Analysis
-
max time kernel
91s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
12/06/2022, 22:07
Static task
static1
Behavioral task
behavioral1
Sample
1e23bbbc5a3883083984f90130b842709bbdda27370f33190c7637373eab94ab.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
1e23bbbc5a3883083984f90130b842709bbdda27370f33190c7637373eab94ab.exe
Resource
win10v2004-20220414-en
General
-
Target
1e23bbbc5a3883083984f90130b842709bbdda27370f33190c7637373eab94ab.exe
-
Size
320KB
-
MD5
bcfb9b84aba103a8b57e20b3cb9559ba
-
SHA1
a114b061796f259e86601ec82fe453d280036f36
-
SHA256
1e23bbbc5a3883083984f90130b842709bbdda27370f33190c7637373eab94ab
-
SHA512
e852ec7807fa061a9fbb8abb9033e4521e0c130a6de4953d0b6673fd6d420fa7102a51c18892c19b898abd38a78cf394a54a09a6030d37594f7a3088eed4bec0
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2040 1e23bbbc5a3883083984f90130b842709bbdda27370f33190c7637373eab94ab.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation 1e23bbbc5a3883083984f90130b842709bbdda27370f33190c7637373eab94ab.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2700 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3568 1e23bbbc5a3883083984f90130b842709bbdda27370f33190c7637373eab94ab.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3568 wrote to memory of 2040 3568 1e23bbbc5a3883083984f90130b842709bbdda27370f33190c7637373eab94ab.exe 84 PID 3568 wrote to memory of 2040 3568 1e23bbbc5a3883083984f90130b842709bbdda27370f33190c7637373eab94ab.exe 84 PID 3568 wrote to memory of 2040 3568 1e23bbbc5a3883083984f90130b842709bbdda27370f33190c7637373eab94ab.exe 84 PID 3568 wrote to memory of 1180 3568 1e23bbbc5a3883083984f90130b842709bbdda27370f33190c7637373eab94ab.exe 85 PID 3568 wrote to memory of 1180 3568 1e23bbbc5a3883083984f90130b842709bbdda27370f33190c7637373eab94ab.exe 85 PID 3568 wrote to memory of 1180 3568 1e23bbbc5a3883083984f90130b842709bbdda27370f33190c7637373eab94ab.exe 85 PID 1180 wrote to memory of 2700 1180 cmd.exe 87 PID 1180 wrote to memory of 2700 1180 cmd.exe 87 PID 1180 wrote to memory of 2700 1180 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e23bbbc5a3883083984f90130b842709bbdda27370f33190c7637373eab94ab.exe"C:\Users\Admin\AppData\Local\Temp\1e23bbbc5a3883083984f90130b842709bbdda27370f33190c7637373eab94ab.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Users\Admin\AppData\Local\Temp\1e23bbbc5a3883083984f90130b842709bbdda27370f33190c7637373eab94ab\1e23bbbc5a3883083984f90130b842709bbdda27370f33190c7637373eab94ab.exe"C:\Users\Admin\AppData\Local\Temp\1e23bbbc5a3883083984f90130b842709bbdda27370f33190c7637373eab94ab\1e23bbbc5a3883083984f90130b842709bbdda27370f33190c7637373eab94ab.exe"2⤵
- Executes dropped EXE
PID:2040
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\1e23bbbc5a3883083984f90130b842709bbdda27370f33190c7637373eab94ab.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 10003⤵
- Runs ping.exe
PID:2700
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\1e23bbbc5a3883083984f90130b842709bbdda27370f33190c7637373eab94ab.exe.log
Filesize771B
MD536c85b51fe803ac6009874a8f4a4879a
SHA1b33dfa5c3cb416db33a167edad92d1e678fd6c5f
SHA256b3d71b4a609a9b0e117b5b2acdfbb9b59d71aae2f27b5f9bc3f03796949dfb03
SHA512e9efd16b585cbe747d46da115474a957e969b067c478628cae47bd84f13575a8d737f6256dd65907e05c3556e668a0deaf6a0393382815d799c3959233ec38eb
-
C:\Users\Admin\AppData\Local\Temp\1e23bbbc5a3883083984f90130b842709bbdda27370f33190c7637373eab94ab\1e23bbbc5a3883083984f90130b842709bbdda27370f33190c7637373eab94ab.exe
Filesize320KB
MD5bcfb9b84aba103a8b57e20b3cb9559ba
SHA1a114b061796f259e86601ec82fe453d280036f36
SHA2561e23bbbc5a3883083984f90130b842709bbdda27370f33190c7637373eab94ab
SHA512e852ec7807fa061a9fbb8abb9033e4521e0c130a6de4953d0b6673fd6d420fa7102a51c18892c19b898abd38a78cf394a54a09a6030d37594f7a3088eed4bec0
-
C:\Users\Admin\AppData\Local\Temp\1e23bbbc5a3883083984f90130b842709bbdda27370f33190c7637373eab94ab\1e23bbbc5a3883083984f90130b842709bbdda27370f33190c7637373eab94ab.exe
Filesize320KB
MD5bcfb9b84aba103a8b57e20b3cb9559ba
SHA1a114b061796f259e86601ec82fe453d280036f36
SHA2561e23bbbc5a3883083984f90130b842709bbdda27370f33190c7637373eab94ab
SHA512e852ec7807fa061a9fbb8abb9033e4521e0c130a6de4953d0b6673fd6d420fa7102a51c18892c19b898abd38a78cf394a54a09a6030d37594f7a3088eed4bec0