Analysis
-
max time kernel
614s -
max time network
633s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2022 21:06
Static task
static1
Behavioral task
behavioral1
Sample
0ca79bf8ca2b0e12ee245cb37f06da4ca397fdd84166d0913fc8ebc3a62b7711.exe
Resource
win7-20220718-en
General
-
Target
0ca79bf8ca2b0e12ee245cb37f06da4ca397fdd84166d0913fc8ebc3a62b7711.exe
-
Size
498KB
-
MD5
99d55290f6f2d4f2f7315da9b6dfe4e0
-
SHA1
d171e5f0a3916de88286dc99fdc158855be0ce71
-
SHA256
0ca79bf8ca2b0e12ee245cb37f06da4ca397fdd84166d0913fc8ebc3a62b7711
-
SHA512
655ffce301340439020cf79c0ffca2eddc66328f377bec5cdbf471f2cb9ebfad3176cd73fac3383d3b825b40e730d5dd61373deaa79c401eea064429d40346c2
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2088 lphsi.exe 4184 hrss.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000\Control Panel\International\Geo\Nation 0ca79bf8ca2b0e12ee245cb37f06da4ca397fdd84166d0913fc8ebc3a62b7711.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\script.lnk hrss.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2088 1732 0ca79bf8ca2b0e12ee245cb37f06da4ca397fdd84166d0913fc8ebc3a62b7711.exe 83 PID 1732 wrote to memory of 2088 1732 0ca79bf8ca2b0e12ee245cb37f06da4ca397fdd84166d0913fc8ebc3a62b7711.exe 83 PID 1732 wrote to memory of 2088 1732 0ca79bf8ca2b0e12ee245cb37f06da4ca397fdd84166d0913fc8ebc3a62b7711.exe 83 PID 1732 wrote to memory of 4184 1732 0ca79bf8ca2b0e12ee245cb37f06da4ca397fdd84166d0913fc8ebc3a62b7711.exe 84 PID 1732 wrote to memory of 4184 1732 0ca79bf8ca2b0e12ee245cb37f06da4ca397fdd84166d0913fc8ebc3a62b7711.exe 84 PID 1732 wrote to memory of 4184 1732 0ca79bf8ca2b0e12ee245cb37f06da4ca397fdd84166d0913fc8ebc3a62b7711.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ca79bf8ca2b0e12ee245cb37f06da4ca397fdd84166d0913fc8ebc3a62b7711.exe"C:\Users\Admin\AppData\Local\Temp\0ca79bf8ca2b0e12ee245cb37f06da4ca397fdd84166d0913fc8ebc3a62b7711.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Public\Video\lphsi.exe"C:\Users\Public\Video\lphsi.exe"2⤵
- Executes dropped EXE
PID:2088
-
-
C:\Users\Public\Video\hrss.exe"C:\Users\Public\Video\hrss.exe"2⤵
- Executes dropped EXE
- Drops startup file
PID:4184
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
214KB
MD55de79fd53f3ec570969d404469d3acfb
SHA1d2fc0fc28650609641169ef43ab6ba27ba1c268b
SHA256d0db839579dead9fea0feb383ccd57e7b394b3670c3f7240ddec8a4fbf7afe14
SHA512d19b130eda365e9d2625231113ca65a6543bcd56f9b9727cb17c859a68f2f678be0495f84ae0f17867fda3ff3325f2fe211e4a00fb3d6c8aee41c1f4864be05c
-
Filesize
214KB
MD55de79fd53f3ec570969d404469d3acfb
SHA1d2fc0fc28650609641169ef43ab6ba27ba1c268b
SHA256d0db839579dead9fea0feb383ccd57e7b394b3670c3f7240ddec8a4fbf7afe14
SHA512d19b130eda365e9d2625231113ca65a6543bcd56f9b9727cb17c859a68f2f678be0495f84ae0f17867fda3ff3325f2fe211e4a00fb3d6c8aee41c1f4864be05c
-
Filesize
201KB
MD50bafccfaec9c7d45ce491e4b0ddc1bdf
SHA1f0fa26da45d04ca36e9eb0acbc2d8ddce881e096
SHA2569da1a55b88bda3810ccd482051dc7e0088e8539ef8da5ddd29c583f593244e1c
SHA512c32b734420be1ee3a54dfea117f2fb14353fbd39831d8bbe8a4515c983f0781c38d4bcc8a6c5fd0785693fa3a16add499387bd8add21f706c9927d537e38184e
-
Filesize
201KB
MD50bafccfaec9c7d45ce491e4b0ddc1bdf
SHA1f0fa26da45d04ca36e9eb0acbc2d8ddce881e096
SHA2569da1a55b88bda3810ccd482051dc7e0088e8539ef8da5ddd29c583f593244e1c
SHA512c32b734420be1ee3a54dfea117f2fb14353fbd39831d8bbe8a4515c983f0781c38d4bcc8a6c5fd0785693fa3a16add499387bd8add21f706c9927d537e38184e