Analysis
-
max time kernel
139s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2022 03:20
Static task
static1
Behavioral task
behavioral1
Sample
c2fbf962250656d69cb75d3f703d88b68aaeb0f99c4ab93dff4918cd643da717.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c2fbf962250656d69cb75d3f703d88b68aaeb0f99c4ab93dff4918cd643da717.exe
Resource
win10v2004-20220812-en
General
-
Target
c2fbf962250656d69cb75d3f703d88b68aaeb0f99c4ab93dff4918cd643da717.exe
-
Size
41KB
-
MD5
77956f3227014036992cdb81c1b40356
-
SHA1
2d148e5b8c738bd71450e7348b115f6f0c86688a
-
SHA256
c2fbf962250656d69cb75d3f703d88b68aaeb0f99c4ab93dff4918cd643da717
-
SHA512
3bad0cc51cd4f0dd6d2470845c72739c3a73d86d2d9ee386b85cd208caf00f8db9518b7c0212d7fac325075539caf397174d44a2670bee789557568afc937193
-
SSDEEP
768:QIBar1ZIZYnfI9opm6AIHIjaI7g9mVmUnRoNE/W5dRV8:pW1ZIZqI9opm6AIHIjzmU6Nzd
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2200 sxhost.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation sxhost.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation c2fbf962250656d69cb75d3f703d88b68aaeb0f99c4ab93dff4918cd643da717.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3064 wrote to memory of 2200 3064 c2fbf962250656d69cb75d3f703d88b68aaeb0f99c4ab93dff4918cd643da717.exe 82 PID 3064 wrote to memory of 2200 3064 c2fbf962250656d69cb75d3f703d88b68aaeb0f99c4ab93dff4918cd643da717.exe 82 PID 3064 wrote to memory of 2200 3064 c2fbf962250656d69cb75d3f703d88b68aaeb0f99c4ab93dff4918cd643da717.exe 82 PID 3064 wrote to memory of 4788 3064 c2fbf962250656d69cb75d3f703d88b68aaeb0f99c4ab93dff4918cd643da717.exe 83 PID 3064 wrote to memory of 4788 3064 c2fbf962250656d69cb75d3f703d88b68aaeb0f99c4ab93dff4918cd643da717.exe 83 PID 3064 wrote to memory of 4788 3064 c2fbf962250656d69cb75d3f703d88b68aaeb0f99c4ab93dff4918cd643da717.exe 83 PID 2200 wrote to memory of 4660 2200 sxhost.exe 85 PID 2200 wrote to memory of 4660 2200 sxhost.exe 85 PID 2200 wrote to memory of 4660 2200 sxhost.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\c2fbf962250656d69cb75d3f703d88b68aaeb0f99c4ab93dff4918cd643da717.exe"C:\Users\Admin\AppData\Local\Temp\c2fbf962250656d69cb75d3f703d88b68aaeb0f99c4ab93dff4918cd643da717.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\sxhost.exe"C:\Users\Admin\sxhost.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c del C:\Users\Admin\sxhost.exe >> NUL3⤵PID:4660
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\C2FBF9~1.EXE >> NUL2⤵PID:4788
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD577956f3227014036992cdb81c1b40356
SHA12d148e5b8c738bd71450e7348b115f6f0c86688a
SHA256c2fbf962250656d69cb75d3f703d88b68aaeb0f99c4ab93dff4918cd643da717
SHA5123bad0cc51cd4f0dd6d2470845c72739c3a73d86d2d9ee386b85cd208caf00f8db9518b7c0212d7fac325075539caf397174d44a2670bee789557568afc937193
-
Filesize
41KB
MD577956f3227014036992cdb81c1b40356
SHA12d148e5b8c738bd71450e7348b115f6f0c86688a
SHA256c2fbf962250656d69cb75d3f703d88b68aaeb0f99c4ab93dff4918cd643da717
SHA5123bad0cc51cd4f0dd6d2470845c72739c3a73d86d2d9ee386b85cd208caf00f8db9518b7c0212d7fac325075539caf397174d44a2670bee789557568afc937193