Analysis
-
max time kernel
168s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2022 03:20
Static task
static1
Behavioral task
behavioral1
Sample
4cd45d9bf71422067e3769b993c8e047faa77c57202f1b9913ce8e9424078f72.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4cd45d9bf71422067e3769b993c8e047faa77c57202f1b9913ce8e9424078f72.exe
Resource
win10v2004-20220812-en
General
-
Target
4cd45d9bf71422067e3769b993c8e047faa77c57202f1b9913ce8e9424078f72.exe
-
Size
41KB
-
MD5
71f5acf3d04df2bb0311ab2a46e3547a
-
SHA1
aa8f6a8925912b439ad514cd4c1c16966ba9405d
-
SHA256
4cd45d9bf71422067e3769b993c8e047faa77c57202f1b9913ce8e9424078f72
-
SHA512
c8ba33d3b1b38cfbf3aac1eacdec4f92fb612fdd4f1358bcc8e58553666ddea06a8323d6048407c4506d547a8a3ae208a3f1e9477b770c683bfd4b551534bb3e
-
SSDEEP
768:QIBar1ZIZYnfI9opm6AIHIjaI7g9mVmUnNoNE/W5dRV8:pW1ZIZqI9opm6AIHIjzmUmNzd
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2840 sxhost.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 4cd45d9bf71422067e3769b993c8e047faa77c57202f1b9913ce8e9424078f72.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation sxhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1076 wrote to memory of 2840 1076 4cd45d9bf71422067e3769b993c8e047faa77c57202f1b9913ce8e9424078f72.exe 81 PID 1076 wrote to memory of 2840 1076 4cd45d9bf71422067e3769b993c8e047faa77c57202f1b9913ce8e9424078f72.exe 81 PID 1076 wrote to memory of 2840 1076 4cd45d9bf71422067e3769b993c8e047faa77c57202f1b9913ce8e9424078f72.exe 81 PID 1076 wrote to memory of 4916 1076 4cd45d9bf71422067e3769b993c8e047faa77c57202f1b9913ce8e9424078f72.exe 82 PID 1076 wrote to memory of 4916 1076 4cd45d9bf71422067e3769b993c8e047faa77c57202f1b9913ce8e9424078f72.exe 82 PID 1076 wrote to memory of 4916 1076 4cd45d9bf71422067e3769b993c8e047faa77c57202f1b9913ce8e9424078f72.exe 82 PID 2840 wrote to memory of 4820 2840 sxhost.exe 84 PID 2840 wrote to memory of 4820 2840 sxhost.exe 84 PID 2840 wrote to memory of 4820 2840 sxhost.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\4cd45d9bf71422067e3769b993c8e047faa77c57202f1b9913ce8e9424078f72.exe"C:\Users\Admin\AppData\Local\Temp\4cd45d9bf71422067e3769b993c8e047faa77c57202f1b9913ce8e9424078f72.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Users\Admin\sxhost.exe"C:\Users\Admin\sxhost.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c del C:\Users\Admin\sxhost.exe >> NUL3⤵PID:4820
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\4CD45D~1.EXE >> NUL2⤵PID:4916
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD571f5acf3d04df2bb0311ab2a46e3547a
SHA1aa8f6a8925912b439ad514cd4c1c16966ba9405d
SHA2564cd45d9bf71422067e3769b993c8e047faa77c57202f1b9913ce8e9424078f72
SHA512c8ba33d3b1b38cfbf3aac1eacdec4f92fb612fdd4f1358bcc8e58553666ddea06a8323d6048407c4506d547a8a3ae208a3f1e9477b770c683bfd4b551534bb3e
-
Filesize
41KB
MD571f5acf3d04df2bb0311ab2a46e3547a
SHA1aa8f6a8925912b439ad514cd4c1c16966ba9405d
SHA2564cd45d9bf71422067e3769b993c8e047faa77c57202f1b9913ce8e9424078f72
SHA512c8ba33d3b1b38cfbf3aac1eacdec4f92fb612fdd4f1358bcc8e58553666ddea06a8323d6048407c4506d547a8a3ae208a3f1e9477b770c683bfd4b551534bb3e