Analysis
-
max time kernel
37s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
20-02-2022 02:51
Static task
static1
Behavioral task
behavioral1
Sample
b7e945a8dafc91ebe8c8717ee3107498afc1ad5461599611d2fb07aaa7700aa1.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
b7e945a8dafc91ebe8c8717ee3107498afc1ad5461599611d2fb07aaa7700aa1.exe
Resource
win10v2004-en-20220113
General
-
Target
b7e945a8dafc91ebe8c8717ee3107498afc1ad5461599611d2fb07aaa7700aa1.exe
-
Size
151KB
-
MD5
2af0f010e71cb1ecddc52b13e4149ea2
-
SHA1
6caead7f091d18baa393cdea1955d43fd7853850
-
SHA256
b7e945a8dafc91ebe8c8717ee3107498afc1ad5461599611d2fb07aaa7700aa1
-
SHA512
72856c70b931cbb1e0bf6c006cb959d7735cde779d40e56964e58578daf91ac0e0cbf8f3fb05efba3afe7400e3f2450acc98b711f1b29b2a9fb891ae86b13f66
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
b7e945a8dafc91ebe8c8717ee3107498afc1ad5461599611d2fb07aaa7700aa1.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation b7e945a8dafc91ebe8c8717ee3107498afc1ad5461599611d2fb07aaa7700aa1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
b7e945a8dafc91ebe8c8717ee3107498afc1ad5461599611d2fb07aaa7700aa1.exepid process 4536 b7e945a8dafc91ebe8c8717ee3107498afc1ad5461599611d2fb07aaa7700aa1.exe 4536 b7e945a8dafc91ebe8c8717ee3107498afc1ad5461599611d2fb07aaa7700aa1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
b7e945a8dafc91ebe8c8717ee3107498afc1ad5461599611d2fb07aaa7700aa1.exedescription pid process Token: SeDebugPrivilege 4536 b7e945a8dafc91ebe8c8717ee3107498afc1ad5461599611d2fb07aaa7700aa1.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
b7e945a8dafc91ebe8c8717ee3107498afc1ad5461599611d2fb07aaa7700aa1.execmd.exedescription pid process target process PID 4536 wrote to memory of 1516 4536 b7e945a8dafc91ebe8c8717ee3107498afc1ad5461599611d2fb07aaa7700aa1.exe cmd.exe PID 4536 wrote to memory of 1516 4536 b7e945a8dafc91ebe8c8717ee3107498afc1ad5461599611d2fb07aaa7700aa1.exe cmd.exe PID 4536 wrote to memory of 2360 4536 b7e945a8dafc91ebe8c8717ee3107498afc1ad5461599611d2fb07aaa7700aa1.exe sihost.exe PID 1516 wrote to memory of 2716 1516 cmd.exe reg.exe PID 1516 wrote to memory of 2716 1516 cmd.exe reg.exe PID 4536 wrote to memory of 2408 4536 b7e945a8dafc91ebe8c8717ee3107498afc1ad5461599611d2fb07aaa7700aa1.exe svchost.exe PID 4536 wrote to memory of 2688 4536 b7e945a8dafc91ebe8c8717ee3107498afc1ad5461599611d2fb07aaa7700aa1.exe taskhostw.exe PID 4536 wrote to memory of 3160 4536 b7e945a8dafc91ebe8c8717ee3107498afc1ad5461599611d2fb07aaa7700aa1.exe svchost.exe PID 4536 wrote to memory of 3364 4536 b7e945a8dafc91ebe8c8717ee3107498afc1ad5461599611d2fb07aaa7700aa1.exe DllHost.exe
Processes
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3364
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3160
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2688
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2408
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\b7e945a8dafc91ebe8c8717ee3107498afc1ad5461599611d2fb07aaa7700aa1.exe"C:\Users\Admin\AppData\Local\Temp\b7e945a8dafc91ebe8c8717ee3107498afc1ad5461599611d2fb07aaa7700aa1.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\b7e945a8dafc91ebe8c8717ee3107498afc1ad5461599611d2fb07aaa7700aa1.exe" /f2⤵
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\system32\reg.exeREG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\b7e945a8dafc91ebe8c8717ee3107498afc1ad5461599611d2fb07aaa7700aa1.exe" /f3⤵PID:2716