Analysis
-
max time kernel
87s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2022 08:56
Static task
static1
Behavioral task
behavioral1
Sample
48a1999709808a6dd3d47cf0aae71473a490788051ce7300de79a0994f344ae4.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
48a1999709808a6dd3d47cf0aae71473a490788051ce7300de79a0994f344ae4.exe
Resource
win10v2004-20220901-en
General
-
Target
48a1999709808a6dd3d47cf0aae71473a490788051ce7300de79a0994f344ae4.exe
-
Size
64KB
-
MD5
a255bc638ae574435d28ca5739e2a759
-
SHA1
c386ff981a870a5464e81b1f62c4cd18816ba822
-
SHA256
48a1999709808a6dd3d47cf0aae71473a490788051ce7300de79a0994f344ae4
-
SHA512
111cc4ccf41139501d914b38ce51581e68c9d99b957401277aba975aa975ef96e23d00238a26dc2b3797690a9ceba24cc58664eba80f0dbc542305e6f5ddd0bd
-
SSDEEP
1536:xET64WKch3dQzOwtwSI3yHBUJu5OXIvzpjIp/3:xq64Wx3dmqSSyHBknGzpjA/3
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 48a1999709808a6dd3d47cf0aae71473a490788051ce7300de79a0994f344ae4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4684 wrote to memory of 220 4684 48a1999709808a6dd3d47cf0aae71473a490788051ce7300de79a0994f344ae4.exe 85 PID 4684 wrote to memory of 220 4684 48a1999709808a6dd3d47cf0aae71473a490788051ce7300de79a0994f344ae4.exe 85 PID 4684 wrote to memory of 220 4684 48a1999709808a6dd3d47cf0aae71473a490788051ce7300de79a0994f344ae4.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\48a1999709808a6dd3d47cf0aae71473a490788051ce7300de79a0994f344ae4.exe"C:\Users\Admin\AppData\Local\Temp\48a1999709808a6dd3d47cf0aae71473a490788051ce7300de79a0994f344ae4.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Omz..bat" > nul 2> nul2⤵PID:220
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
274B
MD52312ddbe1fb88406271323323846ee05
SHA1e9401330a8c317de6f32e9aa6ae9ad09a3ba172d
SHA256b78a0ab52c8b77bef9ac0b931d6aae9dbb1cbf640c740eacb42eb99623f1bcf7
SHA512ab874ca00c8acfd1408927c3f0ad399ce9b41b4c0756c933f630ef0db391db6e75e0fb3f020a518bacf8ae991fda3c01a6232e7bb5acb18e0372d495a1cdc855