Analysis
-
max time kernel
40s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
20-02-2022 07:19
Static task
static1
Behavioral task
behavioral1
Sample
53cfffafc3f552b70e336dfe56d48ac9b78f62ced2992297828948f149f01f14.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
53cfffafc3f552b70e336dfe56d48ac9b78f62ced2992297828948f149f01f14.exe
Resource
win10v2004-en-20220113
General
-
Target
53cfffafc3f552b70e336dfe56d48ac9b78f62ced2992297828948f149f01f14.exe
-
Size
150KB
-
MD5
d6a8a47358a0be9cd88e3909023a26b7
-
SHA1
a309b709036cf394afa39b9dd8ae90dff2f00cd2
-
SHA256
53cfffafc3f552b70e336dfe56d48ac9b78f62ced2992297828948f149f01f14
-
SHA512
1913bd3996729a5f5912c171b80159529b688e4c19283740f28eba5859bdb83f7a4612494cb56396993f5795045a768b7e820deedd166c1e8303210c84ee80f4
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation 53cfffafc3f552b70e336dfe56d48ac9b78f62ced2992297828948f149f01f14.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4716 53cfffafc3f552b70e336dfe56d48ac9b78f62ced2992297828948f149f01f14.exe 4716 53cfffafc3f552b70e336dfe56d48ac9b78f62ced2992297828948f149f01f14.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4716 53cfffafc3f552b70e336dfe56d48ac9b78f62ced2992297828948f149f01f14.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4716 wrote to memory of 3320 4716 53cfffafc3f552b70e336dfe56d48ac9b78f62ced2992297828948f149f01f14.exe 82 PID 4716 wrote to memory of 3320 4716 53cfffafc3f552b70e336dfe56d48ac9b78f62ced2992297828948f149f01f14.exe 82 PID 4716 wrote to memory of 2432 4716 53cfffafc3f552b70e336dfe56d48ac9b78f62ced2992297828948f149f01f14.exe 45 PID 3320 wrote to memory of 4020 3320 cmd.exe 84 PID 3320 wrote to memory of 4020 3320 cmd.exe 84 PID 4716 wrote to memory of 2444 4716 53cfffafc3f552b70e336dfe56d48ac9b78f62ced2992297828948f149f01f14.exe 31 PID 4716 wrote to memory of 2592 4716 53cfffafc3f552b70e336dfe56d48ac9b78f62ced2992297828948f149f01f14.exe 32 PID 4716 wrote to memory of 3104 4716 53cfffafc3f552b70e336dfe56d48ac9b78f62ced2992297828948f149f01f14.exe 39 PID 4716 wrote to memory of 3304 4716 53cfffafc3f552b70e336dfe56d48ac9b78f62ced2992297828948f149f01f14.exe 38
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2444
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2592
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3304
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3104
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\53cfffafc3f552b70e336dfe56d48ac9b78f62ced2992297828948f149f01f14.exe"C:\Users\Admin\AppData\Local\Temp\53cfffafc3f552b70e336dfe56d48ac9b78f62ced2992297828948f149f01f14.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\53cfffafc3f552b70e336dfe56d48ac9b78f62ced2992297828948f149f01f14.exe" /f2⤵
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Windows\system32\reg.exeREG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\53cfffafc3f552b70e336dfe56d48ac9b78f62ced2992297828948f149f01f14.exe" /f3⤵PID:4020
-
-