Analysis
-
max time kernel
140s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
15-09-2022 10:22
Behavioral task
behavioral1
Sample
fba152136ccb3ab4af3ec88eebe02162e3159170f159343c59a40757a9599f9b.iso
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fba152136ccb3ab4af3ec88eebe02162e3159170f159343c59a40757a9599f9b.iso
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
Attachments.lnk
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
Attachments.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
disk.dll
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
disk.dll
Resource
win10v2004-20220812-en
General
-
Target
Attachments.lnk
-
Size
1KB
-
MD5
bc822d858adaf2632387e1683dec2c02
-
SHA1
603bbc383ad1aaf3be47db8686b584cf75055cc6
-
SHA256
870d9acb346f0d9699c09057b8d8f6782cd925873958974cfe47f6566d2da7cd
-
SHA512
adfa26f5517da1020398d037313f6d6e39a5f2cd3131a0f0cc13bc012886132d083bbc3873739fb9b376fa679a99cbe42a4498283c5afc3103ea613117c7029d
Malware Config
Signatures
-
Blocklisted process makes network request 4 IoCs
flow pid Process 5 4336 rundll32.exe 27 4336 rundll32.exe 36 4336 rundll32.exe 37 4336 rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1508 wrote to memory of 4336 1508 cmd.exe 82 PID 1508 wrote to memory of 4336 1508 cmd.exe 82
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Attachments.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" disk.dat,ProcessLoad2⤵
- Blocklisted process makes network request
PID:4336
-