Analysis
-
max time kernel
33s -
max time network
64s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
20-02-2022 06:29
Static task
static1
Behavioral task
behavioral1
Sample
65160fc5b5542e6a1b6d6ea2194eb9d4545979bb31a632142195332044b42d97.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
65160fc5b5542e6a1b6d6ea2194eb9d4545979bb31a632142195332044b42d97.exe
Resource
win10v2004-en-20220113
General
-
Target
65160fc5b5542e6a1b6d6ea2194eb9d4545979bb31a632142195332044b42d97.exe
-
Size
147KB
-
MD5
cb2ef6d62007213c431a87022d18716e
-
SHA1
5ce55bf28895f4f937326d50b316fbf40c26b506
-
SHA256
65160fc5b5542e6a1b6d6ea2194eb9d4545979bb31a632142195332044b42d97
-
SHA512
23069fea1effda102ccfe22e8cc998bf5ca6dbb19a13b565964cf0d9d741f9059e14eb4c09d944c29c84c3a8b258c30764c68820d2a3223d34f039e7920fb1f0
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation 65160fc5b5542e6a1b6d6ea2194eb9d4545979bb31a632142195332044b42d97.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchos = "C:\\Users\\Admin\\AppData\\Local\\Temp\\65160fc5b5542e6a1b6d6ea2194eb9d4545979bb31a632142195332044b42d97.exe" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1932 65160fc5b5542e6a1b6d6ea2194eb9d4545979bb31a632142195332044b42d97.exe 1932 65160fc5b5542e6a1b6d6ea2194eb9d4545979bb31a632142195332044b42d97.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1932 65160fc5b5542e6a1b6d6ea2194eb9d4545979bb31a632142195332044b42d97.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1932 wrote to memory of 1036 1932 65160fc5b5542e6a1b6d6ea2194eb9d4545979bb31a632142195332044b42d97.exe 84 PID 1932 wrote to memory of 1036 1932 65160fc5b5542e6a1b6d6ea2194eb9d4545979bb31a632142195332044b42d97.exe 84 PID 1932 wrote to memory of 2344 1932 65160fc5b5542e6a1b6d6ea2194eb9d4545979bb31a632142195332044b42d97.exe 54 PID 1036 wrote to memory of 1616 1036 cmd.exe 86 PID 1036 wrote to memory of 1616 1036 cmd.exe 86 PID 1932 wrote to memory of 2372 1932 65160fc5b5542e6a1b6d6ea2194eb9d4545979bb31a632142195332044b42d97.exe 53 PID 1932 wrote to memory of 2468 1932 65160fc5b5542e6a1b6d6ea2194eb9d4545979bb31a632142195332044b42d97.exe 52 PID 1932 wrote to memory of 1148 1932 65160fc5b5542e6a1b6d6ea2194eb9d4545979bb31a632142195332044b42d97.exe 22 PID 1932 wrote to memory of 3248 1932 65160fc5b5542e6a1b6d6ea2194eb9d4545979bb31a632142195332044b42d97.exe 20
Processes
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3248
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:1148
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2468
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2372
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2344
-
C:\Users\Admin\AppData\Local\Temp\65160fc5b5542e6a1b6d6ea2194eb9d4545979bb31a632142195332044b42d97.exe"C:\Users\Admin\AppData\Local\Temp\65160fc5b5542e6a1b6d6ea2194eb9d4545979bb31a632142195332044b42d97.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\65160fc5b5542e6a1b6d6ea2194eb9d4545979bb31a632142195332044b42d97.exe" /f2⤵
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\system32\reg.exeREG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\65160fc5b5542e6a1b6d6ea2194eb9d4545979bb31a632142195332044b42d97.exe" /f3⤵
- Adds Run key to start application
PID:1616
-
-