Analysis
-
max time kernel
47s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
20-02-2022 05:34
Static task
static1
Behavioral task
behavioral1
Sample
782788d736a6c603dbfb57f302e54e9050219e24dbde3c3b6f69484004d9415e.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
782788d736a6c603dbfb57f302e54e9050219e24dbde3c3b6f69484004d9415e.exe
Resource
win10v2004-en-20220113
General
-
Target
782788d736a6c603dbfb57f302e54e9050219e24dbde3c3b6f69484004d9415e.exe
-
Size
170KB
-
MD5
32d91009c10608aa3fb20abea38af923
-
SHA1
c0af7c4c2acd9f76b8ff7206aed50b206a32ee26
-
SHA256
782788d736a6c603dbfb57f302e54e9050219e24dbde3c3b6f69484004d9415e
-
SHA512
9abe7527384cb8381b62ba4a476f28519859ed3c504183fb8cad2d0e34cd5328492864541cf3a2410daac018caf98cab92dc8f4fe6aa9435834ca9f0f8f18780
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation 782788d736a6c603dbfb57f302e54e9050219e24dbde3c3b6f69484004d9415e.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchos = "C:\\Users\\Admin\\AppData\\Local\\Temp\\782788d736a6c603dbfb57f302e54e9050219e24dbde3c3b6f69484004d9415e.exe" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4888 782788d736a6c603dbfb57f302e54e9050219e24dbde3c3b6f69484004d9415e.exe 4888 782788d736a6c603dbfb57f302e54e9050219e24dbde3c3b6f69484004d9415e.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4888 782788d736a6c603dbfb57f302e54e9050219e24dbde3c3b6f69484004d9415e.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4888 wrote to memory of 364 4888 782788d736a6c603dbfb57f302e54e9050219e24dbde3c3b6f69484004d9415e.exe 83 PID 4888 wrote to memory of 364 4888 782788d736a6c603dbfb57f302e54e9050219e24dbde3c3b6f69484004d9415e.exe 83 PID 4888 wrote to memory of 2356 4888 782788d736a6c603dbfb57f302e54e9050219e24dbde3c3b6f69484004d9415e.exe 75 PID 364 wrote to memory of 2932 364 cmd.exe 85 PID 364 wrote to memory of 2932 364 cmd.exe 85 PID 4888 wrote to memory of 2368 4888 782788d736a6c603dbfb57f302e54e9050219e24dbde3c3b6f69484004d9415e.exe 74 PID 4888 wrote to memory of 2464 4888 782788d736a6c603dbfb57f302e54e9050219e24dbde3c3b6f69484004d9415e.exe 46 PID 4888 wrote to memory of 3172 4888 782788d736a6c603dbfb57f302e54e9050219e24dbde3c3b6f69484004d9415e.exe 71 PID 4888 wrote to memory of 3380 4888 782788d736a6c603dbfb57f302e54e9050219e24dbde3c3b6f69484004d9415e.exe 52
Processes
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2464
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3380
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3172
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2368
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\782788d736a6c603dbfb57f302e54e9050219e24dbde3c3b6f69484004d9415e.exe"C:\Users\Admin\AppData\Local\Temp\782788d736a6c603dbfb57f302e54e9050219e24dbde3c3b6f69484004d9415e.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\782788d736a6c603dbfb57f302e54e9050219e24dbde3c3b6f69484004d9415e.exe" /f2⤵
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Windows\system32\reg.exeREG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\782788d736a6c603dbfb57f302e54e9050219e24dbde3c3b6f69484004d9415e.exe" /f3⤵
- Adds Run key to start application
PID:2932
-
-