Analysis
-
max time kernel
143s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2022 21:14
Static task
static1
Behavioral task
behavioral1
Sample
8e50c8687dc7d9ed57e0c775e61ef0a195a3b0e27318c42f697ce21cb43250e4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8e50c8687dc7d9ed57e0c775e61ef0a195a3b0e27318c42f697ce21cb43250e4.exe
Resource
win10v2004-20220812-en
General
-
Target
8e50c8687dc7d9ed57e0c775e61ef0a195a3b0e27318c42f697ce21cb43250e4.exe
-
Size
265KB
-
MD5
412b36ba520dc7c15175aabd6fc82410
-
SHA1
c34d38b123efd417a74d3a8f069c24d266ae1e8c
-
SHA256
8e50c8687dc7d9ed57e0c775e61ef0a195a3b0e27318c42f697ce21cb43250e4
-
SHA512
06899875f934c21d945ab98727446add769ff46e07359561690f2ae02a194f6b7ae5c09dddcd88c176a5d60b2083b27ec8be0bb7ccc1cede57e6560fc1c3cd2c
-
SSDEEP
3072:a9eSguXvy6iIhA+C9kUu9Bc+mSqdBQSvs1C8/ehoraNUXv/uLWC7:YXvy6iIhAY3c/Nvs1C8/ehoraNUXeqe
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 8e50c8687dc7d9ed57e0c775e61ef0a195a3b0e27318c42f697ce21cb43250e4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 3 IoCs
pid Process 2168 PING.EXE 2272 PING.EXE 4008 PING.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4936 wrote to memory of 4284 4936 8e50c8687dc7d9ed57e0c775e61ef0a195a3b0e27318c42f697ce21cb43250e4.exe 84 PID 4936 wrote to memory of 4284 4936 8e50c8687dc7d9ed57e0c775e61ef0a195a3b0e27318c42f697ce21cb43250e4.exe 84 PID 4936 wrote to memory of 4284 4936 8e50c8687dc7d9ed57e0c775e61ef0a195a3b0e27318c42f697ce21cb43250e4.exe 84 PID 4284 wrote to memory of 2272 4284 cmd.exe 86 PID 4284 wrote to memory of 2272 4284 cmd.exe 86 PID 4284 wrote to memory of 2272 4284 cmd.exe 86 PID 4284 wrote to memory of 4008 4284 cmd.exe 87 PID 4284 wrote to memory of 4008 4284 cmd.exe 87 PID 4284 wrote to memory of 4008 4284 cmd.exe 87 PID 4284 wrote to memory of 2168 4284 cmd.exe 88 PID 4284 wrote to memory of 2168 4284 cmd.exe 88 PID 4284 wrote to memory of 2168 4284 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e50c8687dc7d9ed57e0c775e61ef0a195a3b0e27318c42f697ce21cb43250e4.exe"C:\Users\Admin\AppData\Local\Temp\8e50c8687dc7d9ed57e0c775e61ef0a195a3b0e27318c42f697ce21cb43250e4.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\32006.bat" "C:\Users\Admin\AppData\Local\Temp\8e50c8687dc7d9ed57e0c775e61ef0a195a3b0e27318c42f697ce21cb43250e4.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 10003⤵
- Runs ping.exe
PID:2272
-
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 10003⤵
- Runs ping.exe
PID:4008
-
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 10003⤵
- Runs ping.exe
PID:2168
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
205B
MD5af942e21a17f04903c52cb28a9b89542
SHA1ebcfe47bad384564346db4141d26e3e68f9f984f
SHA256c62a90b84dac61f74122f6eaa01665155a18b28a68b799a963f8a877194f922d
SHA512790decec1485e8fc42c3ee09a3e871ee95fdf2bf2e5f15556de0a5b5db2106114d79206acf2dcf3e7c0dbe9df7b1298e0b3f7247a34d9d3bd9f296cc9b61211a