Analysis
-
max time kernel
141s -
max time network
187s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 02:13
Static task
static1
Behavioral task
behavioral1
Sample
0100185b55d7f423b63d84cb792b2cb159157fa8e9d5359c88c37ef3823ab532.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0100185b55d7f423b63d84cb792b2cb159157fa8e9d5359c88c37ef3823ab532.exe
Resource
win10v2004-20220812-en
General
-
Target
0100185b55d7f423b63d84cb792b2cb159157fa8e9d5359c88c37ef3823ab532.exe
-
Size
92KB
-
MD5
69344bebb8fed24d6aca51e8469d22d0
-
SHA1
19ac6d138b77c128d81527b2bb2ded4c117e6d3e
-
SHA256
0100185b55d7f423b63d84cb792b2cb159157fa8e9d5359c88c37ef3823ab532
-
SHA512
159d5a704b2c45a464385bc152341f6b8ed40c6cb3de862107765ec1fe28177647ecb607124e6a2986a803a487e6077224b442fd37a08472dc0f451f23d70ffa
-
SSDEEP
1536:eFQdBkSxFU0i2TqnuzQ6GDNNMlRQYWAHXh2W18LN2sqb5P5WEZrDBo+xI6r4Xap:9kSxa0i2TquzQ6GDNNMfQYWAHXh3yLNe
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 0100185b55d7f423b63d84cb792b2cb159157fa8e9d5359c88c37ef3823ab532.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 0100185b55d7f423b63d84cb792b2cb159157fa8e9d5359c88c37ef3823ab532.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 0100185b55d7f423b63d84cb792b2cb159157fa8e9d5359c88c37ef3823ab532.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 4884 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4884 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4260 0100185b55d7f423b63d84cb792b2cb159157fa8e9d5359c88c37ef3823ab532.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4260 wrote to memory of 4688 4260 0100185b55d7f423b63d84cb792b2cb159157fa8e9d5359c88c37ef3823ab532.exe 82 PID 4260 wrote to memory of 4688 4260 0100185b55d7f423b63d84cb792b2cb159157fa8e9d5359c88c37ef3823ab532.exe 82 PID 4260 wrote to memory of 4688 4260 0100185b55d7f423b63d84cb792b2cb159157fa8e9d5359c88c37ef3823ab532.exe 82 PID 4688 wrote to memory of 4884 4688 cmd.exe 83 PID 4688 wrote to memory of 4884 4688 cmd.exe 83 PID 4688 wrote to memory of 4884 4688 cmd.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\0100185b55d7f423b63d84cb792b2cb159157fa8e9d5359c88c37ef3823ab532.exe"C:\Users\Admin\AppData\Local\Temp\0100185b55d7f423b63d84cb792b2cb159157fa8e9d5359c88c37ef3823ab532.exe"1⤵
- Checks computer location settings
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 0100185b55d7f423b63d84cb792b2cb1592⤵
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4884
-
-