc1dea.exe 85 PID 4560 wrote to memory of 1348 4560 03059f141d8a25d75bb0ec98484bb6008da5dded3899576c700c80a0cbbc1dea.exe 85 PID 1348 wrote to memory of 1896 1348 mQVvD.exe 86 PID 1348 wrote to memory of 1896 1348 mQVvD.exe 86 PID 1348 wrote to memory of 2340 1348 mQVvD.exe 33 PID 1896 wrote to memory of 3636 1896 cmd.exe 89 PID 1896 wrote to memory of 3636 1896 cmd.exe 89 PID 1348 wrote to memory of 2356 1348 mQVvD.exe 35
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2340
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\03059f141d8a25d75bb0ec98484bb6008da5dded3899576c700c80a0cbbc1dea.exe"C:\Users\Admin\AppData\Local\Temp\03059f141d8a25d75bb0ec98484bb6008da5dded3899576c700c80a0cbbc1dea.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\users\Public\mQVvD.exe"C:\users\Public\mQVvD.exe" C:\Users\Admin\AppData\Local\Temp\03059f141d8a25d75bb0ec98484bb6008da5dded3899576c700c80a0cbbc1dea.exe2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\users\Public\mQVvD.exe" /f3⤵
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\system32\reg.exeREG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\users\Public\mQVvD.exe" /f4⤵
- Adds Run key to start application
PID:3636
-
-
-