Analysis
-
max time kernel
37s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
20-02-2022 01:32
Static task
static1
Behavioral task
behavioral1
Sample
d4422c4f4a26aecad6e754dd172278305bacfa7d5ff285f6a74ed6c610307d59.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
d4422c4f4a26aecad6e754dd172278305bacfa7d5ff285f6a74ed6c610307d59.exe
Resource
win10v2004-en-20220113
General
-
Target
d4422c4f4a26aecad6e754dd172278305bacfa7d5ff285f6a74ed6c610307d59.exe
-
Size
147KB
-
MD5
ef372e7d0490bce48f6c11fe9f6c96c2
-
SHA1
7ad646e6654e982d10c0bd6d9941476064800ebe
-
SHA256
d4422c4f4a26aecad6e754dd172278305bacfa7d5ff285f6a74ed6c610307d59
-
SHA512
a9b0b45ddd4089b73897592162c947f6e8e1dbce5ee5548294b3dde7f2b06aa23c8fb10be947282514fdacdc1eabdc252ef7c24c11f5b3d87212c35f49212f36
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation d4422c4f4a26aecad6e754dd172278305bacfa7d5ff285f6a74ed6c610307d59.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchos = "C:\\Users\\Admin\\AppData\\Local\\Temp\\d4422c4f4a26aecad6e754dd172278305bacfa7d5ff285f6a74ed6c610307d59.exe" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1712 d4422c4f4a26aecad6e754dd172278305bacfa7d5ff285f6a74ed6c610307d59.exe 1712 d4422c4f4a26aecad6e754dd172278305bacfa7d5ff285f6a74ed6c610307d59.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1712 d4422c4f4a26aecad6e754dd172278305bacfa7d5ff285f6a74ed6c610307d59.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1712 wrote to memory of 4860 1712 d4422c4f4a26aecad6e754dd172278305bacfa7d5ff285f6a74ed6c610307d59.exe 83 PID 1712 wrote to memory of 4860 1712 d4422c4f4a26aecad6e754dd172278305bacfa7d5ff285f6a74ed6c610307d59.exe 83 PID 1712 wrote to memory of 2432 1712 d4422c4f4a26aecad6e754dd172278305bacfa7d5ff285f6a74ed6c610307d59.exe 52 PID 4860 wrote to memory of 4180 4860 cmd.exe 85 PID 4860 wrote to memory of 4180 4860 cmd.exe 85 PID 1712 wrote to memory of 2444 1712 d4422c4f4a26aecad6e754dd172278305bacfa7d5ff285f6a74ed6c610307d59.exe 51 PID 1712 wrote to memory of 2592 1712 d4422c4f4a26aecad6e754dd172278305bacfa7d5ff285f6a74ed6c610307d59.exe 48 PID 1712 wrote to memory of 3104 1712 d4422c4f4a26aecad6e754dd172278305bacfa7d5ff285f6a74ed6c610307d59.exe 42 PID 1712 wrote to memory of 3304 1712 d4422c4f4a26aecad6e754dd172278305bacfa7d5ff285f6a74ed6c610307d59.exe 41
Processes
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3304
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3104
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2592
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2444
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\d4422c4f4a26aecad6e754dd172278305bacfa7d5ff285f6a74ed6c610307d59.exe"C:\Users\Admin\AppData\Local\Temp\d4422c4f4a26aecad6e754dd172278305bacfa7d5ff285f6a74ed6c610307d59.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\d4422c4f4a26aecad6e754dd172278305bacfa7d5ff285f6a74ed6c610307d59.exe" /f2⤵
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Windows\system32\reg.exeREG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\d4422c4f4a26aecad6e754dd172278305bacfa7d5ff285f6a74ed6c610307d59.exe" /f3⤵
- Adds Run key to start application
PID:4180
-
-