Analysis
-
max time kernel
164s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20-10-2022 20:31
Static task
static1
Behavioral task
behavioral1
Sample
2c337713b10c8c3796ea5b76c1e5724a0851d77de240768a30ec9abea21b6728.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2c337713b10c8c3796ea5b76c1e5724a0851d77de240768a30ec9abea21b6728.exe
Resource
win10v2004-20220812-en
General
-
Target
2c337713b10c8c3796ea5b76c1e5724a0851d77de240768a30ec9abea21b6728.exe
-
Size
23KB
-
MD5
a05331f1739eea8c24980aa25972a750
-
SHA1
a1bbc080b8418d3761e944a477a7dc558ce8bb85
-
SHA256
2c337713b10c8c3796ea5b76c1e5724a0851d77de240768a30ec9abea21b6728
-
SHA512
112e27e08e55eb43589d428fc289c4c1d37163448606b85579f50ca3d4bd244afee72ab69c2ff28d892ce839297be6ef2e771a4f4f046c65391d2e522ef43bf0
-
SSDEEP
384:DkzRLh/m7m16W8ulDlaDoAQIFYouIY/kCh0r1xP9:2Lh+o6W8ulF1toaS1xl
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 380 firefox_updater.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 2c337713b10c8c3796ea5b76c1e5724a0851d77de240768a30ec9abea21b6728.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1688 wrote to memory of 380 1688 2c337713b10c8c3796ea5b76c1e5724a0851d77de240768a30ec9abea21b6728.exe 80 PID 1688 wrote to memory of 380 1688 2c337713b10c8c3796ea5b76c1e5724a0851d77de240768a30ec9abea21b6728.exe 80 PID 1688 wrote to memory of 380 1688 2c337713b10c8c3796ea5b76c1e5724a0851d77de240768a30ec9abea21b6728.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c337713b10c8c3796ea5b76c1e5724a0851d77de240768a30ec9abea21b6728.exe"C:\Users\Admin\AppData\Local\Temp\2c337713b10c8c3796ea5b76c1e5724a0851d77de240768a30ec9abea21b6728.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\firefox_updater.exe"C:\Users\Admin\AppData\Local\Temp\firefox_updater.exe"2⤵
- Executes dropped EXE
PID:380
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD5a1f8a0201f457687793ca4429725438b
SHA12a1339b95df167b34f92750e4b49757639ab494e
SHA256807642334c038cf7156add41b17069bdc512a89d18f74e8a3408f4a1d3236a9d
SHA5129f6dc19a4d7159adc53fb8597c4f9ee85767d1128e03ee958cbe546d263b872dd215651ef2e2254c6a1d147a495c240e8036218663bc3e2aa5d4b489362f9cea
-
Filesize
24KB
MD5a1f8a0201f457687793ca4429725438b
SHA12a1339b95df167b34f92750e4b49757639ab494e
SHA256807642334c038cf7156add41b17069bdc512a89d18f74e8a3408f4a1d3236a9d
SHA5129f6dc19a4d7159adc53fb8597c4f9ee85767d1128e03ee958cbe546d263b872dd215651ef2e2254c6a1d147a495c240e8036218663bc3e2aa5d4b489362f9cea