Analysis
-
max time kernel
90s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
08/10/2022, 11:20
Static task
static1
Behavioral task
behavioral1
Sample
72baede34a1af17e841c34552759de3f6c4077ae9b4f1cfa470a7fdf1024d128.exe
Resource
win10v2004-20220901-en
General
-
Target
72baede34a1af17e841c34552759de3f6c4077ae9b4f1cfa470a7fdf1024d128.exe
-
Size
1.7MB
-
MD5
f924c1e5eb0855a6cea6db69d3c84988
-
SHA1
479a24a61f651c8dd3ecb4f8e17134c61d3b5a27
-
SHA256
72baede34a1af17e841c34552759de3f6c4077ae9b4f1cfa470a7fdf1024d128
-
SHA512
7a52d53d88dc5093b6dfb543203abfbaacb31b8f9be21970ed583a492a2d8f85a57f2ee3b74f858b0e3c2d30419a9cf22437805cc946ceefb357085e50d4c346
-
SSDEEP
49152:VJ4oFglILTishyTtU5ky6PMnYM/uNUesG:VJ4eLTHhEt9zPMYJL
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 72baede34a1af17e841c34552759de3f6c4077ae9b4f1cfa470a7fdf1024d128.exe -
Loads dropped DLL 2 IoCs
pid Process 1284 rundll32.exe 2500 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3540 wrote to memory of 4912 3540 72baede34a1af17e841c34552759de3f6c4077ae9b4f1cfa470a7fdf1024d128.exe 82 PID 3540 wrote to memory of 4912 3540 72baede34a1af17e841c34552759de3f6c4077ae9b4f1cfa470a7fdf1024d128.exe 82 PID 3540 wrote to memory of 4912 3540 72baede34a1af17e841c34552759de3f6c4077ae9b4f1cfa470a7fdf1024d128.exe 82 PID 4912 wrote to memory of 1284 4912 control.exe 83 PID 4912 wrote to memory of 1284 4912 control.exe 83 PID 4912 wrote to memory of 1284 4912 control.exe 83 PID 1284 wrote to memory of 3928 1284 rundll32.exe 87 PID 1284 wrote to memory of 3928 1284 rundll32.exe 87 PID 3928 wrote to memory of 2500 3928 RunDll32.exe 88 PID 3928 wrote to memory of 2500 3928 RunDll32.exe 88 PID 3928 wrote to memory of 2500 3928 RunDll32.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\72baede34a1af17e841c34552759de3f6c4077ae9b4f1cfa470a7fdf1024d128.exe"C:\Users\Admin\AppData\Local\Temp\72baede34a1af17e841c34552759de3f6c4077ae9b4f1cfa470a7fdf1024d128.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" .\9HOZ9mM6.TC2⤵
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL .\9HOZ9mM6.TC3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL .\9HOZ9mM6.TC4⤵
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 .\9HOZ9mM6.TC5⤵
- Loads dropped DLL
PID:2500
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5e4a87d006fdfae4b57eb69a435cd04f9
SHA1403e6cb85af297e4724e2cdb841a7d978dbbe005
SHA2562996d29531ace2f4f07f8984173d1c8d0c756abe872588585d651778e0d5c4ff
SHA512373e85b15b53fd6517b78a1757c6416300bace7f972c09f5a015c99cad15091e7815291fbd306176783e1c3b46af3fe57d5dfc8f40227faa547469199fb2309b
-
Filesize
1.6MB
MD5e4a87d006fdfae4b57eb69a435cd04f9
SHA1403e6cb85af297e4724e2cdb841a7d978dbbe005
SHA2562996d29531ace2f4f07f8984173d1c8d0c756abe872588585d651778e0d5c4ff
SHA512373e85b15b53fd6517b78a1757c6416300bace7f972c09f5a015c99cad15091e7815291fbd306176783e1c3b46af3fe57d5dfc8f40227faa547469199fb2309b
-
Filesize
1.6MB
MD5e4a87d006fdfae4b57eb69a435cd04f9
SHA1403e6cb85af297e4724e2cdb841a7d978dbbe005
SHA2562996d29531ace2f4f07f8984173d1c8d0c756abe872588585d651778e0d5c4ff
SHA512373e85b15b53fd6517b78a1757c6416300bace7f972c09f5a015c99cad15091e7815291fbd306176783e1c3b46af3fe57d5dfc8f40227faa547469199fb2309b