Analysis
-
max time kernel
91s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
15-10-2022 22:19
Static task
static1
Behavioral task
behavioral1
Sample
186f94743c27032ff7401153a52116b4bbbf87c958dd0e2da1c0c111671c0563.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
186f94743c27032ff7401153a52116b4bbbf87c958dd0e2da1c0c111671c0563.exe
Resource
win10v2004-20220812-en
General
-
Target
186f94743c27032ff7401153a52116b4bbbf87c958dd0e2da1c0c111671c0563.exe
-
Size
158KB
-
MD5
cf3e3272a2596bfcf7500a96c5a053b4
-
SHA1
21906922bfcef5d6ab8092514dd77750be48f82f
-
SHA256
186f94743c27032ff7401153a52116b4bbbf87c958dd0e2da1c0c111671c0563
-
SHA512
10ddf33e42a27d6b747e029d86e17a93a7c07628c9a1e7659e5182c705b7535d6263b609775e58101eb1b2363cdf6777d92fda3ae846fd071c7c91e956317061
-
SSDEEP
3072:i8hU/cx2vUNy8Evl9qv7q8+xBv1Qk9nKR1KAZWv3BbPYxwWIiheaAhby/frnX0N:iYscWqv7LqLn3Ai1YxwWvhe/hbqX0
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 186f94743c27032ff7401153a52116b4bbbf87c958dd0e2da1c0c111671c0563.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 1 IoCs
pid Process 3116 timeout.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4984 186f94743c27032ff7401153a52116b4bbbf87c958dd0e2da1c0c111671c0563.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4984 wrote to memory of 3928 4984 186f94743c27032ff7401153a52116b4bbbf87c958dd0e2da1c0c111671c0563.exe 82 PID 4984 wrote to memory of 3928 4984 186f94743c27032ff7401153a52116b4bbbf87c958dd0e2da1c0c111671c0563.exe 82 PID 4984 wrote to memory of 3928 4984 186f94743c27032ff7401153a52116b4bbbf87c958dd0e2da1c0c111671c0563.exe 82 PID 3928 wrote to memory of 3116 3928 cmd.exe 84 PID 3928 wrote to memory of 3116 3928 cmd.exe 84 PID 3928 wrote to memory of 3116 3928 cmd.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\186f94743c27032ff7401153a52116b4bbbf87c958dd0e2da1c0c111671c0563.exe"C:\Users\Admin\AppData\Local\Temp\186f94743c27032ff7401153a52116b4bbbf87c958dd0e2da1c0c111671c0563.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C timeout 5 & del "C:\Users\Admin\AppData\Local\Temp\186f94743c27032ff7401153a52116b4bbbf87c958dd0e2da1c0c111671c0563.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Windows\SysWOW64\timeout.exetimeout 53⤵
- Delays execution with timeout.exe
PID:3116
-
-