Analysis
-
max time kernel
182s -
max time network
203s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
20-02-2022 09:01
Static task
static1
Behavioral task
behavioral1
Sample
2a97228a72f59f4a7095efcadf5adf6d2f6365e094b7c3de34348ab38a3e9912.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
2a97228a72f59f4a7095efcadf5adf6d2f6365e094b7c3de34348ab38a3e9912.exe
Resource
win10v2004-en-20220113
General
-
Target
2a97228a72f59f4a7095efcadf5adf6d2f6365e094b7c3de34348ab38a3e9912.exe
-
Size
193KB
-
MD5
cfb761465693bd4511f038d8e468e62e
-
SHA1
c8d64b3d2208a3cf40f4d9c182c9829beaa1eb86
-
SHA256
2a97228a72f59f4a7095efcadf5adf6d2f6365e094b7c3de34348ab38a3e9912
-
SHA512
2622751f9f5ab89287a1d88c9f027a7117549fcd0280f104a598c7953713d32e6ce5adfdd26abec709e1c848b8bc9f50e5226185721a22d2b3573d2d0264d36c
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4556 asvyDmo.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation 2a97228a72f59f4a7095efcadf5adf6d2f6365e094b7c3de34348ab38a3e9912.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1604 2a97228a72f59f4a7095efcadf5adf6d2f6365e094b7c3de34348ab38a3e9912.exe 1604 2a97228a72f59f4a7095efcadf5adf6d2f6365e094b7c3de34348ab38a3e9912.exe 1604 2a97228a72f59f4a7095efcadf5adf6d2f6365e094b7c3de34348ab38a3e9912.exe 1604 2a97228a72f59f4a7095efcadf5adf6d2f6365e094b7c3de34348ab38a3e9912.exe 4556 asvyDmo.exe 4556 asvyDmo.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeBackupPrivilege 1604 2a97228a72f59f4a7095efcadf5adf6d2f6365e094b7c3de34348ab38a3e9912.exe Token: SeBackupPrivilege 4556 asvyDmo.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1604 wrote to memory of 4556 1604 2a97228a72f59f4a7095efcadf5adf6d2f6365e094b7c3de34348ab38a3e9912.exe 86 PID 1604 wrote to memory of 4556 1604 2a97228a72f59f4a7095efcadf5adf6d2f6365e094b7c3de34348ab38a3e9912.exe 86 PID 1604 wrote to memory of 4556 1604 2a97228a72f59f4a7095efcadf5adf6d2f6365e094b7c3de34348ab38a3e9912.exe 86 PID 1604 wrote to memory of 4700 1604 2a97228a72f59f4a7095efcadf5adf6d2f6365e094b7c3de34348ab38a3e9912.exe 88 PID 1604 wrote to memory of 4700 1604 2a97228a72f59f4a7095efcadf5adf6d2f6365e094b7c3de34348ab38a3e9912.exe 88 PID 1604 wrote to memory of 4700 1604 2a97228a72f59f4a7095efcadf5adf6d2f6365e094b7c3de34348ab38a3e9912.exe 88 PID 4700 wrote to memory of 1144 4700 net.exe 90 PID 4700 wrote to memory of 1144 4700 net.exe 90 PID 4700 wrote to memory of 1144 4700 net.exe 90 PID 1604 wrote to memory of 4956 1604 2a97228a72f59f4a7095efcadf5adf6d2f6365e094b7c3de34348ab38a3e9912.exe 91 PID 1604 wrote to memory of 4956 1604 2a97228a72f59f4a7095efcadf5adf6d2f6365e094b7c3de34348ab38a3e9912.exe 91 PID 1604 wrote to memory of 4956 1604 2a97228a72f59f4a7095efcadf5adf6d2f6365e094b7c3de34348ab38a3e9912.exe 91 PID 4956 wrote to memory of 4012 4956 net.exe 93 PID 4956 wrote to memory of 4012 4956 net.exe 93 PID 4956 wrote to memory of 4012 4956 net.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a97228a72f59f4a7095efcadf5adf6d2f6365e094b7c3de34348ab38a3e9912.exe"C:\Users\Admin\AppData\Local\Temp\2a97228a72f59f4a7095efcadf5adf6d2f6365e094b7c3de34348ab38a3e9912.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\asvyDmo.exe"C:\Users\Admin\AppData\Local\Temp\asvyDmo.exe" 8 LAN2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4556
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:1144
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:4012
-
-