Analysis
-
max time kernel
134s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20/10/2022, 19:30
Static task
static1
Behavioral task
behavioral1
Sample
cf348c6a92680ceaaa3f34472fffc9653bd4e39cef6020577e44a12ab20c6560.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cf348c6a92680ceaaa3f34472fffc9653bd4e39cef6020577e44a12ab20c6560.exe
Resource
win10v2004-20220812-en
General
-
Target
cf348c6a92680ceaaa3f34472fffc9653bd4e39cef6020577e44a12ab20c6560.exe
-
Size
70KB
-
MD5
4efdc031b019cc167cd0f11d0021d990
-
SHA1
ef1cba4f415cf65eb656d971154687bb2a8f64b2
-
SHA256
cf348c6a92680ceaaa3f34472fffc9653bd4e39cef6020577e44a12ab20c6560
-
SHA512
1f97031756dab7d8b6b412cb28cf2b4a8b4c28d751904b750f4afb79fceb7e9fb5d805f21617bad96872c2edcf09b49c23cf568487dd2661ec2db7d0394f574d
-
SSDEEP
1536:zhX8slAtdbaYmcl85Bg2MyqlqfgeX7xIpIE7Zf4neAtFX1pNy:zd8qIbjm75jMyqkvxqCnntBU
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation cf348c6a92680ceaaa3f34472fffc9653bd4e39cef6020577e44a12ab20c6560.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MyImgur = "C:\\Users\\Admin\\AppData\\Local\\Temp\\.exe" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4968 wrote to memory of 4984 4968 cf348c6a92680ceaaa3f34472fffc9653bd4e39cef6020577e44a12ab20c6560.exe 87 PID 4968 wrote to memory of 4984 4968 cf348c6a92680ceaaa3f34472fffc9653bd4e39cef6020577e44a12ab20c6560.exe 87 PID 4968 wrote to memory of 4984 4968 cf348c6a92680ceaaa3f34472fffc9653bd4e39cef6020577e44a12ab20c6560.exe 87 PID 4984 wrote to memory of 2036 4984 cmd.exe 89 PID 4984 wrote to memory of 2036 4984 cmd.exe 89 PID 4984 wrote to memory of 2036 4984 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf348c6a92680ceaaa3f34472fffc9653bd4e39cef6020577e44a12ab20c6560.exe"C:\Users\Admin\AppData\Local\Temp\cf348c6a92680ceaaa3f34472fffc9653bd4e39cef6020577e44a12ab20c6560.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "MyImgur" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "MyImgur" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\.exe3⤵
- Adds Run key to start application
PID:2036
-
-