Analysis
-
max time kernel
149s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2022, 07:36
Static task
static1
Behavioral task
behavioral1
Sample
9e6165e658012710de9e616b56c58ee0c14f5c01f671be1197c5f00a19a438b2.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9e6165e658012710de9e616b56c58ee0c14f5c01f671be1197c5f00a19a438b2.exe
Resource
win10v2004-20220812-en
General
-
Target
9e6165e658012710de9e616b56c58ee0c14f5c01f671be1197c5f00a19a438b2.exe
-
Size
76KB
-
MD5
71bbc235a85ddb7e30575b294cf03780
-
SHA1
6b76ef68b19b4884fd1d1486cc4e1c688b764581
-
SHA256
9e6165e658012710de9e616b56c58ee0c14f5c01f671be1197c5f00a19a438b2
-
SHA512
c633fc0145c6be5618d94716b3075a952a28d9da8c6a1898d0d3774dce38094f63152688a92969b46e4224c601cbfe0b3cfe7b170abc47c65c36660e923182df
-
SSDEEP
768:ahaujakDIg1BPKpw8gpyf4pxGAgCNaKg3Bz4CHl/4EdKXy8BOBEw:atlR1DopCNaKgxUqZYBOBp
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 9e6165e658012710de9e616b56c58ee0c14f5c01f671be1197c5f00a19a438b2.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 9e6165e658012710de9e616b56c58ee0c14f5c01f671be1197c5f00a19a438b2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 9e6165e658012710de9e616b56c58ee0c14f5c01f671be1197c5f00a19a438b2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 4232 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4232 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4360 9e6165e658012710de9e616b56c58ee0c14f5c01f671be1197c5f00a19a438b2.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4360 wrote to memory of 704 4360 9e6165e658012710de9e616b56c58ee0c14f5c01f671be1197c5f00a19a438b2.exe 82 PID 4360 wrote to memory of 704 4360 9e6165e658012710de9e616b56c58ee0c14f5c01f671be1197c5f00a19a438b2.exe 82 PID 4360 wrote to memory of 704 4360 9e6165e658012710de9e616b56c58ee0c14f5c01f671be1197c5f00a19a438b2.exe 82 PID 704 wrote to memory of 4232 704 cmd.exe 84 PID 704 wrote to memory of 4232 704 cmd.exe 84 PID 704 wrote to memory of 4232 704 cmd.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\9e6165e658012710de9e616b56c58ee0c14f5c01f671be1197c5f00a19a438b2.exe"C:\Users\Admin\AppData\Local\Temp\9e6165e658012710de9e616b56c58ee0c14f5c01f671be1197c5f00a19a438b2.exe"1⤵
- Checks computer location settings
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 9e6165e658012710de9e616b56c58ee0c14f5c01f671be1197c5f00a19a438b2.exe2⤵
- Suspicious use of WriteProcessMemory
PID:704 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4232
-
-