Analysis
-
max time kernel
45s -
max time network
60s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
20-02-2022 03:30
Static task
static1
Behavioral task
behavioral1
Sample
aa356e1d445cca768a71f037d6a0111e613213bf2fd67fffdeae346001143bf6.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
aa356e1d445cca768a71f037d6a0111e613213bf2fd67fffdeae346001143bf6.exe
Resource
win10v2004-en-20220113
General
-
Target
aa356e1d445cca768a71f037d6a0111e613213bf2fd67fffdeae346001143bf6.exe
-
Size
170KB
-
MD5
0e53108935aa122b8faeda0de6fae8bd
-
SHA1
fd7491b116e3695b832c171b6c003773fa95342b
-
SHA256
aa356e1d445cca768a71f037d6a0111e613213bf2fd67fffdeae346001143bf6
-
SHA512
df74ad57514cf8866a738f7ab3058a51f3ca7450bc63affc0ff05facc1e43e5d19dc1f23daa0ec7fc03312eacff2ff9e1233e6e420935365a260babc93d0d3d4
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
aa356e1d445cca768a71f037d6a0111e613213bf2fd67fffdeae346001143bf6.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation aa356e1d445cca768a71f037d6a0111e613213bf2fd67fffdeae346001143bf6.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchos = "C:\\Users\\Admin\\AppData\\Local\\Temp\\aa356e1d445cca768a71f037d6a0111e613213bf2fd67fffdeae346001143bf6.exe" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
aa356e1d445cca768a71f037d6a0111e613213bf2fd67fffdeae346001143bf6.exepid process 4632 aa356e1d445cca768a71f037d6a0111e613213bf2fd67fffdeae346001143bf6.exe 4632 aa356e1d445cca768a71f037d6a0111e613213bf2fd67fffdeae346001143bf6.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
aa356e1d445cca768a71f037d6a0111e613213bf2fd67fffdeae346001143bf6.exedescription pid process Token: SeDebugPrivilege 4632 aa356e1d445cca768a71f037d6a0111e613213bf2fd67fffdeae346001143bf6.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
aa356e1d445cca768a71f037d6a0111e613213bf2fd67fffdeae346001143bf6.execmd.exedescription pid process target process PID 4632 wrote to memory of 1400 4632 aa356e1d445cca768a71f037d6a0111e613213bf2fd67fffdeae346001143bf6.exe cmd.exe PID 4632 wrote to memory of 1400 4632 aa356e1d445cca768a71f037d6a0111e613213bf2fd67fffdeae346001143bf6.exe cmd.exe PID 4632 wrote to memory of 2268 4632 aa356e1d445cca768a71f037d6a0111e613213bf2fd67fffdeae346001143bf6.exe sihost.exe PID 1400 wrote to memory of 1076 1400 cmd.exe reg.exe PID 1400 wrote to memory of 1076 1400 cmd.exe reg.exe PID 4632 wrote to memory of 2288 4632 aa356e1d445cca768a71f037d6a0111e613213bf2fd67fffdeae346001143bf6.exe svchost.exe PID 4632 wrote to memory of 2412 4632 aa356e1d445cca768a71f037d6a0111e613213bf2fd67fffdeae346001143bf6.exe taskhostw.exe PID 4632 wrote to memory of 2660 4632 aa356e1d445cca768a71f037d6a0111e613213bf2fd67fffdeae346001143bf6.exe svchost.exe PID 4632 wrote to memory of 3204 4632 aa356e1d445cca768a71f037d6a0111e613213bf2fd67fffdeae346001143bf6.exe DllHost.exe
Processes
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2412
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3204
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:2660
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2288
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\aa356e1d445cca768a71f037d6a0111e613213bf2fd67fffdeae346001143bf6.exe"C:\Users\Admin\AppData\Local\Temp\aa356e1d445cca768a71f037d6a0111e613213bf2fd67fffdeae346001143bf6.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\aa356e1d445cca768a71f037d6a0111e613213bf2fd67fffdeae346001143bf6.exe" /f2⤵
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\system32\reg.exeREG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\aa356e1d445cca768a71f037d6a0111e613213bf2fd67fffdeae346001143bf6.exe" /f3⤵
- Adds Run key to start application
PID:1076