Analysis
-
max time kernel
156s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2022, 02:44
Static task
static1
Behavioral task
behavioral1
Sample
a7c5d4dab8882f979c652621f15c6d6c89aefca9ad64a073a36783d85f4c874e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a7c5d4dab8882f979c652621f15c6d6c89aefca9ad64a073a36783d85f4c874e.exe
Resource
win10v2004-20220812-en
General
-
Target
a7c5d4dab8882f979c652621f15c6d6c89aefca9ad64a073a36783d85f4c874e.exe
-
Size
77KB
-
MD5
6709c6cb0430191a25904d5a9ecd0700
-
SHA1
f469a487d374e9cdbb4ed1d09bf0408e51b7950c
-
SHA256
a7c5d4dab8882f979c652621f15c6d6c89aefca9ad64a073a36783d85f4c874e
-
SHA512
b724cfe862890b58e28ef1f1888ad7c0265d91b05288ea11e5b8f04fc174f8f427a91fada38fb99ad91a1aa1f784322d35892cb486903dc91518353a97e8266e
-
SSDEEP
1536:GmAIW39QfiyfOAAlzzZ717afH9DgwPQP:GRz39aoxRe1DPQ
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a7c5d4dab8882f979c652621f15c6d6c89aefca9ad64a073a36783d85f4c874e.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum a7c5d4dab8882f979c652621f15c6d6c89aefca9ad64a073a36783d85f4c874e.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 a7c5d4dab8882f979c652621f15c6d6c89aefca9ad64a073a36783d85f4c874e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 4000 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4000 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1316 a7c5d4dab8882f979c652621f15c6d6c89aefca9ad64a073a36783d85f4c874e.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1316 wrote to memory of 4668 1316 a7c5d4dab8882f979c652621f15c6d6c89aefca9ad64a073a36783d85f4c874e.exe 81 PID 1316 wrote to memory of 4668 1316 a7c5d4dab8882f979c652621f15c6d6c89aefca9ad64a073a36783d85f4c874e.exe 81 PID 1316 wrote to memory of 4668 1316 a7c5d4dab8882f979c652621f15c6d6c89aefca9ad64a073a36783d85f4c874e.exe 81 PID 4668 wrote to memory of 4000 4668 cmd.exe 83 PID 4668 wrote to memory of 4000 4668 cmd.exe 83 PID 4668 wrote to memory of 4000 4668 cmd.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\a7c5d4dab8882f979c652621f15c6d6c89aefca9ad64a073a36783d85f4c874e.exe"C:\Users\Admin\AppData\Local\Temp\a7c5d4dab8882f979c652621f15c6d6c89aefca9ad64a073a36783d85f4c874e.exe"1⤵
- Checks computer location settings
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del a7c5d4dab8882f979c652621f15c6d6c89aefca9ad64a073a36783d85f4c874e.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4000
-
-