Analysis
-
max time kernel
91s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
11-07-2022 17:27
Static task
static1
Behavioral task
behavioral1
Sample
102755.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
102755.dll
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
TXRTN_4654211.lnk
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
TXRTN_4654211.lnk
Resource
win10v2004-20220414-en
Behavioral task
behavioral5
Sample
WindowsCodecs.dll
Resource
win7-20220414-en
Behavioral task
behavioral6
Sample
WindowsCodecs.dll
Resource
win10v2004-20220414-en
Behavioral task
behavioral7
Sample
calc.exe
Resource
win7-20220414-en
Behavioral task
behavioral8
Sample
calc.exe
Resource
win10v2004-20220414-en
General
-
Target
TXRTN_4654211.lnk
-
Size
1KB
-
MD5
eea824215afd2936b4b9c428558a11ed
-
SHA1
de5d15491319ee9c15c3bcbf215d9f6996f76776
-
SHA256
aa1add7b438592b57f9c7e53f5c19ead55d313824822835c73ca998f8e06134d
-
SHA512
24b0322fefbbb9eb57629f9396466cfbc79e205f126209319cd9ad2c83dda9a7975ac987058dc730e9149b6e315cfed35924e40a14a313655961bb4ed26a0b77
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cmd.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
cmd.execmd.execalc.exedescription pid process target process PID 1540 wrote to memory of 3176 1540 cmd.exe cmd.exe PID 1540 wrote to memory of 3176 1540 cmd.exe cmd.exe PID 3176 wrote to memory of 4992 3176 cmd.exe calc.exe PID 3176 wrote to memory of 4992 3176 cmd.exe calc.exe PID 3176 wrote to memory of 4992 3176 cmd.exe calc.exe PID 4992 wrote to memory of 2176 4992 calc.exe regsvr32.exe PID 4992 wrote to memory of 2176 4992 calc.exe regsvr32.exe PID 4992 wrote to memory of 2176 4992 calc.exe regsvr32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\TXRTN_4654211.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /q /c calc.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Users\Admin\AppData\Local\Temp\calc.execalc.exe3⤵
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\SysWOW64\regsvr32.exe 102755.dll4⤵PID:2176