Analysis
-
max time kernel
29s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
20-02-2022 09:16
Static task
static1
Behavioral task
behavioral1
Sample
248fc2f3ee9edf8264afe74c7b2f381a3a259fb790cfdbaec90bccf7119be266.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
248fc2f3ee9edf8264afe74c7b2f381a3a259fb790cfdbaec90bccf7119be266.exe
Resource
win10v2004-en-20220113
General
-
Target
248fc2f3ee9edf8264afe74c7b2f381a3a259fb790cfdbaec90bccf7119be266.exe
-
Size
149KB
-
MD5
3159804eeee22d4b70a4b2c3249f8bed
-
SHA1
e7048b671e95d3927199d2529ee400ab39a1a804
-
SHA256
248fc2f3ee9edf8264afe74c7b2f381a3a259fb790cfdbaec90bccf7119be266
-
SHA512
ee0a6f9418bf786672fe4ac31b9480312c533c0e132cc61dcb8551e655ae0a768600f41098f0354794d5e6316159fe0d1ee6b140897211290632de511ab9ffdc
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation 248fc2f3ee9edf8264afe74c7b2f381a3a259fb790cfdbaec90bccf7119be266.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchos = "C:\\Users\\Admin\\AppData\\Local\\Temp\\248fc2f3ee9edf8264afe74c7b2f381a3a259fb790cfdbaec90bccf7119be266.exe" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3932 248fc2f3ee9edf8264afe74c7b2f381a3a259fb790cfdbaec90bccf7119be266.exe 3932 248fc2f3ee9edf8264afe74c7b2f381a3a259fb790cfdbaec90bccf7119be266.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3932 248fc2f3ee9edf8264afe74c7b2f381a3a259fb790cfdbaec90bccf7119be266.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3932 wrote to memory of 2580 3932 248fc2f3ee9edf8264afe74c7b2f381a3a259fb790cfdbaec90bccf7119be266.exe 83 PID 3932 wrote to memory of 2580 3932 248fc2f3ee9edf8264afe74c7b2f381a3a259fb790cfdbaec90bccf7119be266.exe 83 PID 3932 wrote to memory of 2296 3932 248fc2f3ee9edf8264afe74c7b2f381a3a259fb790cfdbaec90bccf7119be266.exe 57 PID 2580 wrote to memory of 1432 2580 cmd.exe 85 PID 2580 wrote to memory of 1432 2580 cmd.exe 85 PID 3932 wrote to memory of 2348 3932 248fc2f3ee9edf8264afe74c7b2f381a3a259fb790cfdbaec90bccf7119be266.exe 56 PID 3932 wrote to memory of 2464 3932 248fc2f3ee9edf8264afe74c7b2f381a3a259fb790cfdbaec90bccf7119be266.exe 54 PID 3932 wrote to memory of 2964 3932 248fc2f3ee9edf8264afe74c7b2f381a3a259fb790cfdbaec90bccf7119be266.exe 24 PID 3932 wrote to memory of 3244 3932 248fc2f3ee9edf8264afe74c7b2f381a3a259fb790cfdbaec90bccf7119be266.exe 48
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:2964
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3244
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2464
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2348
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\248fc2f3ee9edf8264afe74c7b2f381a3a259fb790cfdbaec90bccf7119be266.exe"C:\Users\Admin\AppData\Local\Temp\248fc2f3ee9edf8264afe74c7b2f381a3a259fb790cfdbaec90bccf7119be266.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\248fc2f3ee9edf8264afe74c7b2f381a3a259fb790cfdbaec90bccf7119be266.exe" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\system32\reg.exeREG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\248fc2f3ee9edf8264afe74c7b2f381a3a259fb790cfdbaec90bccf7119be266.exe" /f3⤵
- Adds Run key to start application
PID:1432
-
-