Analysis
-
max time kernel
112s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2022, 12:34
Static task
static1
Behavioral task
behavioral1
Sample
DATA SHEET.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
DATA SHEET.exe
Resource
win10v2004-20220812-en
General
-
Target
DATA SHEET.exe
-
Size
1.2MB
-
MD5
107d61badb140d62596ac7025e9bd3f5
-
SHA1
81bddaae4cf56240ed367141bc0da6e4031ba823
-
SHA256
64c61226adf3b067bc876db3a40f516e3f66f9de821525777921963463ff6cdb
-
SHA512
b359b0eb1f6268d2d56b35f5abe056861fea04c6db4f01d4ccc4a6459a2716cf898e30cb031df40c77ba43ee1125a29b51fe2d865c7444e1b324bc8434867b8d
-
SSDEEP
24576:CciX1l1JpZGkOJJP126euxMLjVoFt+Y/ZSHbBmK5oDx:Cr1JH74bfliE+Y0H1ODx
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation DATA SHEET.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 792 powershell.exe 792 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 792 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2384 wrote to memory of 792 2384 DATA SHEET.exe 89 PID 2384 wrote to memory of 792 2384 DATA SHEET.exe 89 PID 2384 wrote to memory of 792 2384 DATA SHEET.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\DATA SHEET.exe"C:\Users\Admin\AppData\Local\Temp\DATA SHEET.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\lgVjbIGs.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:792
-