Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2022 10:32
Static task
static1
Behavioral task
behavioral1
Sample
559dd02c83534561cb37cfab2b498061720f9143ca30aa6b5b0d415c52f58fc3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
559dd02c83534561cb37cfab2b498061720f9143ca30aa6b5b0d415c52f58fc3.exe
Resource
win10v2004-20220812-en
General
-
Target
559dd02c83534561cb37cfab2b498061720f9143ca30aa6b5b0d415c52f58fc3.exe
-
Size
130KB
-
MD5
5993ad35ac7c878a70231b77957fedba
-
SHA1
2f09acd7fd36a207731c4415d02c864479afacc3
-
SHA256
559dd02c83534561cb37cfab2b498061720f9143ca30aa6b5b0d415c52f58fc3
-
SHA512
cb3a508e7d20f7632fa466f358ef43bad58afeb1d3ebf6f7b622ec67a0c86a79c55362663f943d0e6430c1360fb766054e61b43e60b925b4f47537a1aca6783b
-
SSDEEP
3072:kcjjuSrGn/x4+e7gyUvOvR0BZNnvRF0oHoGJW+kXfdPC7ho0rSzJ6V307D+:kcjjuSrGn/x4+e7PUvOvR0BZNnv30oHv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 559dd02c83534561cb37cfab2b498061720f9143ca30aa6b5b0d415c52f58fc3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2564 wrote to memory of 3088 2564 559dd02c83534561cb37cfab2b498061720f9143ca30aa6b5b0d415c52f58fc3.exe 82 PID 2564 wrote to memory of 3088 2564 559dd02c83534561cb37cfab2b498061720f9143ca30aa6b5b0d415c52f58fc3.exe 82 PID 2564 wrote to memory of 3088 2564 559dd02c83534561cb37cfab2b498061720f9143ca30aa6b5b0d415c52f58fc3.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\559dd02c83534561cb37cfab2b498061720f9143ca30aa6b5b0d415c52f58fc3.exe"C:\Users\Admin\AppData\Local\Temp\559dd02c83534561cb37cfab2b498061720f9143ca30aa6b5b0d415c52f58fc3.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Mzb..bat" > nul 2> nul2⤵PID:3088
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
274B
MD5942e881278d95c6be420f360bc3088c0
SHA1661ac52c123efe9d75057badfd516d0f665d64e7
SHA256a6c259abeea6490a0077a45823ab155b26fed0555127bd5fb4ca1318f61dfa6c
SHA5122e03718e3cdee5598ccc806dfc7a81eec98c5101a0c638c91ab9f31d442c224fecd3efde296a40c6ea7f13a1ed8a181ba7f32dcc937c665547003dd38a45db8f