Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
25-05-2022 01:17
Static task
static1
Behavioral task
behavioral1
Sample
5b220aee49202eb35af52535921691f5eda758b442d7d023343f15bbbb1ef69c.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
5b220aee49202eb35af52535921691f5eda758b442d7d023343f15bbbb1ef69c.exe
Resource
win10v2004-20220414-en
General
-
Target
5b220aee49202eb35af52535921691f5eda758b442d7d023343f15bbbb1ef69c.exe
-
Size
1.4MB
-
MD5
8ec45a62cf34fc74d4bef6292b0840a7
-
SHA1
6578ab3b13864909b972a8916adc85a117970661
-
SHA256
5b220aee49202eb35af52535921691f5eda758b442d7d023343f15bbbb1ef69c
-
SHA512
2190f14e74b61af4e720ecb68bf61fba73dba24fb1650ca378d23d4d13692d5b81092752cb076683dc59ac011aa731d9be97d37c489337e1fe5af731c02122e5
Malware Config
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 1 IoCs
Processes:
svchost.batpid process 1756 svchost.bat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
5b220aee49202eb35af52535921691f5eda758b442d7d023343f15bbbb1ef69c.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation 5b220aee49202eb35af52535921691f5eda758b442d7d023343f15bbbb1ef69c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
5b220aee49202eb35af52535921691f5eda758b442d7d023343f15bbbb1ef69c.exesvchost.batdescription pid process target process PID 3356 wrote to memory of 1756 3356 5b220aee49202eb35af52535921691f5eda758b442d7d023343f15bbbb1ef69c.exe svchost.bat PID 3356 wrote to memory of 1756 3356 5b220aee49202eb35af52535921691f5eda758b442d7d023343f15bbbb1ef69c.exe svchost.bat PID 3356 wrote to memory of 1756 3356 5b220aee49202eb35af52535921691f5eda758b442d7d023343f15bbbb1ef69c.exe svchost.bat PID 1756 wrote to memory of 3916 1756 svchost.bat svchost.exe PID 1756 wrote to memory of 3916 1756 svchost.bat svchost.exe PID 1756 wrote to memory of 3916 1756 svchost.bat svchost.exe PID 1756 wrote to memory of 3916 1756 svchost.bat svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b220aee49202eb35af52535921691f5eda758b442d7d023343f15bbbb1ef69c.exe"C:\Users\Admin\AppData\Local\Temp\5b220aee49202eb35af52535921691f5eda758b442d7d023343f15bbbb1ef69c.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Users\Admin\AppData\Local\Temp\7zSC1D82AA6\svchost.bat"C:\Users\Admin\AppData\Local\Temp\7zSC1D82AA6\svchost.bat"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:3916
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
641KB
MD5041b36a7b4616b747525d6bb166d2487
SHA175bac4fef064e10deccaf9e03d498bd2f5ba9810
SHA256e59eb81d66ec38ae1e14fab35f370c52359a21d2d3af5b7b8bb2c614b2bd51ea
SHA5127eeb807fe1461369e3879202a0fafa360506d8c6df73c9e6c9f4f9d50e7b6df6b085b6227ceda77e3ecc971956cb86794a5a9207f0b90c0fccd8546bfbb5e74b
-
Filesize
641KB
MD5041b36a7b4616b747525d6bb166d2487
SHA175bac4fef064e10deccaf9e03d498bd2f5ba9810
SHA256e59eb81d66ec38ae1e14fab35f370c52359a21d2d3af5b7b8bb2c614b2bd51ea
SHA5127eeb807fe1461369e3879202a0fafa360506d8c6df73c9e6c9f4f9d50e7b6df6b085b6227ceda77e3ecc971956cb86794a5a9207f0b90c0fccd8546bfbb5e74b