Analysis
-
max time kernel
68s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
20-02-2022 08:04
Static task
static1
Behavioral task
behavioral1
Sample
414bfb0bb83ad01da8f54cb858aae7ee37b6029cf529d6e6f89ee0f451edbd87.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
414bfb0bb83ad01da8f54cb858aae7ee37b6029cf529d6e6f89ee0f451edbd87.exe
Resource
win10v2004-en-20220113
General
-
Target
414bfb0bb83ad01da8f54cb858aae7ee37b6029cf529d6e6f89ee0f451edbd87.exe
-
Size
170KB
-
MD5
d4089e8c00e1346099de330df50b027a
-
SHA1
c7726ace55949d59d845130313c17687407e5367
-
SHA256
414bfb0bb83ad01da8f54cb858aae7ee37b6029cf529d6e6f89ee0f451edbd87
-
SHA512
ad61c25e90acccf86dde8f99b496c3d857b235d143a5251b81e23e424e83bcabe89671e0c58fae0bbccba1f6640bd9f4decd6195b718da9399179745b93540c4
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation 414bfb0bb83ad01da8f54cb858aae7ee37b6029cf529d6e6f89ee0f451edbd87.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4020 414bfb0bb83ad01da8f54cb858aae7ee37b6029cf529d6e6f89ee0f451edbd87.exe 4020 414bfb0bb83ad01da8f54cb858aae7ee37b6029cf529d6e6f89ee0f451edbd87.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4020 414bfb0bb83ad01da8f54cb858aae7ee37b6029cf529d6e6f89ee0f451edbd87.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4020 wrote to memory of 1912 4020 414bfb0bb83ad01da8f54cb858aae7ee37b6029cf529d6e6f89ee0f451edbd87.exe 83 PID 4020 wrote to memory of 1912 4020 414bfb0bb83ad01da8f54cb858aae7ee37b6029cf529d6e6f89ee0f451edbd87.exe 83 PID 4020 wrote to memory of 2276 4020 414bfb0bb83ad01da8f54cb858aae7ee37b6029cf529d6e6f89ee0f451edbd87.exe 62 PID 1912 wrote to memory of 1712 1912 cmd.exe 85 PID 1912 wrote to memory of 1712 1912 cmd.exe 85 PID 4020 wrote to memory of 2300 4020 414bfb0bb83ad01da8f54cb858aae7ee37b6029cf529d6e6f89ee0f451edbd87.exe 61 PID 4020 wrote to memory of 2420 4020 414bfb0bb83ad01da8f54cb858aae7ee37b6029cf529d6e6f89ee0f451edbd87.exe 24 PID 4020 wrote to memory of 708 4020 414bfb0bb83ad01da8f54cb858aae7ee37b6029cf529d6e6f89ee0f451edbd87.exe 52 PID 4020 wrote to memory of 3260 4020 414bfb0bb83ad01da8f54cb858aae7ee37b6029cf529d6e6f89ee0f451edbd87.exe 51
Processes
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2420
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3260
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:708
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2300
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\414bfb0bb83ad01da8f54cb858aae7ee37b6029cf529d6e6f89ee0f451edbd87.exe"C:\Users\Admin\AppData\Local\Temp\414bfb0bb83ad01da8f54cb858aae7ee37b6029cf529d6e6f89ee0f451edbd87.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\414bfb0bb83ad01da8f54cb858aae7ee37b6029cf529d6e6f89ee0f451edbd87.exe" /f2⤵
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\system32\reg.exeREG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\414bfb0bb83ad01da8f54cb858aae7ee37b6029cf529d6e6f89ee0f451edbd87.exe" /f3⤵PID:1712
-
-