Analysis
-
max time kernel
118s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2022, 14:28
Static task
static1
Behavioral task
behavioral1
Sample
e3640b9cfa6f6a827f89c52a880fef77c506b65756d3b2cde3c6f2e0df554e6c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e3640b9cfa6f6a827f89c52a880fef77c506b65756d3b2cde3c6f2e0df554e6c.exe
Resource
win10v2004-20220812-en
General
-
Target
e3640b9cfa6f6a827f89c52a880fef77c506b65756d3b2cde3c6f2e0df554e6c.exe
-
Size
64KB
-
MD5
7ccaef8d00df695b5a38018fba581130
-
SHA1
34f098b24b95eb19d157c9925d59c00c3142bb0f
-
SHA256
e3640b9cfa6f6a827f89c52a880fef77c506b65756d3b2cde3c6f2e0df554e6c
-
SHA512
563a8bf7278dd91823943ba248930a7ba48beed02ae5102f2705c8199f873a4bb85ab0c902103fca87c54d9199b033fa930bd021b98fb5fade42d468cec047d1
-
SSDEEP
1536:t4dNDOVpVbIl4GU5iaiY9i0byQ1CZi2eYW+PnsSPr:t5ulN6i0gC+vRr
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation e3640b9cfa6f6a827f89c52a880fef77c506b65756d3b2cde3c6f2e0df554e6c.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum e3640b9cfa6f6a827f89c52a880fef77c506b65756d3b2cde3c6f2e0df554e6c.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 e3640b9cfa6f6a827f89c52a880fef77c506b65756d3b2cde3c6f2e0df554e6c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1556 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1556 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4936 e3640b9cfa6f6a827f89c52a880fef77c506b65756d3b2cde3c6f2e0df554e6c.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4936 wrote to memory of 4496 4936 e3640b9cfa6f6a827f89c52a880fef77c506b65756d3b2cde3c6f2e0df554e6c.exe 84 PID 4936 wrote to memory of 4496 4936 e3640b9cfa6f6a827f89c52a880fef77c506b65756d3b2cde3c6f2e0df554e6c.exe 84 PID 4936 wrote to memory of 4496 4936 e3640b9cfa6f6a827f89c52a880fef77c506b65756d3b2cde3c6f2e0df554e6c.exe 84 PID 4496 wrote to memory of 1556 4496 cmd.exe 86 PID 4496 wrote to memory of 1556 4496 cmd.exe 86 PID 4496 wrote to memory of 1556 4496 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\e3640b9cfa6f6a827f89c52a880fef77c506b65756d3b2cde3c6f2e0df554e6c.exe"C:\Users\Admin\AppData\Local\Temp\e3640b9cfa6f6a827f89c52a880fef77c506b65756d3b2cde3c6f2e0df554e6c.exe"1⤵
- Checks computer location settings
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del e3640b9cfa6f6a827f89c52a880fef77c52⤵
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1556
-
-