Analysis
-
max time kernel
92s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2022, 17:28
Static task
static1
Behavioral task
behavioral1
Sample
b14a9c2da96afff8fff645922e6bf4f1ee60e7eefd4b59985d83785f83572203.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b14a9c2da96afff8fff645922e6bf4f1ee60e7eefd4b59985d83785f83572203.exe
Resource
win10v2004-20220812-en
General
-
Target
b14a9c2da96afff8fff645922e6bf4f1ee60e7eefd4b59985d83785f83572203.exe
-
Size
100KB
-
MD5
1538ed64c62590c5ea5c18fb5e6d9e5b
-
SHA1
c1135b587775f714cca7eb928bab9440dccb14d5
-
SHA256
b14a9c2da96afff8fff645922e6bf4f1ee60e7eefd4b59985d83785f83572203
-
SHA512
6dd8e320ee23ee9fdea830ca5cc606895b12b2fb781de4c39fd9a91b56bb750e5fb800be11b9138f5edd5dd5f9877989c10abbb94b1cd9d58262263f5365d38f
-
SSDEEP
1536:fiDhCZHs7rVRZa+bK74ZzHIiG8GH0KRr9MUL29ASKp/IBqm4jrD2nkfWLLRX2:fqCZ8rVeaIiG1U2r97a96OWfDAkoX2
Malware Config
Extracted
C:\Users\Admin\Desktop\readme_avira9.txt
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation b14a9c2da96afff8fff645922e6bf4f1ee60e7eefd4b59985d83785f83572203.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 2 IoCs
pid Process 3624 taskkill.exe 1484 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings b14a9c2da96afff8fff645922e6bf4f1ee60e7eefd4b59985d83785f83572203.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 3708 NOTEPAD.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1484 taskkill.exe Token: SeDebugPrivilege 3624 taskkill.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4248 b14a9c2da96afff8fff645922e6bf4f1ee60e7eefd4b59985d83785f83572203.exe 4248 b14a9c2da96afff8fff645922e6bf4f1ee60e7eefd4b59985d83785f83572203.exe 4248 b14a9c2da96afff8fff645922e6bf4f1ee60e7eefd4b59985d83785f83572203.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 4248 b14a9c2da96afff8fff645922e6bf4f1ee60e7eefd4b59985d83785f83572203.exe 4248 b14a9c2da96afff8fff645922e6bf4f1ee60e7eefd4b59985d83785f83572203.exe 4248 b14a9c2da96afff8fff645922e6bf4f1ee60e7eefd4b59985d83785f83572203.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4248 wrote to memory of 5036 4248 b14a9c2da96afff8fff645922e6bf4f1ee60e7eefd4b59985d83785f83572203.exe 85 PID 4248 wrote to memory of 5036 4248 b14a9c2da96afff8fff645922e6bf4f1ee60e7eefd4b59985d83785f83572203.exe 85 PID 4248 wrote to memory of 1924 4248 b14a9c2da96afff8fff645922e6bf4f1ee60e7eefd4b59985d83785f83572203.exe 87 PID 4248 wrote to memory of 1924 4248 b14a9c2da96afff8fff645922e6bf4f1ee60e7eefd4b59985d83785f83572203.exe 87 PID 5036 wrote to memory of 3624 5036 cmd.exe 89 PID 5036 wrote to memory of 3624 5036 cmd.exe 89 PID 1924 wrote to memory of 1484 1924 cmd.exe 90 PID 1924 wrote to memory of 1484 1924 cmd.exe 90 PID 4248 wrote to memory of 3708 4248 b14a9c2da96afff8fff645922e6bf4f1ee60e7eefd4b59985d83785f83572203.exe 94 PID 4248 wrote to memory of 3708 4248 b14a9c2da96afff8fff645922e6bf4f1ee60e7eefd4b59985d83785f83572203.exe 94 PID 4248 wrote to memory of 4312 4248 b14a9c2da96afff8fff645922e6bf4f1ee60e7eefd4b59985d83785f83572203.exe 95 PID 4248 wrote to memory of 4312 4248 b14a9c2da96afff8fff645922e6bf4f1ee60e7eefd4b59985d83785f83572203.exe 95 PID 4312 wrote to memory of 3024 4312 cmd.exe 97 PID 4312 wrote to memory of 3024 4312 cmd.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\b14a9c2da96afff8fff645922e6bf4f1ee60e7eefd4b59985d83785f83572203.exe"C:\Users\Admin\AppData\Local\Temp\b14a9c2da96afff8fff645922e6bf4f1ee60e7eefd4b59985d83785f83572203.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C taskkill /f /im DefenderDaemon.exe2⤵
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Windows\system32\taskkill.exetaskkill /f /im DefenderDaemon.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3624
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C taskkill /f /im TrueImageMonitor.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\system32\taskkill.exetaskkill /f /im TrueImageMonitor.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1484
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme_avira9.txt2⤵
- Opens file in notepad (likely ransom note)
PID:3708
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del C:\Users\Admin\AppData\Local\Temp\b14a9c2da96afff8fff645922e6bf4f1ee60e7eefd4b59985d83785f83572203.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 33⤵PID:3024
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55df91422e5a8b8e992e59546c9143a35
SHA1a07d73f46a6abae32da563eca342f74c905a2055
SHA2567eee2776f6571dcc063045dfd2f13c8efff39f831080c2ee72237f6acd7a5bbf
SHA512f9663b4c601ce494df8944322c80042c103a622d4fd4e9b16ce00995a9fa5aa28ff5350847bc92483de96a52c6049849c02f4866dde4ae5f815e489495161ebc