Analysis
-
max time kernel
90s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
12/06/2022, 16:16
Behavioral task
behavioral1
Sample
tamit/replay.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
tamit/replay.dll
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
tamit/replay.lnk
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
tamit/replay.lnk
Resource
win10v2004-20220414-en
General
-
Target
tamit/replay.lnk
-
Size
1KB
-
MD5
61cd98f27ff508bc3cbd1c170433e124
-
SHA1
8da65cee30058238bf40f6a37d9352cb0aeb3a19
-
SHA256
30d4b41def9a6295cc68f4cf87d7a085bca02f0a3f5826efa6891dd3a3b44e95
-
SHA512
578e00495f5604dc692678682e559c3e5f18a9b399a184e5df2f9bbd16518657245737084ae80fefbd3b487b44941ee95a9543c72264615cfc9330091ad5878a
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2432 wrote to memory of 4572 2432 cmd.exe 82 PID 2432 wrote to memory of 4572 2432 cmd.exe 82