Analysis
-
max time kernel
83s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
20/02/2022, 08:47
Static task
static1
Behavioral task
behavioral1
Sample
3012f472969327d5f8c9dac63b8ea9c5cb0de002d16c120a6bba4685120f58b4.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
3012f472969327d5f8c9dac63b8ea9c5cb0de002d16c120a6bba4685120f58b4.exe
Resource
win10v2004-en-20220113
General
-
Target
3012f472969327d5f8c9dac63b8ea9c5cb0de002d16c120a6bba4685120f58b4.exe
-
Size
171KB
-
MD5
d348f536e214a47655af387408b4fca5
-
SHA1
13f11e273f9a4a56557f03821c3bfd591cca6ebc
-
SHA256
3012f472969327d5f8c9dac63b8ea9c5cb0de002d16c120a6bba4685120f58b4
-
SHA512
ca47ea2acf9d2a14172c9eb640b0a3ad87da24aa071192756f09f138046e61f6ee66004cd938be84fee871b1068418537eb167fc6063a0e1f3d73af00d2b8d8e
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation 3012f472969327d5f8c9dac63b8ea9c5cb0de002d16c120a6bba4685120f58b4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4780 3012f472969327d5f8c9dac63b8ea9c5cb0de002d16c120a6bba4685120f58b4.exe 4780 3012f472969327d5f8c9dac63b8ea9c5cb0de002d16c120a6bba4685120f58b4.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4780 3012f472969327d5f8c9dac63b8ea9c5cb0de002d16c120a6bba4685120f58b4.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4780 wrote to memory of 4584 4780 3012f472969327d5f8c9dac63b8ea9c5cb0de002d16c120a6bba4685120f58b4.exe 83 PID 4780 wrote to memory of 4584 4780 3012f472969327d5f8c9dac63b8ea9c5cb0de002d16c120a6bba4685120f58b4.exe 83 PID 4780 wrote to memory of 2276 4780 3012f472969327d5f8c9dac63b8ea9c5cb0de002d16c120a6bba4685120f58b4.exe 65 PID 4584 wrote to memory of 3128 4584 cmd.exe 85 PID 4584 wrote to memory of 3128 4584 cmd.exe 85 PID 4780 wrote to memory of 2300 4780 3012f472969327d5f8c9dac63b8ea9c5cb0de002d16c120a6bba4685120f58b4.exe 64 PID 4780 wrote to memory of 2420 4780 3012f472969327d5f8c9dac63b8ea9c5cb0de002d16c120a6bba4685120f58b4.exe 28 PID 4780 wrote to memory of 708 4780 3012f472969327d5f8c9dac63b8ea9c5cb0de002d16c120a6bba4685120f58b4.exe 54 PID 4780 wrote to memory of 3260 4780 3012f472969327d5f8c9dac63b8ea9c5cb0de002d16c120a6bba4685120f58b4.exe 53
Processes
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2420
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3260
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:708
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2300
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\3012f472969327d5f8c9dac63b8ea9c5cb0de002d16c120a6bba4685120f58b4.exe"C:\Users\Admin\AppData\Local\Temp\3012f472969327d5f8c9dac63b8ea9c5cb0de002d16c120a6bba4685120f58b4.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\3012f472969327d5f8c9dac63b8ea9c5cb0de002d16c120a6bba4685120f58b4.exe" /f2⤵
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\system32\reg.exeREG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\3012f472969327d5f8c9dac63b8ea9c5cb0de002d16c120a6bba4685120f58b4.exe" /f3⤵PID:3128
-
-