Analysis
-
max time kernel
23s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
20-02-2022 07:19
Static task
static1
Behavioral task
behavioral1
Sample
53e5bfb0be32202aaeff40f267454abdd12e58e50d295988ad111718ad886a74.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
53e5bfb0be32202aaeff40f267454abdd12e58e50d295988ad111718ad886a74.exe
Resource
win10v2004-en-20220113
General
-
Target
53e5bfb0be32202aaeff40f267454abdd12e58e50d295988ad111718ad886a74.exe
-
Size
170KB
-
MD5
cbc4a644b35edb3610d76068a9bd5592
-
SHA1
91e6feadc8900505902c626737d6a98f6244cfd6
-
SHA256
53e5bfb0be32202aaeff40f267454abdd12e58e50d295988ad111718ad886a74
-
SHA512
85ad10e59645d50728bb9145553fa87c6e105a8555aba0d20b349223099109c4d3d4dde56c2cee2d71e5208372dae7db96b0dd4cb12389e767f132305ba85291
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation 53e5bfb0be32202aaeff40f267454abdd12e58e50d295988ad111718ad886a74.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchos = "C:\\Users\\Admin\\AppData\\Local\\Temp\\53e5bfb0be32202aaeff40f267454abdd12e58e50d295988ad111718ad886a74.exe" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1712 53e5bfb0be32202aaeff40f267454abdd12e58e50d295988ad111718ad886a74.exe 1712 53e5bfb0be32202aaeff40f267454abdd12e58e50d295988ad111718ad886a74.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1712 53e5bfb0be32202aaeff40f267454abdd12e58e50d295988ad111718ad886a74.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1712 wrote to memory of 2932 1712 53e5bfb0be32202aaeff40f267454abdd12e58e50d295988ad111718ad886a74.exe 82 PID 1712 wrote to memory of 2932 1712 53e5bfb0be32202aaeff40f267454abdd12e58e50d295988ad111718ad886a74.exe 82 PID 1712 wrote to memory of 2304 1712 53e5bfb0be32202aaeff40f267454abdd12e58e50d295988ad111718ad886a74.exe 65 PID 2932 wrote to memory of 4544 2932 cmd.exe 84 PID 2932 wrote to memory of 4544 2932 cmd.exe 84 PID 1712 wrote to memory of 2340 1712 53e5bfb0be32202aaeff40f267454abdd12e58e50d295988ad111718ad886a74.exe 64 PID 1712 wrote to memory of 2420 1712 53e5bfb0be32202aaeff40f267454abdd12e58e50d295988ad111718ad886a74.exe 63 PID 1712 wrote to memory of 1304 1712 53e5bfb0be32202aaeff40f267454abdd12e58e50d295988ad111718ad886a74.exe 53 PID 1712 wrote to memory of 3252 1712 53e5bfb0be32202aaeff40f267454abdd12e58e50d295988ad111718ad886a74.exe 52
Processes
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3252
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:1304
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2420
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2340
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2304
-
C:\Users\Admin\AppData\Local\Temp\53e5bfb0be32202aaeff40f267454abdd12e58e50d295988ad111718ad886a74.exe"C:\Users\Admin\AppData\Local\Temp\53e5bfb0be32202aaeff40f267454abdd12e58e50d295988ad111718ad886a74.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\53e5bfb0be32202aaeff40f267454abdd12e58e50d295988ad111718ad886a74.exe" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\system32\reg.exeREG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\53e5bfb0be32202aaeff40f267454abdd12e58e50d295988ad111718ad886a74.exe" /f3⤵
- Adds Run key to start application
PID:4544
-
-