Analysis
-
max time kernel
152s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
19-10-2022 19:20
Static task
static1
Behavioral task
behavioral1
Sample
dcc5bf03e6203d3c5335b9acdb9d88e089783641f16c0cca6c8caf76655e4e89.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dcc5bf03e6203d3c5335b9acdb9d88e089783641f16c0cca6c8caf76655e4e89.exe
Resource
win10v2004-20220901-en
General
-
Target
dcc5bf03e6203d3c5335b9acdb9d88e089783641f16c0cca6c8caf76655e4e89.exe
-
Size
77KB
-
MD5
adc129ed77eca9cdc4677ff34cfa601b
-
SHA1
68a91bcd2ad8229cfba86b71d80a4a49ca489f8c
-
SHA256
dcc5bf03e6203d3c5335b9acdb9d88e089783641f16c0cca6c8caf76655e4e89
-
SHA512
89118f29c6db2b722df3417c27a121d04a25ddf5e7821699f59f52f1ea579e8201ecfed419f068d7903fc42ae8e9e89c56bb0d546183d4750464cd828e8e2f01
-
SSDEEP
768:o73OtJDvhzNDnwGk58sCuStfXR+VxhHg1rpgQwdYhijQFBpBTBH+WM0Zjz:oa/DvVNm58kSWHgJ0Yw0bpBd19z
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 580 pdfmarks.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation dcc5bf03e6203d3c5335b9acdb9d88e089783641f16c0cca6c8caf76655e4e89.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5072 wrote to memory of 580 5072 dcc5bf03e6203d3c5335b9acdb9d88e089783641f16c0cca6c8caf76655e4e89.exe 84 PID 5072 wrote to memory of 580 5072 dcc5bf03e6203d3c5335b9acdb9d88e089783641f16c0cca6c8caf76655e4e89.exe 84 PID 5072 wrote to memory of 580 5072 dcc5bf03e6203d3c5335b9acdb9d88e089783641f16c0cca6c8caf76655e4e89.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\dcc5bf03e6203d3c5335b9acdb9d88e089783641f16c0cca6c8caf76655e4e89.exe"C:\Users\Admin\AppData\Local\Temp\dcc5bf03e6203d3c5335b9acdb9d88e089783641f16c0cca6c8caf76655e4e89.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Users\Admin\AppData\Local\Temp\pdfmarks.exe"C:\Users\Admin\AppData\Local\Temp\pdfmarks.exe"2⤵
- Executes dropped EXE
PID:580
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
77KB
MD574d5aa13e69ae45dcd379b731bc6ab2e
SHA17500254e0bc8bd35a14118ab0c932835630ec4a7
SHA2560842580496f9d0d73a77ae6d1a0a690f0f387ca98f8f47aad4d0eea2d7688c77
SHA5125fa4553a99d59eb801ba80f29133d897439ab939bb5f108e1c5b3f0d15c676b5f7cde2c07063f893509471cde1795c033f7c5864abd2d730106d22b6fbcce897
-
Filesize
77KB
MD574d5aa13e69ae45dcd379b731bc6ab2e
SHA17500254e0bc8bd35a14118ab0c932835630ec4a7
SHA2560842580496f9d0d73a77ae6d1a0a690f0f387ca98f8f47aad4d0eea2d7688c77
SHA5125fa4553a99d59eb801ba80f29133d897439ab939bb5f108e1c5b3f0d15c676b5f7cde2c07063f893509471cde1795c033f7c5864abd2d730106d22b6fbcce897