Analysis
-
max time kernel
112s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2022 19:41
Static task
static1
Behavioral task
behavioral1
Sample
a3b23415e7aed3a8f289f0b94d7f056f0e12beb87a81573db9e639fe3d26a6cd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a3b23415e7aed3a8f289f0b94d7f056f0e12beb87a81573db9e639fe3d26a6cd.exe
Resource
win10v2004-20220901-en
General
-
Target
a3b23415e7aed3a8f289f0b94d7f056f0e12beb87a81573db9e639fe3d26a6cd.exe
-
Size
569KB
-
MD5
67ce6ec81564c49ceea44b1ccde4bdd0
-
SHA1
363dbaef9610e2a442acee0eeb4cf87ae148535d
-
SHA256
a3b23415e7aed3a8f289f0b94d7f056f0e12beb87a81573db9e639fe3d26a6cd
-
SHA512
6c4f302e31958e5ecebb88f2e14ef2f7a5e382cf5c0eb158a8b731311c445820304a8b7dd52fb59d9b5aed62832286ec0cfa794dac80b355dbaff0989d56f044
-
SSDEEP
12288:Gzy6rRxEOE+B7PgUr72MXtKed65Ot6ld3/DCeEt6/gMKlHw0QK7Oy:d6rTZE+ZPx/2TeOOtcdGt6pECK77
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4852 svchost.exe -
resource yara_rule behavioral2/files/0x0007000000022e04-133.dat upx behavioral2/files/0x0007000000022e04-134.dat upx behavioral2/memory/4852-135-0x0000000000400000-0x000000000056F000-memory.dmp upx behavioral2/memory/4852-136-0x0000000000400000-0x000000000056F000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation a3b23415e7aed3a8f289f0b94d7f056f0e12beb87a81573db9e639fe3d26a6cd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost.exe = "C:\\Users\\Admin\\svchost.exe" svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2228 wrote to memory of 4852 2228 a3b23415e7aed3a8f289f0b94d7f056f0e12beb87a81573db9e639fe3d26a6cd.exe 83 PID 2228 wrote to memory of 4852 2228 a3b23415e7aed3a8f289f0b94d7f056f0e12beb87a81573db9e639fe3d26a6cd.exe 83 PID 2228 wrote to memory of 4852 2228 a3b23415e7aed3a8f289f0b94d7f056f0e12beb87a81573db9e639fe3d26a6cd.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3b23415e7aed3a8f289f0b94d7f056f0e12beb87a81573db9e639fe3d26a6cd.exe"C:\Users\Admin\AppData\Local\Temp\a3b23415e7aed3a8f289f0b94d7f056f0e12beb87a81573db9e639fe3d26a6cd.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4852
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
476KB
MD5ebc61557a029545c554f6eaa215199c7
SHA199a2450399283a3bbc9341ee20bfee7e2e4e89c7
SHA256e10096624d319af38f3d9b211b90da0d4f7fcd075b57b8a30087bc1919598198
SHA512a17618f1c2d0499b07d790b35e01848182c5d6338f13ec7b8f637dfd69594b2bbde83c430b8d1e4ec5a3bc3c2e06394c11b85cedd0e7e5f32dc0456214c97521
-
Filesize
476KB
MD5ebc61557a029545c554f6eaa215199c7
SHA199a2450399283a3bbc9341ee20bfee7e2e4e89c7
SHA256e10096624d319af38f3d9b211b90da0d4f7fcd075b57b8a30087bc1919598198
SHA512a17618f1c2d0499b07d790b35e01848182c5d6338f13ec7b8f637dfd69594b2bbde83c430b8d1e4ec5a3bc3c2e06394c11b85cedd0e7e5f32dc0456214c97521