Analysis
-
max time kernel
109s -
max time network
178s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2022 01:44
Static task
static1
Behavioral task
behavioral1
Sample
a863503b3ade528eb3985046b4b9b324528eea8bed9a22569c0ba3b5189e0dd6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a863503b3ade528eb3985046b4b9b324528eea8bed9a22569c0ba3b5189e0dd6.exe
Resource
win10v2004-20220812-en
General
-
Target
a863503b3ade528eb3985046b4b9b324528eea8bed9a22569c0ba3b5189e0dd6.exe
-
Size
356KB
-
MD5
7bf7a3959ad1b024a2b22ccd5d4387a0
-
SHA1
34a0476e3339707a75c4b852c535a3177ad4da51
-
SHA256
a863503b3ade528eb3985046b4b9b324528eea8bed9a22569c0ba3b5189e0dd6
-
SHA512
b254a0cdead57e7a28784ce402b4424f19a33c5ffe457d67ba35d174795f670257d124a9d0133d22107f1e287bc6635f8944bfdd5407b7477e436a9d68d7cf47
-
SSDEEP
6144:VTfq8aL+jyORFsyRw5nVgOrkTxPcv/BnAtTHIw2hPVd+t3kfWeIDvxH5wCK/VVRA:Vi83ayaHkTOHETHz2fm8RIjxZU/VVRXw
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
1.exe1.exepid process 1704 1.exe 260 1.exe -
Processes:
resource yara_rule behavioral2/memory/260-142-0x0000000000400000-0x0000000000500000-memory.dmp upx behavioral2/memory/260-144-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/260-146-0x0000000000400000-0x000000000045C000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
a863503b3ade528eb3985046b4b9b324528eea8bed9a22569c0ba3b5189e0dd6.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation a863503b3ade528eb3985046b4b9b324528eea8bed9a22569c0ba3b5189e0dd6.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
1.exedescription pid process target process PID 1704 set thread context of 260 1704 1.exe 1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4560 260 WerFault.exe 1.exe -
NTFS ADS 1 IoCs
Processes:
a863503b3ade528eb3985046b4b9b324528eea8bed9a22569c0ba3b5189e0dd6.exedescription ioc process File opened for modification C:\Extracted\.L:x”QbŸ*V Ÿã5\G´;CK(P5*M{'ŠÝŰϪt¦®£ H50cxl+ºå©Fb=½•8—[5÷|>Y±úØðŸ+Ì"Ζ„LÕþt¿K}ìÏÎl2‘ÙŽÈ~ß7ÐKtÆvàƒžÁò÷Ú;p´²ÁÙ=²ëc÷³µ‰ªµ–1!„* 0Mjˆ8ÁÉø{<Šd†ý>\¸YªŽI6…£ÙâdÇJf¹{°ÁøÐ㥡GŒïMFá,Ì)ò“ê5béÖuÉÇÒ°ô[K ‘¼œ a863503b3ade528eb3985046b4b9b324528eea8bed9a22569c0ba3b5189e0dd6.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
1.exepid process 1704 1.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
a863503b3ade528eb3985046b4b9b324528eea8bed9a22569c0ba3b5189e0dd6.exe1.exedescription pid process target process PID 5112 wrote to memory of 1704 5112 a863503b3ade528eb3985046b4b9b324528eea8bed9a22569c0ba3b5189e0dd6.exe 1.exe PID 5112 wrote to memory of 1704 5112 a863503b3ade528eb3985046b4b9b324528eea8bed9a22569c0ba3b5189e0dd6.exe 1.exe PID 5112 wrote to memory of 1704 5112 a863503b3ade528eb3985046b4b9b324528eea8bed9a22569c0ba3b5189e0dd6.exe 1.exe PID 1704 wrote to memory of 260 1704 1.exe 1.exe PID 1704 wrote to memory of 260 1704 1.exe 1.exe PID 1704 wrote to memory of 260 1704 1.exe 1.exe PID 1704 wrote to memory of 260 1704 1.exe 1.exe PID 1704 wrote to memory of 260 1704 1.exe 1.exe PID 1704 wrote to memory of 260 1704 1.exe 1.exe PID 1704 wrote to memory of 260 1704 1.exe 1.exe PID 1704 wrote to memory of 260 1704 1.exe 1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a863503b3ade528eb3985046b4b9b324528eea8bed9a22569c0ba3b5189e0dd6.exe"C:\Users\Admin\AppData\Local\Temp\a863503b3ade528eb3985046b4b9b324528eea8bed9a22569c0ba3b5189e0dd6.exe"1⤵
- Checks computer location settings
- NTFS ADS
- Suspicious use of WriteProcessMemory
-
C:\Extracted\1.exe"C:\Extracted\1.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Extracted\1.exe"C:\Extracted\1.exe"3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 260 -s 4524⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 260 -ip 2601⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Extracted\1.exeFilesize
303KB
MD5f6e6fcab82bab9eaa5521a07bb5c3713
SHA1fdf70d41897ee5d8e62993c2b1300e1743483262
SHA2565453da881f5383035d5c3ed4ab4e4aaad5bf1ed2bfdd960cf5ac0db9fc02d38d
SHA512a8457c866d9ce246d2569fceddbd1c29ade3973262e84805093315adb9ed621ce339c0846d0d3a461a1f910de9c9b92806645546a52b02dd9f072b65151145ae
-
C:\Extracted\1.exeFilesize
303KB
MD5f6e6fcab82bab9eaa5521a07bb5c3713
SHA1fdf70d41897ee5d8e62993c2b1300e1743483262
SHA2565453da881f5383035d5c3ed4ab4e4aaad5bf1ed2bfdd960cf5ac0db9fc02d38d
SHA512a8457c866d9ce246d2569fceddbd1c29ade3973262e84805093315adb9ed621ce339c0846d0d3a461a1f910de9c9b92806645546a52b02dd9f072b65151145ae
-
C:\Extracted\1.exeFilesize
303KB
MD5f6e6fcab82bab9eaa5521a07bb5c3713
SHA1fdf70d41897ee5d8e62993c2b1300e1743483262
SHA2565453da881f5383035d5c3ed4ab4e4aaad5bf1ed2bfdd960cf5ac0db9fc02d38d
SHA512a8457c866d9ce246d2569fceddbd1c29ade3973262e84805093315adb9ed621ce339c0846d0d3a461a1f910de9c9b92806645546a52b02dd9f072b65151145ae
-
memory/260-141-0x0000000000000000-mapping.dmp
-
memory/260-146-0x0000000000400000-0x000000000045C000-memory.dmpFilesize
368KB
-
memory/260-144-0x0000000000400000-0x000000000045C000-memory.dmpFilesize
368KB
-
memory/260-142-0x0000000000400000-0x0000000000500000-memory.dmpFilesize
1024KB
-
memory/1704-135-0x0000000000000000-mapping.dmp
-
memory/1704-138-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/1704-145-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/5112-132-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/5112-134-0x0000000000030000-0x0000000000033000-memory.dmpFilesize
12KB
-
memory/5112-133-0x0000000000030000-0x0000000000033000-memory.dmpFilesize
12KB
-
memory/5112-147-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB