Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
06-08-2022 07:42
Behavioral task
behavioral1
Sample
tmpscsa0hng.exe
Resource
win7-20220718-en
windows7-x64
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
tmpscsa0hng.exe
Resource
win10v2004-20220721-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
tmpscsa0hng.exe
-
Size
392KB
-
MD5
d90d0f4d6dad402b5d025987030cc87c
-
SHA1
fad66bdf5c5dc2c050cbc574832c6995dba086a0
-
SHA256
1ffd6559d21470c40dcf9236da51e5823d7ad58c93502279871c3fe7718c901c
-
SHA512
c2faeacfd588585633630ad710f443a72c7617c2d5e37dbfe43570e6ac5904e4b81eb682356a48a93bb794ef5e9d8ad0d673966d57798079b4de62ea61241024
Score
7/10
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
tmpscsa0hng.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000\Control Panel\International\Geo\Nation tmpscsa0hng.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepid process 1832 powershell.exe 1832 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 1832 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
tmpscsa0hng.exedescription pid process target process PID 4324 wrote to memory of 1832 4324 tmpscsa0hng.exe powershell.exe PID 4324 wrote to memory of 1832 4324 tmpscsa0hng.exe powershell.exe PID 4324 wrote to memory of 1832 4324 tmpscsa0hng.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmpscsa0hng.exe"C:\Users\Admin\AppData\Local\Temp\tmpscsa0hng.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" copy 'C:\Users\Admin\AppData\Local\Temp\tmpscsa0hng.exe' 'C:\ProgramData\SystemData\igfxCUIService.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1832
-