Analysis
-
max time kernel
112s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19-10-2022 22:30
Static task
static1
Behavioral task
behavioral1
Sample
795da4b9f798971e5e9c6784199c2993b9506d02b1419ebad7a81391cb6ddbbc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
795da4b9f798971e5e9c6784199c2993b9506d02b1419ebad7a81391cb6ddbbc.exe
Resource
win10v2004-20220812-en
General
-
Target
795da4b9f798971e5e9c6784199c2993b9506d02b1419ebad7a81391cb6ddbbc.exe
-
Size
621KB
-
MD5
a11a246b267a89800f56acd21ad32ee0
-
SHA1
cad716bf39d42de0992a81993f7a61f7d2ca0301
-
SHA256
795da4b9f798971e5e9c6784199c2993b9506d02b1419ebad7a81391cb6ddbbc
-
SHA512
d47a4322518cff8980454b797b282a3cc420fbf3d889b9b60713ab34f57d2ed821db29ac75ee6d8b5a33009c2962e6e948868e61b2087519daa0f2ed9b3aef3f
-
SSDEEP
12288:WMtPB1HbMPXAktKhILTR7/3zNo4nQRQq5rC1ALp2eiFLRHYHGz:FtHAPXAvQ7rbnQRQuOyLU7TOGz
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2548 dofhir.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 795da4b9f798971e5e9c6784199c2993b9506d02b1419ebad7a81391cb6ddbbc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4504 wrote to memory of 2548 4504 795da4b9f798971e5e9c6784199c2993b9506d02b1419ebad7a81391cb6ddbbc.exe 79 PID 4504 wrote to memory of 2548 4504 795da4b9f798971e5e9c6784199c2993b9506d02b1419ebad7a81391cb6ddbbc.exe 79 PID 4504 wrote to memory of 2548 4504 795da4b9f798971e5e9c6784199c2993b9506d02b1419ebad7a81391cb6ddbbc.exe 79 PID 4504 wrote to memory of 664 4504 795da4b9f798971e5e9c6784199c2993b9506d02b1419ebad7a81391cb6ddbbc.exe 80 PID 4504 wrote to memory of 664 4504 795da4b9f798971e5e9c6784199c2993b9506d02b1419ebad7a81391cb6ddbbc.exe 80 PID 4504 wrote to memory of 664 4504 795da4b9f798971e5e9c6784199c2993b9506d02b1419ebad7a81391cb6ddbbc.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\795da4b9f798971e5e9c6784199c2993b9506d02b1419ebad7a81391cb6ddbbc.exe"C:\Users\Admin\AppData\Local\Temp\795da4b9f798971e5e9c6784199c2993b9506d02b1419ebad7a81391cb6ddbbc.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\dofhir.exe"C:\Users\Admin\AppData\Local\Temp\dofhir.exe"2⤵
- Executes dropped EXE
PID:2548
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵PID:664
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
621KB
MD58df5b0d7c45d4d6ee58a7f86bc52d688
SHA1d4790654355561d217b5225325b4ce466632baa4
SHA25671b2dc599321d96756f28a2c3763623b6e6b300859d61f8349aea3aa57b59426
SHA5128c66c24e27ae4dd3fdb8de4832372ee48b9592fc1ebf86b1d47326d6149e18232e2f3433a13b7a4af75e44147aafec37787d803abc62b980efe3645395916579
-
Filesize
621KB
MD58df5b0d7c45d4d6ee58a7f86bc52d688
SHA1d4790654355561d217b5225325b4ce466632baa4
SHA25671b2dc599321d96756f28a2c3763623b6e6b300859d61f8349aea3aa57b59426
SHA5128c66c24e27ae4dd3fdb8de4832372ee48b9592fc1ebf86b1d47326d6149e18232e2f3433a13b7a4af75e44147aafec37787d803abc62b980efe3645395916579
-
Filesize
512B
MD564bd6ce7bbf11d281db681ed92eef333
SHA12034da53aac1d1bb31412abd3374518956556beb
SHA256f6ac51f63e05e0c1e484b9a0df249ea47e6db7e72b603191235b19fb486a0efe
SHA5125063a264be28eab5fdae7684427cf23fe80d79d14305f516c41871422daefd8a9b39bc715098bb955b623514f0c0781b0d8b516e0bf0f0ef8c6c7736b106ba26
-
Filesize
338B
MD590e51814b9824c62b49397aad2bc3a2b
SHA1860402f4638d1d34cfb12b14e4a30a3bb2516e2d
SHA2560852d1988590820318bbcffffd3fb06e24d2220f8d5f11508fe51fadafe0ef8b
SHA512fc1b4f5f4924c9756744bf4a105b47bda69dc0bd7c49fdb2e68ff8d0c10f95517587553ac647319d92f2f14f39b3a9d161e3d88163068a7c491e08477f81f921