Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2022, 04:40
Static task
static1
Behavioral task
behavioral1
Sample
4bd589b5018c22fbe1fde71ed116d1d108e7eac49508f320ce70149465bc8109.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4bd589b5018c22fbe1fde71ed116d1d108e7eac49508f320ce70149465bc8109.exe
Resource
win10v2004-20220812-en
General
-
Target
4bd589b5018c22fbe1fde71ed116d1d108e7eac49508f320ce70149465bc8109.exe
-
Size
52KB
-
MD5
cbc4151e461694ba4841deaa99d4a18a
-
SHA1
c7124050bdcdf0686385299aa95faa64e86bbe60
-
SHA256
4bd589b5018c22fbe1fde71ed116d1d108e7eac49508f320ce70149465bc8109
-
SHA512
b08ba946ad2dc51f3f1b1544c4f0f7f1c9a24ed3dfe855922041f9c7d5376669cec5992c85c80543a9254b872a24b31bfcdaa01ee610bc12c83ece9853c13278
-
SSDEEP
768:3vKPjUJap1c1LpH8l43dvY55xnED4VbSWiP/AEn0:3iUWa1N8lqdvY55BED4VeWiHw
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4220 izmadza.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 4bd589b5018c22fbe1fde71ed116d1d108e7eac49508f320ce70149465bc8109.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4960 wrote to memory of 4220 4960 4bd589b5018c22fbe1fde71ed116d1d108e7eac49508f320ce70149465bc8109.exe 84 PID 4960 wrote to memory of 4220 4960 4bd589b5018c22fbe1fde71ed116d1d108e7eac49508f320ce70149465bc8109.exe 84 PID 4960 wrote to memory of 4220 4960 4bd589b5018c22fbe1fde71ed116d1d108e7eac49508f320ce70149465bc8109.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\4bd589b5018c22fbe1fde71ed116d1d108e7eac49508f320ce70149465bc8109.exe"C:\Users\Admin\AppData\Local\Temp\4bd589b5018c22fbe1fde71ed116d1d108e7eac49508f320ce70149465bc8109.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\izmadza.exe"C:\Users\Admin\AppData\Local\Temp\izmadza.exe"2⤵
- Executes dropped EXE
PID:4220
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD54a24a74140072900ccbcecf2d32570e8
SHA12c50ded912814c4893d8bc2539571efb487ff6d7
SHA256888348635c5d0c89431756158ff388406ca01f23a6fe0f166d18314ac033d855
SHA5128e3cf9d224cedd16053352052e964f5f1e796ed4a47d45a4404dfdf02edbfc0d94f41d449f8552a71bc1f302d0894a41abb4a0cef0541351c62d58b5beaec407
-
Filesize
52KB
MD54a24a74140072900ccbcecf2d32570e8
SHA12c50ded912814c4893d8bc2539571efb487ff6d7
SHA256888348635c5d0c89431756158ff388406ca01f23a6fe0f166d18314ac033d855
SHA5128e3cf9d224cedd16053352052e964f5f1e796ed4a47d45a4404dfdf02edbfc0d94f41d449f8552a71bc1f302d0894a41abb4a0cef0541351c62d58b5beaec407