Analysis
-
max time kernel
42s -
max time network
109s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
20-02-2022 05:20
Static task
static1
Behavioral task
behavioral1
Sample
7e02efaf98a1343c6a41a9e084c62567f99386a4046f68a658a8d667c3834305.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
7e02efaf98a1343c6a41a9e084c62567f99386a4046f68a658a8d667c3834305.exe
Resource
win10v2004-en-20220113
General
-
Target
7e02efaf98a1343c6a41a9e084c62567f99386a4046f68a658a8d667c3834305.exe
-
Size
170KB
-
MD5
ad6320f406222e3b6d6e717146370472
-
SHA1
74fd06ff2b99d7df9044b4ea04312ffcb76e6e67
-
SHA256
7e02efaf98a1343c6a41a9e084c62567f99386a4046f68a658a8d667c3834305
-
SHA512
38e15da45d188ca86872780754c26efc89610e8adf14a88e2271af7226f01757e085ce2938a4ea5f1439453cbf5cb7091ce3a21e36488159f82ca4f2b64989d5
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation 7e02efaf98a1343c6a41a9e084c62567f99386a4046f68a658a8d667c3834305.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1680 7e02efaf98a1343c6a41a9e084c62567f99386a4046f68a658a8d667c3834305.exe 1680 7e02efaf98a1343c6a41a9e084c62567f99386a4046f68a658a8d667c3834305.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1680 7e02efaf98a1343c6a41a9e084c62567f99386a4046f68a658a8d667c3834305.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1680 wrote to memory of 4324 1680 7e02efaf98a1343c6a41a9e084c62567f99386a4046f68a658a8d667c3834305.exe 84 PID 1680 wrote to memory of 4324 1680 7e02efaf98a1343c6a41a9e084c62567f99386a4046f68a658a8d667c3834305.exe 84 PID 1680 wrote to memory of 2356 1680 7e02efaf98a1343c6a41a9e084c62567f99386a4046f68a658a8d667c3834305.exe 57 PID 4324 wrote to memory of 2172 4324 cmd.exe 86 PID 4324 wrote to memory of 2172 4324 cmd.exe 86 PID 1680 wrote to memory of 2368 1680 7e02efaf98a1343c6a41a9e084c62567f99386a4046f68a658a8d667c3834305.exe 56 PID 1680 wrote to memory of 2448 1680 7e02efaf98a1343c6a41a9e084c62567f99386a4046f68a658a8d667c3834305.exe 55
Processes
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2448
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2368
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\7e02efaf98a1343c6a41a9e084c62567f99386a4046f68a658a8d667c3834305.exe"C:\Users\Admin\AppData\Local\Temp\7e02efaf98a1343c6a41a9e084c62567f99386a4046f68a658a8d667c3834305.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\7e02efaf98a1343c6a41a9e084c62567f99386a4046f68a658a8d667c3834305.exe" /f2⤵
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Windows\system32\reg.exeREG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\7e02efaf98a1343c6a41a9e084c62567f99386a4046f68a658a8d667c3834305.exe" /f3⤵PID:2172
-
-