Analysis
-
max time kernel
73s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19-10-2022 11:53
Static task
static1
Behavioral task
behavioral1
Sample
66120938887b4d13abee307e24fe6d05261b21dede4170d2fe15011574db8313.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
66120938887b4d13abee307e24fe6d05261b21dede4170d2fe15011574db8313.exe
Resource
win10v2004-20220812-en
General
-
Target
66120938887b4d13abee307e24fe6d05261b21dede4170d2fe15011574db8313.exe
-
Size
516KB
-
MD5
7061bccb53ea7df25866ae2cf390b2f5
-
SHA1
41c8e888b960a01ae823a09cc61953118e67c5a0
-
SHA256
66120938887b4d13abee307e24fe6d05261b21dede4170d2fe15011574db8313
-
SHA512
8f15970b4cf7698976de89c93aa72379b6950232c8804088ddf72a1d6b259848844300530008c494c852e7dbcab428a66bff25fb1d8a7b5df8a67831a89601bf
-
SSDEEP
1536:PjPqTrLutEGbGa4ItmbSnK0xrPgpOtnK0xrPgpOBnK0xhxg8Xo:PjPqTobG6nK4zgEtnK4zgEBnK47gyo
Malware Config
Signatures
-
Modifies extensions of user files 4 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\LimitRemove.crw => C:\Users\Admin\Pictures\LimitRemove.crw.getfucked 66120938887b4d13abee307e24fe6d05261b21dede4170d2fe15011574db8313.exe File renamed C:\Users\Admin\Pictures\MeasureUnlock.raw => C:\Users\Admin\Pictures\MeasureUnlock.raw.getfucked 66120938887b4d13abee307e24fe6d05261b21dede4170d2fe15011574db8313.exe File renamed C:\Users\Admin\Pictures\OpenRestore.crw => C:\Users\Admin\Pictures\OpenRestore.crw.getfucked 66120938887b4d13abee307e24fe6d05261b21dede4170d2fe15011574db8313.exe File renamed C:\Users\Admin\Pictures\WriteRemove.raw => C:\Users\Admin\Pictures\WriteRemove.raw.getfucked 66120938887b4d13abee307e24fe6d05261b21dede4170d2fe15011574db8313.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 66120938887b4d13abee307e24fe6d05261b21dede4170d2fe15011574db8313.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 1 IoCs
pid Process 3344 timeout.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4768 66120938887b4d13abee307e24fe6d05261b21dede4170d2fe15011574db8313.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4768 wrote to memory of 4600 4768 66120938887b4d13abee307e24fe6d05261b21dede4170d2fe15011574db8313.exe 92 PID 4768 wrote to memory of 4600 4768 66120938887b4d13abee307e24fe6d05261b21dede4170d2fe15011574db8313.exe 92 PID 4768 wrote to memory of 4600 4768 66120938887b4d13abee307e24fe6d05261b21dede4170d2fe15011574db8313.exe 92 PID 4600 wrote to memory of 3344 4600 cmd.exe 94 PID 4600 wrote to memory of 3344 4600 cmd.exe 94 PID 4600 wrote to memory of 3344 4600 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\66120938887b4d13abee307e24fe6d05261b21dede4170d2fe15011574db8313.exe"C:\Users\Admin\AppData\Local\Temp\66120938887b4d13abee307e24fe6d05261b21dede4170d2fe15011574db8313.exe"1⤵
- Modifies extensions of user files
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C timeout 2 && Del /Q /F C:\Users\Admin\AppData\Local\Temp\66120938887b4d13abee307e24fe6d05261b21dede4170d2fe15011574db8313.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Windows\SysWOW64\timeout.exetimeout 23⤵
- Delays execution with timeout.exe
PID:3344
-
-