Analysis
-
max time kernel
107s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
25-05-2022 21:35
Static task
static1
Behavioral task
behavioral1
Sample
data64_6.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
data64_6.exe
Resource
win10v2004-20220414-en
General
-
Target
data64_6.exe
-
Size
1.9MB
-
MD5
87953bdf18ba88061cf28ad17116b56f
-
SHA1
bc04b30d0e7ca0fc34b1d507ab4b991e0cc5dbc6
-
SHA256
9ad06b0e000800a33d381949658dbd0bfd7c7f1025aa5c81621b55f2f69a7a3f
-
SHA512
19d8520c62da97a0a793c1f9eb17ae5865ea3d6d9e4734ac5e4069c864f52fccf06d5961c136095c73e7ee6c3ce1e9ae0038f32e8941f5aa2599327111b386c3
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
data64_6.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation data64_6.exe -
Loads dropped DLL 2 IoCs
Processes:
regsvr32.exepid process 312 regsvr32.exe 312 regsvr32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
data64_6.exedescription pid process target process PID 2004 wrote to memory of 312 2004 data64_6.exe regsvr32.exe PID 2004 wrote to memory of 312 2004 data64_6.exe regsvr32.exe PID 2004 wrote to memory of 312 2004 data64_6.exe regsvr32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\data64_6.exe"C:\Users\Admin\AppData\Local\Temp\data64_6.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /U /S V8NgH.K2⤵
- Loads dropped DLL
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\V8NgH.KFilesize
662.2MB
MD5b623c4bb3d8823fd82ab0886bad00de4
SHA1a24889592c527b8fd7770946b04ecc25e7c7760c
SHA2565b2d0a633906196dbc624285e898f97e3da81d4c4b32133902287a092ef6bec4
SHA512fd0ebe381cbcaa5df75ccedf79e6376029d4894bd1979e6a38679c6f60c0eea76aa547485c063d5297f7265af78c86b5b7a9d1d1b7675ad471705290899c0005
-
C:\Users\Admin\AppData\Local\Temp\v8NgH.KFilesize
631.6MB
MD54d6c67f95e76ae1ad168e0382563cf69
SHA1c17bba639fdedf07d4d63d4f4b89850cb383f0ca
SHA2569e49a5cc7b33076fbb649854dbb2f435e682356a6dfe1e8f00e8400270a61edd
SHA51210405cdc984a6d65ebe2143d4cb6da6757a643c67b8ddd1d6c115c1a3cc5ae0d5314a61c730b40a4dd43f111024d9ba9d5e6f6f0667bd57adc31251a5cc1b1ea
-
C:\Users\Admin\AppData\Local\Temp\v8NgH.KFilesize
641.8MB
MD5267c3991eebda1bf446cba000e23a755
SHA13fb8de6dccb22cbd97243fdad1cab5ce1cc9db8c
SHA2562e3307bbb7a13c10c43e23d380a177fea2dcf7da12e1b7f950dc82cb7f0d9edc
SHA51229b12bd7f360f7030763a3572d1090007ae100ff2e3ec6dbe2705023ee6528388a21d0472e4f452d69470f89a489dc61eeedd26d5714ed7dd4051cd82ab8447f
-
memory/312-130-0x0000000000000000-mapping.dmp
-
memory/312-134-0x0000000002E60000-0x0000000003E60000-memory.dmpFilesize
16.0MB
-
memory/312-135-0x000000002DD80000-0x000000002DE5F000-memory.dmpFilesize
892KB
-
memory/312-136-0x000000002DF20000-0x000000002DFDB000-memory.dmpFilesize
748KB
-
memory/312-137-0x000000002DFE0000-0x000000002E094000-memory.dmpFilesize
720KB
-
memory/312-138-0x000000002E0A0000-0x000000002E140000-memory.dmpFilesize
640KB