Analysis
-
max time kernel
77s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
06-08-2022 07:05
Static task
static1
Behavioral task
behavioral1
Sample
8efdbfe8c5cb0cacaca53e190caca052.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
8efdbfe8c5cb0cacaca53e190caca052.exe
Resource
win10v2004-20220721-en
General
-
Target
8efdbfe8c5cb0cacaca53e190caca052.exe
-
Size
223KB
-
MD5
8efdbfe8c5cb0cacaca53e190caca052
-
SHA1
74961a5b6cdc720b39ba613da403fe6ffd44c2ec
-
SHA256
8d687ad5eaee819a0288bf65c8139a35679339c404ac589494caecd69beef0ec
-
SHA512
fb39103cc20b3ef7e461152ac5cfcedf91c39d3e7f8132496cb836560d95a347c353e8050e1fbcad190a691fc8e5a4f1fa6ba7f626c869ccb9864725bdb1bb88
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
8efdbfe8c5cb0cacaca53e190caca052.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\Control Panel\International\Geo\Nation 8efdbfe8c5cb0cacaca53e190caca052.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
8efdbfe8c5cb0cacaca53e190caca052.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Rlxbfw = "\"C:\\Users\\Admin\\AppData\\Roaming\\Lhgvysi\\Rlxbfw.exe\"" 8efdbfe8c5cb0cacaca53e190caca052.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 22 IoCs
Processes:
powershell.exe8efdbfe8c5cb0cacaca53e190caca052.exepid process 4296 powershell.exe 4296 powershell.exe 3804 8efdbfe8c5cb0cacaca53e190caca052.exe 3804 8efdbfe8c5cb0cacaca53e190caca052.exe 3804 8efdbfe8c5cb0cacaca53e190caca052.exe 3804 8efdbfe8c5cb0cacaca53e190caca052.exe 3804 8efdbfe8c5cb0cacaca53e190caca052.exe 3804 8efdbfe8c5cb0cacaca53e190caca052.exe 3804 8efdbfe8c5cb0cacaca53e190caca052.exe 3804 8efdbfe8c5cb0cacaca53e190caca052.exe 3804 8efdbfe8c5cb0cacaca53e190caca052.exe 3804 8efdbfe8c5cb0cacaca53e190caca052.exe 3804 8efdbfe8c5cb0cacaca53e190caca052.exe 3804 8efdbfe8c5cb0cacaca53e190caca052.exe 3804 8efdbfe8c5cb0cacaca53e190caca052.exe 3804 8efdbfe8c5cb0cacaca53e190caca052.exe 3804 8efdbfe8c5cb0cacaca53e190caca052.exe 3804 8efdbfe8c5cb0cacaca53e190caca052.exe 3804 8efdbfe8c5cb0cacaca53e190caca052.exe 3804 8efdbfe8c5cb0cacaca53e190caca052.exe 3804 8efdbfe8c5cb0cacaca53e190caca052.exe 3804 8efdbfe8c5cb0cacaca53e190caca052.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
8efdbfe8c5cb0cacaca53e190caca052.exepowershell.exedescription pid process Token: SeDebugPrivilege 3804 8efdbfe8c5cb0cacaca53e190caca052.exe Token: SeDebugPrivilege 4296 powershell.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
8efdbfe8c5cb0cacaca53e190caca052.exedescription pid process target process PID 3804 wrote to memory of 4296 3804 8efdbfe8c5cb0cacaca53e190caca052.exe powershell.exe PID 3804 wrote to memory of 4296 3804 8efdbfe8c5cb0cacaca53e190caca052.exe powershell.exe PID 3804 wrote to memory of 4468 3804 8efdbfe8c5cb0cacaca53e190caca052.exe InstallUtil.exe PID 3804 wrote to memory of 4468 3804 8efdbfe8c5cb0cacaca53e190caca052.exe InstallUtil.exe PID 3804 wrote to memory of 1328 3804 8efdbfe8c5cb0cacaca53e190caca052.exe InstallUtil.exe PID 3804 wrote to memory of 1328 3804 8efdbfe8c5cb0cacaca53e190caca052.exe InstallUtil.exe PID 3804 wrote to memory of 2116 3804 8efdbfe8c5cb0cacaca53e190caca052.exe InstallUtil.exe PID 3804 wrote to memory of 2116 3804 8efdbfe8c5cb0cacaca53e190caca052.exe InstallUtil.exe PID 3804 wrote to memory of 1348 3804 8efdbfe8c5cb0cacaca53e190caca052.exe InstallUtil.exe PID 3804 wrote to memory of 1348 3804 8efdbfe8c5cb0cacaca53e190caca052.exe InstallUtil.exe PID 3804 wrote to memory of 3340 3804 8efdbfe8c5cb0cacaca53e190caca052.exe InstallUtil.exe PID 3804 wrote to memory of 3340 3804 8efdbfe8c5cb0cacaca53e190caca052.exe InstallUtil.exe PID 3804 wrote to memory of 4612 3804 8efdbfe8c5cb0cacaca53e190caca052.exe InstallUtil.exe PID 3804 wrote to memory of 4612 3804 8efdbfe8c5cb0cacaca53e190caca052.exe InstallUtil.exe PID 3804 wrote to memory of 1652 3804 8efdbfe8c5cb0cacaca53e190caca052.exe InstallUtil.exe PID 3804 wrote to memory of 1652 3804 8efdbfe8c5cb0cacaca53e190caca052.exe InstallUtil.exe PID 3804 wrote to memory of 3484 3804 8efdbfe8c5cb0cacaca53e190caca052.exe InstallUtil.exe PID 3804 wrote to memory of 3484 3804 8efdbfe8c5cb0cacaca53e190caca052.exe InstallUtil.exe PID 3804 wrote to memory of 1880 3804 8efdbfe8c5cb0cacaca53e190caca052.exe InstallUtil.exe PID 3804 wrote to memory of 1880 3804 8efdbfe8c5cb0cacaca53e190caca052.exe InstallUtil.exe PID 3804 wrote to memory of 1276 3804 8efdbfe8c5cb0cacaca53e190caca052.exe InstallUtil.exe PID 3804 wrote to memory of 1276 3804 8efdbfe8c5cb0cacaca53e190caca052.exe InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8efdbfe8c5cb0cacaca53e190caca052.exe"C:\Users\Admin\AppData\Local\Temp\8efdbfe8c5cb0cacaca53e190caca052.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQA0AA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4296
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe2⤵PID:4468
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe2⤵PID:1328
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe2⤵PID:2116
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe2⤵PID:1348
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe2⤵PID:3340
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe2⤵PID:4612
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe2⤵PID:1652
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe2⤵PID:3484
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe2⤵PID:1880
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe2⤵PID:1276
-