Analysis
-
max time kernel
69s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
20-02-2022 07:21
Static task
static1
Behavioral task
behavioral1
Sample
53215004babd14a61e9ad4c9115fcd7c7d8385e6555bc280d8be163c6aeee39f.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
53215004babd14a61e9ad4c9115fcd7c7d8385e6555bc280d8be163c6aeee39f.exe
Resource
win10v2004-en-20220113
General
-
Target
53215004babd14a61e9ad4c9115fcd7c7d8385e6555bc280d8be163c6aeee39f.exe
-
Size
170KB
-
MD5
e099b46a11f962688a9f45c0da068045
-
SHA1
6f525bfb102285515e32345e6f0870f508b55fbe
-
SHA256
53215004babd14a61e9ad4c9115fcd7c7d8385e6555bc280d8be163c6aeee39f
-
SHA512
341aaef008e6ee245e7ba1e5c3315b88cf11fe05bce880637cbec2a585c1b2e36408bd0ec6d202b25ecfb1d9d81e13d4826bb5c7fdb401473f9b624f40213bdb
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation 53215004babd14a61e9ad4c9115fcd7c7d8385e6555bc280d8be163c6aeee39f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4880 53215004babd14a61e9ad4c9115fcd7c7d8385e6555bc280d8be163c6aeee39f.exe 4880 53215004babd14a61e9ad4c9115fcd7c7d8385e6555bc280d8be163c6aeee39f.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4880 53215004babd14a61e9ad4c9115fcd7c7d8385e6555bc280d8be163c6aeee39f.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4880 wrote to memory of 820 4880 53215004babd14a61e9ad4c9115fcd7c7d8385e6555bc280d8be163c6aeee39f.exe 82 PID 4880 wrote to memory of 820 4880 53215004babd14a61e9ad4c9115fcd7c7d8385e6555bc280d8be163c6aeee39f.exe 82 PID 4880 wrote to memory of 2296 4880 53215004babd14a61e9ad4c9115fcd7c7d8385e6555bc280d8be163c6aeee39f.exe 40 PID 4880 wrote to memory of 2348 4880 53215004babd14a61e9ad4c9115fcd7c7d8385e6555bc280d8be163c6aeee39f.exe 39 PID 4880 wrote to memory of 2464 4880 53215004babd14a61e9ad4c9115fcd7c7d8385e6555bc280d8be163c6aeee39f.exe 28 PID 4880 wrote to memory of 2964 4880 53215004babd14a61e9ad4c9115fcd7c7d8385e6555bc280d8be163c6aeee39f.exe 32
Processes
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2464
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:2964
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2348
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\53215004babd14a61e9ad4c9115fcd7c7d8385e6555bc280d8be163c6aeee39f.exe"C:\Users\Admin\AppData\Local\Temp\53215004babd14a61e9ad4c9115fcd7c7d8385e6555bc280d8be163c6aeee39f.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\53215004babd14a61e9ad4c9115fcd7c7d8385e6555bc280d8be163c6aeee39f.exe" /f2⤵PID:820
-