Analysis
-
max time kernel
130s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-05-2022 13:59
Static task
static1
Behavioral task
behavioral1
Sample
3c68fd735f165dfed20be28518aa425e8537a84b93a84d85d501e6d9b8f3417d.lnk
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
3c68fd735f165dfed20be28518aa425e8537a84b93a84d85d501e6d9b8f3417d.lnk
-
Size
2KB
-
MD5
5cfc2d030aaf562aa03237f52ba7115a
-
SHA1
f37eaea4dba612c383e582a73010ac4028499f11
-
SHA256
3c68fd735f165dfed20be28518aa425e8537a84b93a84d85d501e6d9b8f3417d
-
SHA512
22b6c93e31f89efb7384e8c8fad23b037286b3b72b92ba7aeeb19b29a8d27743f46d465d433663c18d0aac861eaced58dbfc8268f0d02a279f99c998483278ab
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4188 wrote to memory of 740 4188 cmd.exe 81 PID 4188 wrote to memory of 740 4188 cmd.exe 81 PID 740 wrote to memory of 1816 740 cmd.exe 82 PID 740 wrote to memory of 1816 740 cmd.exe 82 PID 740 wrote to memory of 3152 740 cmd.exe 83 PID 740 wrote to memory of 3152 740 cmd.exe 83 PID 740 wrote to memory of 1548 740 cmd.exe 84 PID 740 wrote to memory of 1548 740 cmd.exe 84
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\3c68fd735f165dfed20be28518aa425e8537a84b93a84d85d501e6d9b8f3417d.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c path=C:\Windows\system32&move "KYC Documenten.pdf.lnk " "C:\Users\Admin\AppData\Local\Temp\1.lnk"&type "C:\Users\Admin\AppData\Local\Temp\1.lnk"|find "END2">"C:\Users\Admin\AppData\Local\Temp\0.js"&wscript "C:\Users\Admin\AppData\Local\Temp\0.js"2⤵
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" type "C:\Users\Admin\AppData\Local\Temp\1.lnk""3⤵PID:1816
-
-
C:\Windows\system32\find.exefind "END2"3⤵PID:3152
-
-
C:\Windows\system32\wscript.exewscript "C:\Users\Admin\AppData\Local\Temp\0.js"3⤵PID:1548
-
-