Analysis
-
max time kernel
64s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
18-10-2022 12:40
Static task
static1
Behavioral task
behavioral1
Sample
7b41e29a9dc082277ee856816424644a87c360182c3ecd9dc385e784460f5194.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7b41e29a9dc082277ee856816424644a87c360182c3ecd9dc385e784460f5194.exe
Resource
win10v2004-20220812-en
General
-
Target
7b41e29a9dc082277ee856816424644a87c360182c3ecd9dc385e784460f5194.exe
-
Size
9KB
-
MD5
9882e989564bcdd78fb307dafe410588
-
SHA1
8e1e4315ce2887e8f9ceb197fb9fb7657fa39bc2
-
SHA256
7b41e29a9dc082277ee856816424644a87c360182c3ecd9dc385e784460f5194
-
SHA512
55d9d3a9e40b1f96ff818c7ed9b5e5cc1e05e088c68c884eed2339b74d5b1476294415d26fe298f8481b9f37280c413b4a6c981eec086d2847090e8715cec1d2
-
SSDEEP
96:tXLMBY1T/14cfnp3bYko+vIIFp4cawv2yI7zypwptzzW5mYbaJfdTwIdDbRVQYdz:xZCYprzoFhmUdNbRV1dH15
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 848 kgfdfjdk.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 7b41e29a9dc082277ee856816424644a87c360182c3ecd9dc385e784460f5194.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation kgfdfjdk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4756 wrote to memory of 848 4756 7b41e29a9dc082277ee856816424644a87c360182c3ecd9dc385e784460f5194.exe 82 PID 4756 wrote to memory of 848 4756 7b41e29a9dc082277ee856816424644a87c360182c3ecd9dc385e784460f5194.exe 82 PID 4756 wrote to memory of 848 4756 7b41e29a9dc082277ee856816424644a87c360182c3ecd9dc385e784460f5194.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b41e29a9dc082277ee856816424644a87c360182c3ecd9dc385e784460f5194.exe"C:\Users\Admin\AppData\Local\Temp\7b41e29a9dc082277ee856816424644a87c360182c3ecd9dc385e784460f5194.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Users\Admin\AppData\Local\Temp\kgfdfjdk.exe"C:\Users\Admin\AppData\Local\Temp\kgfdfjdk.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
PID:848
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD56e399f990e0ef72a7ee1ea7aabba097c
SHA15df8c5948b9342f515af3bd7101b6ce540c5e88e
SHA256dee9820255585c0e502223c484203cc8bf29a1e740d9e1be1b9203e77024805e
SHA512ede221b7a3a76ab5462a18dc43e5f295b97331c7cc03b5bc1ce93163d145d3426091dad0d4df039e6d27dc336d97bf85f63a3ba2b9bbf44d00776573a0cc036d
-
Filesize
9KB
MD56e399f990e0ef72a7ee1ea7aabba097c
SHA15df8c5948b9342f515af3bd7101b6ce540c5e88e
SHA256dee9820255585c0e502223c484203cc8bf29a1e740d9e1be1b9203e77024805e
SHA512ede221b7a3a76ab5462a18dc43e5f295b97331c7cc03b5bc1ce93163d145d3426091dad0d4df039e6d27dc336d97bf85f63a3ba2b9bbf44d00776573a0cc036d