Analysis
-
max time kernel
166s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19-10-2022 14:02
Static task
static1
Behavioral task
behavioral1
Sample
1072406feff04f25ec115f1395563b772058fe4973e1a1f6fecb4f273f1df75b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1072406feff04f25ec115f1395563b772058fe4973e1a1f6fecb4f273f1df75b.exe
Resource
win10v2004-20220812-en
General
-
Target
1072406feff04f25ec115f1395563b772058fe4973e1a1f6fecb4f273f1df75b.exe
-
Size
36KB
-
MD5
551c9fbb6ae7cb8130cd2fa85d74bf87
-
SHA1
6cb12252a282bfcf8d03bfacc5f5d30acc189e3d
-
SHA256
1072406feff04f25ec115f1395563b772058fe4973e1a1f6fecb4f273f1df75b
-
SHA512
74c297edc7c37abcd73049b8a41e3136d4e91f614e178c3b9ba9d3e60441cba9288778dfa8cb37e0f4047483571fe72a8837961ed2c4d674861a689bf28b3ebd
-
SSDEEP
384:wX7QuQT375RK3l6DNDvnqzemXrJ99/BDmy4todF+HO86CxEh99yooKTe70:wbQhUMDNDvzmXrJ9Jotov+HO00doP
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 1072406feff04f25ec115f1395563b772058fe4973e1a1f6fecb4f273f1df75b.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 1072406feff04f25ec115f1395563b772058fe4973e1a1f6fecb4f273f1df75b.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 1072406feff04f25ec115f1395563b772058fe4973e1a1f6fecb4f273f1df75b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 456 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 456 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4628 1072406feff04f25ec115f1395563b772058fe4973e1a1f6fecb4f273f1df75b.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4628 wrote to memory of 4936 4628 1072406feff04f25ec115f1395563b772058fe4973e1a1f6fecb4f273f1df75b.exe 80 PID 4628 wrote to memory of 4936 4628 1072406feff04f25ec115f1395563b772058fe4973e1a1f6fecb4f273f1df75b.exe 80 PID 4628 wrote to memory of 4936 4628 1072406feff04f25ec115f1395563b772058fe4973e1a1f6fecb4f273f1df75b.exe 80 PID 4936 wrote to memory of 456 4936 cmd.exe 82 PID 4936 wrote to memory of 456 4936 cmd.exe 82 PID 4936 wrote to memory of 456 4936 cmd.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\1072406feff04f25ec115f1395563b772058fe4973e1a1f6fecb4f273f1df75b.exe"C:\Users\Admin\AppData\Local\Temp\1072406feff04f25ec115f1395563b772058fe4973e1a1f6fecb4f273f1df75b.exe"1⤵
- Checks computer location settings
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 1072406feff04f25ec115f1395563b772058fe4973e1a1f6fecb4f273f1df75b.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:456
-
-