Analysis
-
max time kernel
70s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 15:23
Static task
static1
Behavioral task
behavioral1
Sample
8547bfc210914196a129e806728296ca.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
8547bfc210914196a129e806728296ca.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
8547bfc210914196a129e806728296ca.exe
-
Size
390KB
-
MD5
8547bfc210914196a129e806728296ca
-
SHA1
ea54c21ecfd461d7e19d5ba06d6194e2d9c45d4d
-
SHA256
27051adfee7b49d84fb4a5a67808114d53bcdc81041f991b9aed2ddff06a716c
-
SHA512
d40afa35d508767ffbf077e707b08ae7ca0b1a9aaec188f9d1fa422dccce1ccce137fc4fbbf4f289c1faba762a3978413ace8f3ba59ceb7300aaea20f554f5e0
Score
7/10
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation 8547bfc210914196a129e806728296ca.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 7 IoCs
pid pid_target Process procid_target 2640 2104 WerFault.exe 81 4980 2104 WerFault.exe 81 4956 2104 WerFault.exe 81 3088 2104 WerFault.exe 81 4628 2104 WerFault.exe 81 4296 2104 WerFault.exe 81 1432 2104 WerFault.exe 81 -
Kills process with taskkill 1 IoCs
pid Process 1292 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1292 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2160 2104 8547bfc210914196a129e806728296ca.exe 98 PID 2104 wrote to memory of 2160 2104 8547bfc210914196a129e806728296ca.exe 98 PID 2104 wrote to memory of 2160 2104 8547bfc210914196a129e806728296ca.exe 98 PID 2160 wrote to memory of 1292 2160 cmd.exe 102 PID 2160 wrote to memory of 1292 2160 cmd.exe 102 PID 2160 wrote to memory of 1292 2160 cmd.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\8547bfc210914196a129e806728296ca.exe"C:\Users\Admin\AppData\Local\Temp\8547bfc210914196a129e806728296ca.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2104 -s 7002⤵
- Program crash
PID:2640
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2104 -s 7682⤵
- Program crash
PID:4980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2104 -s 9402⤵
- Program crash
PID:4956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2104 -s 7642⤵
- Program crash
PID:3088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2104 -s 7642⤵
- Program crash
PID:4628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2104 -s 9522⤵
- Program crash
PID:4296
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "8547bfc210914196a129e806728296ca.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\8547bfc210914196a129e806728296ca.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "8547bfc210914196a129e806728296ca.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1292
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2104 -s 10082⤵
- Program crash
PID:1432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2104 -ip 21041⤵PID:2792
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2104 -ip 21041⤵PID:2836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2104 -ip 21041⤵PID:4248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2104 -ip 21041⤵PID:3572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 2104 -ip 21041⤵PID:2588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2104 -ip 21041⤵PID:5040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 2104 -ip 21041⤵PID:4944