Analysis
-
max time kernel
153s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2022, 21:56
Static task
static1
Behavioral task
behavioral1
Sample
fa9054c2360af18e29931f7b262dec864c0685ab048e8e98e4d63387f58aa19d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
fa9054c2360af18e29931f7b262dec864c0685ab048e8e98e4d63387f58aa19d.exe
Resource
win10v2004-20220812-en
General
-
Target
fa9054c2360af18e29931f7b262dec864c0685ab048e8e98e4d63387f58aa19d.exe
-
Size
88KB
-
MD5
3bef287a53a23e2052219b7d73f4ef40
-
SHA1
48b62fec80a5301f091b8cc87a843d5f5443e39a
-
SHA256
fa9054c2360af18e29931f7b262dec864c0685ab048e8e98e4d63387f58aa19d
-
SHA512
8f6e857240ede5f43ef0fa5b0e18e4534b1bc4e0663c5e0b48a5ae31f61b7824ca1f92fe622f701c6404d8abf0402382f1a85385fb4a17a8f6d325d581b9e79b
-
SSDEEP
1536:xpFrupx9oS7mOTEffZxid/sSTUr0cLSyEmiXeaxWw:xjupxT7rdJTUr0cLSyEJXdWw
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation fa9054c2360af18e29931f7b262dec864c0685ab048e8e98e4d63387f58aa19d.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum fa9054c2360af18e29931f7b262dec864c0685ab048e8e98e4d63387f58aa19d.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 fa9054c2360af18e29931f7b262dec864c0685ab048e8e98e4d63387f58aa19d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2024 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2024 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5000 fa9054c2360af18e29931f7b262dec864c0685ab048e8e98e4d63387f58aa19d.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5000 wrote to memory of 2572 5000 fa9054c2360af18e29931f7b262dec864c0685ab048e8e98e4d63387f58aa19d.exe 85 PID 5000 wrote to memory of 2572 5000 fa9054c2360af18e29931f7b262dec864c0685ab048e8e98e4d63387f58aa19d.exe 85 PID 5000 wrote to memory of 2572 5000 fa9054c2360af18e29931f7b262dec864c0685ab048e8e98e4d63387f58aa19d.exe 85 PID 2572 wrote to memory of 2024 2572 cmd.exe 87 PID 2572 wrote to memory of 2024 2572 cmd.exe 87 PID 2572 wrote to memory of 2024 2572 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa9054c2360af18e29931f7b262dec864c0685ab048e8e98e4d63387f58aa19d.exe"C:\Users\Admin\AppData\Local\Temp\fa9054c2360af18e29931f7b262dec864c0685ab048e8e98e4d63387f58aa19d.exe"1⤵
- Checks computer location settings
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del fa9054c2360af18e29931f7b262dec864c2⤵
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2024
-
-