Overview
overview
10Static
static
7L22_File.zip
windows7-x64
1L22_File.zip
windows10-2004-x64
1Install.exe
windows7-x64
10Install.exe
windows10-2004-x64
10fonts/Arggotsc.ttf
windows7-x64
3fonts/Arggotsc.ttf
windows10-2004-x64
7fonts/Army Thin.ttf
windows7-x64
3fonts/Army Thin.ttf
windows10-2004-x64
7fonts/BELLB.ttf
windows7-x64
3fonts/BELLB.ttf
windows10-2004-x64
7fonts/BOD_BI.ttf
windows7-x64
3fonts/BOD_BI.ttf
windows10-2004-x64
7fonts/BOD_I.ttf
windows7-x64
3fonts/BOD_I.ttf
windows10-2004-x64
7fonts/CALISTBI.ttf
windows7-x64
3fonts/CALISTBI.ttf
windows10-2004-x64
7fonts/Caba...ar.ttf
windows7-x64
3fonts/Caba...ar.ttf
windows10-2004-x64
7fonts/black.ttf
windows7-x64
3fonts/black.ttf
windows10-2004-x64
7fonts/browa.ttf
windows7-x64
3fonts/browa.ttf
windows10-2004-x64
7fonts/browauz.ttf
windows7-x64
3fonts/browauz.ttf
windows10-2004-x64
7fonts/deat...eg.ttf
windows7-x64
3fonts/deat...eg.ttf
windows10-2004-x64
7langs/Belarusian.ini
windows7-x64
1langs/Belarusian.ini
windows10-2004-x64
1langs/Croatian.ini
windows7-x64
1langs/Croatian.ini
windows10-2004-x64
1langs/Danish.ini
windows7-x64
1langs/Danish.ini
windows10-2004-x64
1Analysis
-
max time kernel
119s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05-09-2022 11:04
Behavioral task
behavioral1
Sample
L22_File.zip
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
L22_File.zip
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
Install.exe
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
Install.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
fonts/Arggotsc.ttf
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
fonts/Arggotsc.ttf
Resource
win10v2004-20220901-en
Behavioral task
behavioral7
Sample
fonts/Army Thin.ttf
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
fonts/Army Thin.ttf
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
fonts/BELLB.ttf
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
fonts/BELLB.ttf
Resource
win10v2004-20220901-en
Behavioral task
behavioral11
Sample
fonts/BOD_BI.ttf
Resource
win7-20220812-en
Behavioral task
behavioral12
Sample
fonts/BOD_BI.ttf
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
fonts/BOD_I.ttf
Resource
win7-20220812-en
Behavioral task
behavioral14
Sample
fonts/BOD_I.ttf
Resource
win10v2004-20220901-en
Behavioral task
behavioral15
Sample
fonts/CALISTBI.ttf
Resource
win7-20220812-en
Behavioral task
behavioral16
Sample
fonts/CALISTBI.ttf
Resource
win10v2004-20220812-en
Behavioral task
behavioral17
Sample
fonts/Cabana-Regular.ttf
Resource
win7-20220901-en
Behavioral task
behavioral18
Sample
fonts/Cabana-Regular.ttf
Resource
win10v2004-20220812-en
Behavioral task
behavioral19
Sample
fonts/black.ttf
Resource
win7-20220812-en
Behavioral task
behavioral20
Sample
fonts/black.ttf
Resource
win10v2004-20220812-en
Behavioral task
behavioral21
Sample
fonts/browa.ttf
Resource
win7-20220901-en
Behavioral task
behavioral22
Sample
fonts/browa.ttf
Resource
win10v2004-20220812-en
Behavioral task
behavioral23
Sample
fonts/browauz.ttf
Resource
win7-20220812-en
Behavioral task
behavioral24
Sample
fonts/browauz.ttf
Resource
win10v2004-20220812-en
Behavioral task
behavioral25
Sample
fonts/deathrattlebb_reg.ttf
Resource
win7-20220901-en
Behavioral task
behavioral26
Sample
fonts/deathrattlebb_reg.ttf
Resource
win10v2004-20220812-en
Behavioral task
behavioral27
Sample
langs/Belarusian.ini
Resource
win7-20220812-en
Behavioral task
behavioral28
Sample
langs/Belarusian.ini
Resource
win10v2004-20220901-en
Behavioral task
behavioral29
Sample
langs/Croatian.ini
Resource
win7-20220812-en
Behavioral task
behavioral30
Sample
langs/Croatian.ini
Resource
win10v2004-20220812-en
Behavioral task
behavioral31
Sample
langs/Danish.ini
Resource
win7-20220812-en
Behavioral task
behavioral32
Sample
langs/Danish.ini
Resource
win10v2004-20220812-en
General
-
Target
fonts/Army Thin.ttf
-
Size
88KB
-
MD5
9c0996fba26512ad5120010e385e208d
-
SHA1
37a752173b71a3a3e27a7c6ac825b69db622fba4
-
SHA256
b00dd75d282e11a2067bb8341c9c2b4a1c2ae5db3029e584d92a4549fb784d48
-
SHA512
c9fca09824a7192afb128c1b9cfcb1bf0c7e39ad1a269ddb4b271a65f7cb0b4d0d8a155f5485e32dc8c036fee9bfe29f11e97399632132c47514adf893574ed7
-
SSDEEP
1536:R2o690qRKBuTRKBoxIddKOyjgUq867OrUsw+gpG5I/:j690qYBuTYBoxIddKOyjgUI7OrU4gpGC
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cmd.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
cmd.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings cmd.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
cmd.exedescription pid process target process PID 4972 wrote to memory of 4712 4972 cmd.exe fontview.exe PID 4972 wrote to memory of 4712 4972 cmd.exe fontview.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fonts\Army Thin.ttf"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\fontview.exe"C:\Windows\System32\fontview.exe" C:\Users\Admin\AppData\Local\Temp\fonts\Army Thin.ttf2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4712-132-0x0000000000000000-mapping.dmp