Analysis
-
max time kernel
46s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
20-02-2022 08:44
Static task
static1
Behavioral task
behavioral1
Sample
310da667cf387ecfe5d24730104fefbd3f9478c786db59c8ee7a39c1265e8af0.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
310da667cf387ecfe5d24730104fefbd3f9478c786db59c8ee7a39c1265e8af0.exe
Resource
win10v2004-en-20220113
General
-
Target
310da667cf387ecfe5d24730104fefbd3f9478c786db59c8ee7a39c1265e8af0.exe
-
Size
170KB
-
MD5
af1f77eedf16f8a00fa500e0f8dbedbe
-
SHA1
67b3d0c7013a9ccee08e948a82dde6d0e8b01828
-
SHA256
310da667cf387ecfe5d24730104fefbd3f9478c786db59c8ee7a39c1265e8af0
-
SHA512
0fcf486b2acaa0c71e123871cac423feb14c100c6c81d76a3b5ebbe6014d230749e109c583f62ea0287c29b810d957d7544b5b9761f0fa1408e4e775307e5aeb
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation 310da667cf387ecfe5d24730104fefbd3f9478c786db59c8ee7a39c1265e8af0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1660 310da667cf387ecfe5d24730104fefbd3f9478c786db59c8ee7a39c1265e8af0.exe 1660 310da667cf387ecfe5d24730104fefbd3f9478c786db59c8ee7a39c1265e8af0.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1660 310da667cf387ecfe5d24730104fefbd3f9478c786db59c8ee7a39c1265e8af0.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1660 wrote to memory of 3120 1660 310da667cf387ecfe5d24730104fefbd3f9478c786db59c8ee7a39c1265e8af0.exe 83 PID 1660 wrote to memory of 3120 1660 310da667cf387ecfe5d24730104fefbd3f9478c786db59c8ee7a39c1265e8af0.exe 83 PID 1660 wrote to memory of 2280 1660 310da667cf387ecfe5d24730104fefbd3f9478c786db59c8ee7a39c1265e8af0.exe 50 PID 3120 wrote to memory of 2508 3120 cmd.exe 85 PID 3120 wrote to memory of 2508 3120 cmd.exe 85 PID 1660 wrote to memory of 2336 1660 310da667cf387ecfe5d24730104fefbd3f9478c786db59c8ee7a39c1265e8af0.exe 49 PID 1660 wrote to memory of 2460 1660 310da667cf387ecfe5d24730104fefbd3f9478c786db59c8ee7a39c1265e8af0.exe 14 PID 1660 wrote to memory of 508 1660 310da667cf387ecfe5d24730104fefbd3f9478c786db59c8ee7a39c1265e8af0.exe 39 PID 1660 wrote to memory of 3272 1660 310da667cf387ecfe5d24730104fefbd3f9478c786db59c8ee7a39c1265e8af0.exe 38
Processes
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2460
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3272
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:508
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2336
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2280
-
C:\Users\Admin\AppData\Local\Temp\310da667cf387ecfe5d24730104fefbd3f9478c786db59c8ee7a39c1265e8af0.exe"C:\Users\Admin\AppData\Local\Temp\310da667cf387ecfe5d24730104fefbd3f9478c786db59c8ee7a39c1265e8af0.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\310da667cf387ecfe5d24730104fefbd3f9478c786db59c8ee7a39c1265e8af0.exe" /f2⤵
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Windows\system32\reg.exeREG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\310da667cf387ecfe5d24730104fefbd3f9478c786db59c8ee7a39c1265e8af0.exe" /f3⤵PID:2508
-
-