Analysis
-
max time kernel
134s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20/10/2022, 10:05
Static task
static1
Behavioral task
behavioral1
Sample
b5b2eb63318a15f44faed74eff59703ff754eb98ec5b16ff1825270bc6116adb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b5b2eb63318a15f44faed74eff59703ff754eb98ec5b16ff1825270bc6116adb.exe
Resource
win10v2004-20220812-en
General
-
Target
b5b2eb63318a15f44faed74eff59703ff754eb98ec5b16ff1825270bc6116adb.exe
-
Size
108KB
-
MD5
812dd84b1a26cb2d8c87097ae78ed17f
-
SHA1
79688735259645f888ba598ef04221b19d43758e
-
SHA256
b5b2eb63318a15f44faed74eff59703ff754eb98ec5b16ff1825270bc6116adb
-
SHA512
57346e5f60b967889d8e1367555e67c1949b516546300c47146ecf36034693d8190c1c04c2c6a888550aa7fd92844c6f959a2f383fd7e92cac358d6fcd368d02
-
SSDEEP
3072:Qw0gg0PPikrvDbEGrA7psIhuK/zzazhACuzz+cp0:B0ggGRrbwOazzazhACuzz+cp0
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation b5b2eb63318a15f44faed74eff59703ff754eb98ec5b16ff1825270bc6116adb.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum b5b2eb63318a15f44faed74eff59703ff754eb98ec5b16ff1825270bc6116adb.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 b5b2eb63318a15f44faed74eff59703ff754eb98ec5b16ff1825270bc6116adb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 5036 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5036 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 372 b5b2eb63318a15f44faed74eff59703ff754eb98ec5b16ff1825270bc6116adb.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 372 wrote to memory of 4500 372 b5b2eb63318a15f44faed74eff59703ff754eb98ec5b16ff1825270bc6116adb.exe 82 PID 372 wrote to memory of 4500 372 b5b2eb63318a15f44faed74eff59703ff754eb98ec5b16ff1825270bc6116adb.exe 82 PID 372 wrote to memory of 4500 372 b5b2eb63318a15f44faed74eff59703ff754eb98ec5b16ff1825270bc6116adb.exe 82 PID 4500 wrote to memory of 5036 4500 cmd.exe 84 PID 4500 wrote to memory of 5036 4500 cmd.exe 84 PID 4500 wrote to memory of 5036 4500 cmd.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5b2eb63318a15f44faed74eff59703ff754eb98ec5b16ff1825270bc6116adb.exe"C:\Users\Admin\AppData\Local\Temp\b5b2eb63318a15f44faed74eff59703ff754eb98ec5b16ff1825270bc6116adb.exe"1⤵
- Checks computer location settings
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del b5b2eb63318a15f44faed74eff59703ff72⤵
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:5036
-
-