Analysis
-
max time kernel
30s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
20-02-2022 01:58
Static task
static1
Behavioral task
behavioral1
Sample
d7953e6c5c6cca21de1b6db5639e70582ead7f02d4e5b3546d2ff285e283b50e.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
d7953e6c5c6cca21de1b6db5639e70582ead7f02d4e5b3546d2ff285e283b50e.exe
Resource
win10v2004-en-20220113
General
-
Target
d7953e6c5c6cca21de1b6db5639e70582ead7f02d4e5b3546d2ff285e283b50e.exe
-
Size
170KB
-
MD5
69693141762821147d2e79b9d4c76354
-
SHA1
ffe7d03662ebe8ff71f96f3f5994e17ca8129b9b
-
SHA256
d7953e6c5c6cca21de1b6db5639e70582ead7f02d4e5b3546d2ff285e283b50e
-
SHA512
503b604ffa13d67265513db6bef6b7e263bd10969a6002e5838798fa4ace12ce1963ddc0844412e252b5346d06b05ba48b70e52cc9aa580379d70a2e3517beff
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation d7953e6c5c6cca21de1b6db5639e70582ead7f02d4e5b3546d2ff285e283b50e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4292 d7953e6c5c6cca21de1b6db5639e70582ead7f02d4e5b3546d2ff285e283b50e.exe 4292 d7953e6c5c6cca21de1b6db5639e70582ead7f02d4e5b3546d2ff285e283b50e.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4292 d7953e6c5c6cca21de1b6db5639e70582ead7f02d4e5b3546d2ff285e283b50e.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4292 wrote to memory of 4332 4292 d7953e6c5c6cca21de1b6db5639e70582ead7f02d4e5b3546d2ff285e283b50e.exe 84 PID 4292 wrote to memory of 4332 4292 d7953e6c5c6cca21de1b6db5639e70582ead7f02d4e5b3546d2ff285e283b50e.exe 84 PID 4292 wrote to memory of 2288 4292 d7953e6c5c6cca21de1b6db5639e70582ead7f02d4e5b3546d2ff285e283b50e.exe 57 PID 4332 wrote to memory of 4888 4332 cmd.exe 86 PID 4332 wrote to memory of 4888 4332 cmd.exe 86 PID 4292 wrote to memory of 2324 4292 d7953e6c5c6cca21de1b6db5639e70582ead7f02d4e5b3546d2ff285e283b50e.exe 56 PID 4292 wrote to memory of 2416 4292 d7953e6c5c6cca21de1b6db5639e70582ead7f02d4e5b3546d2ff285e283b50e.exe 55
Processes
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2416
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2324
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\d7953e6c5c6cca21de1b6db5639e70582ead7f02d4e5b3546d2ff285e283b50e.exe"C:\Users\Admin\AppData\Local\Temp\d7953e6c5c6cca21de1b6db5639e70582ead7f02d4e5b3546d2ff285e283b50e.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\d7953e6c5c6cca21de1b6db5639e70582ead7f02d4e5b3546d2ff285e283b50e.exe" /f2⤵
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Windows\system32\reg.exeREG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\d7953e6c5c6cca21de1b6db5639e70582ead7f02d4e5b3546d2ff285e283b50e.exe" /f3⤵PID:4888
-
-