Analysis
-
max time kernel
59s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
20-02-2022 06:47
Static task
static1
Behavioral task
behavioral1
Sample
5e4160a133d44a1cf90d72eedd5e6084543521fecbf070d550c6012d294ccb28.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
5e4160a133d44a1cf90d72eedd5e6084543521fecbf070d550c6012d294ccb28.exe
Resource
win10v2004-en-20220113
General
-
Target
5e4160a133d44a1cf90d72eedd5e6084543521fecbf070d550c6012d294ccb28.exe
-
Size
150KB
-
MD5
e78cd758ff117ff26e2c333b484b03b1
-
SHA1
a477b3fc1c8f9c571e1dcfda0c84606fb7d34d93
-
SHA256
5e4160a133d44a1cf90d72eedd5e6084543521fecbf070d550c6012d294ccb28
-
SHA512
a9bec103ecda3c0faca8868a46790787697d0c28ae849fb6857850a378c2812671ec3f2f96d4b9711d74cc3549e909bafb65ad82ab2bd86052f1d24b995e0708
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation 5e4160a133d44a1cf90d72eedd5e6084543521fecbf070d550c6012d294ccb28.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2808 5e4160a133d44a1cf90d72eedd5e6084543521fecbf070d550c6012d294ccb28.exe 2808 5e4160a133d44a1cf90d72eedd5e6084543521fecbf070d550c6012d294ccb28.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2808 5e4160a133d44a1cf90d72eedd5e6084543521fecbf070d550c6012d294ccb28.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2808 wrote to memory of 4836 2808 5e4160a133d44a1cf90d72eedd5e6084543521fecbf070d550c6012d294ccb28.exe 84 PID 2808 wrote to memory of 4836 2808 5e4160a133d44a1cf90d72eedd5e6084543521fecbf070d550c6012d294ccb28.exe 84 PID 2808 wrote to memory of 2312 2808 5e4160a133d44a1cf90d72eedd5e6084543521fecbf070d550c6012d294ccb28.exe 54 PID 4836 wrote to memory of 1764 4836 cmd.exe 86 PID 4836 wrote to memory of 1764 4836 cmd.exe 86 PID 2808 wrote to memory of 2340 2808 5e4160a133d44a1cf90d72eedd5e6084543521fecbf070d550c6012d294ccb28.exe 18 PID 2808 wrote to memory of 2456 2808 5e4160a133d44a1cf90d72eedd5e6084543521fecbf070d550c6012d294ccb28.exe 53 PID 2808 wrote to memory of 3096 2808 5e4160a133d44a1cf90d72eedd5e6084543521fecbf070d550c6012d294ccb28.exe 43 PID 2808 wrote to memory of 3296 2808 5e4160a133d44a1cf90d72eedd5e6084543521fecbf070d550c6012d294ccb28.exe 42
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2340
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3296
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3096
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2456
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\5e4160a133d44a1cf90d72eedd5e6084543521fecbf070d550c6012d294ccb28.exe"C:\Users\Admin\AppData\Local\Temp\5e4160a133d44a1cf90d72eedd5e6084543521fecbf070d550c6012d294ccb28.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5e4160a133d44a1cf90d72eedd5e6084543521fecbf070d550c6012d294ccb28.exe" /f2⤵
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Windows\system32\reg.exeREG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5e4160a133d44a1cf90d72eedd5e6084543521fecbf070d550c6012d294ccb28.exe" /f3⤵PID:1764
-
-