Analysis
-
max time kernel
48s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
20-02-2022 02:28
Static task
static1
Behavioral task
behavioral1
Sample
c12ea811bbe3c730529545f379aa852ed85c6ae5d45307dd45cc13ca0cd6ccd0.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
c12ea811bbe3c730529545f379aa852ed85c6ae5d45307dd45cc13ca0cd6ccd0.exe
Resource
win10v2004-en-20220113
General
-
Target
c12ea811bbe3c730529545f379aa852ed85c6ae5d45307dd45cc13ca0cd6ccd0.exe
-
Size
315KB
-
MD5
9412504a6d0ba4a5526c42b032ae51de
-
SHA1
3cc1f29877ed739f0fee3250b2cbc648f9f014f1
-
SHA256
c12ea811bbe3c730529545f379aa852ed85c6ae5d45307dd45cc13ca0cd6ccd0
-
SHA512
52f77c8c4e8308afd4ed928e2c94c44594ad9185b8a8ede24c7185f8ba4d225ac58f5c3cf80a228c1cd2b78df7910c296eefdac4e623cf4d0116d9c2df647a71
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
c12ea811bbe3c730529545f379aa852ed85c6ae5d45307dd45cc13ca0cd6ccd0.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation c12ea811bbe3c730529545f379aa852ed85c6ae5d45307dd45cc13ca0cd6ccd0.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchos = "C:\\Users\\Admin\\AppData\\Local\\Temp\\c12ea811bbe3c730529545f379aa852ed85c6ae5d45307dd45cc13ca0cd6ccd0.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
c12ea811bbe3c730529545f379aa852ed85c6ae5d45307dd45cc13ca0cd6ccd0.exepid process 2768 c12ea811bbe3c730529545f379aa852ed85c6ae5d45307dd45cc13ca0cd6ccd0.exe 2768 c12ea811bbe3c730529545f379aa852ed85c6ae5d45307dd45cc13ca0cd6ccd0.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
c12ea811bbe3c730529545f379aa852ed85c6ae5d45307dd45cc13ca0cd6ccd0.exedescription pid process Token: SeDebugPrivilege 2768 c12ea811bbe3c730529545f379aa852ed85c6ae5d45307dd45cc13ca0cd6ccd0.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
c12ea811bbe3c730529545f379aa852ed85c6ae5d45307dd45cc13ca0cd6ccd0.execmd.exedescription pid process target process PID 2768 wrote to memory of 2204 2768 c12ea811bbe3c730529545f379aa852ed85c6ae5d45307dd45cc13ca0cd6ccd0.exe cmd.exe PID 2768 wrote to memory of 2204 2768 c12ea811bbe3c730529545f379aa852ed85c6ae5d45307dd45cc13ca0cd6ccd0.exe cmd.exe PID 2768 wrote to memory of 2432 2768 c12ea811bbe3c730529545f379aa852ed85c6ae5d45307dd45cc13ca0cd6ccd0.exe sihost.exe PID 2204 wrote to memory of 4348 2204 cmd.exe reg.exe PID 2204 wrote to memory of 4348 2204 cmd.exe reg.exe PID 2768 wrote to memory of 2444 2768 c12ea811bbe3c730529545f379aa852ed85c6ae5d45307dd45cc13ca0cd6ccd0.exe svchost.exe PID 2768 wrote to memory of 2592 2768 c12ea811bbe3c730529545f379aa852ed85c6ae5d45307dd45cc13ca0cd6ccd0.exe taskhostw.exe PID 2768 wrote to memory of 3104 2768 c12ea811bbe3c730529545f379aa852ed85c6ae5d45307dd45cc13ca0cd6ccd0.exe svchost.exe PID 2768 wrote to memory of 3304 2768 c12ea811bbe3c730529545f379aa852ed85c6ae5d45307dd45cc13ca0cd6ccd0.exe DllHost.exe
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2432
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3304
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3104
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2592
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2444
-
C:\Users\Admin\AppData\Local\Temp\c12ea811bbe3c730529545f379aa852ed85c6ae5d45307dd45cc13ca0cd6ccd0.exe"C:\Users\Admin\AppData\Local\Temp\c12ea811bbe3c730529545f379aa852ed85c6ae5d45307dd45cc13ca0cd6ccd0.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\c12ea811bbe3c730529545f379aa852ed85c6ae5d45307dd45cc13ca0cd6ccd0.exe" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\system32\reg.exeREG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\c12ea811bbe3c730529545f379aa852ed85c6ae5d45307dd45cc13ca0cd6ccd0.exe" /f3⤵
- Adds Run key to start application
PID:4348