Analysis
-
max time kernel
150s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26-10-2022 07:58
Static task
static1
Behavioral task
behavioral1
Sample
a9175491a108645ba2f0f906d639bd94e895e41370e6c23c59b95ab4a927a6fa.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a9175491a108645ba2f0f906d639bd94e895e41370e6c23c59b95ab4a927a6fa.exe
Resource
win10v2004-20220812-en
General
-
Target
a9175491a108645ba2f0f906d639bd94e895e41370e6c23c59b95ab4a927a6fa.exe
-
Size
545KB
-
MD5
3573fb365cb90f54324ed47ed2bfdfdb
-
SHA1
dc0271cf8d5d55e1a6b1ff71a9e70d8009c6e318
-
SHA256
a9175491a108645ba2f0f906d639bd94e895e41370e6c23c59b95ab4a927a6fa
-
SHA512
ccb1b53152e34a5ef824eb757c39e62804447f3848a80b6d50ac7e46b3f8b3959dd4dea983216cc62114cf0ed9e799ca4d53555bcda2da916329526fe1410f27
-
SSDEEP
12288:xgQQb7xw4qJB4jRrDKO+OeO+OeNhBBhhBB937cpqPO0VcvMTrN9bSJG358uOhPKS:xhrQrDgJ1dvN9/g6M
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Control Panel\International\Geo\Nation rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies Control Panel 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Control Panel\International\AddHijriDateTemp = "AddHijriDate+2" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Control Panel\International rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Control Panel\International\AddHijriDateTemp = "AddHijriDate-2" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Control Panel\International\AddHijriDateTemp = "AddHijriDate" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Control Panel\International\AddHijriDateTemp rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Control Panel\International\AddHijriDateTemp = "AddHijriDate+1" rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSystemtimePrivilege 1112 rundll32.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 968 wrote to memory of 1112 968 control.exe 28 PID 968 wrote to memory of 1112 968 control.exe 28 PID 968 wrote to memory of 1112 968 control.exe 28 PID 1112 wrote to memory of 964 1112 rundll32.exe 29 PID 1112 wrote to memory of 964 1112 rundll32.exe 29 PID 1112 wrote to memory of 964 1112 rundll32.exe 29 PID 964 wrote to memory of 1764 964 control.exe 30 PID 964 wrote to memory of 1764 964 control.exe 30 PID 964 wrote to memory of 1764 964 control.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9175491a108645ba2f0f906d639bd94e895e41370e6c23c59b95ab4a927a6fa.exe"C:\Users\Admin\AppData\Local\Temp\a9175491a108645ba2f0f906d639bd94e895e41370e6c23c59b95ab4a927a6fa.exe"1⤵PID:1388
-
C:\Windows\System32\control.exe"C:\Windows\System32\control.exe" "C:\Windows\system32\timedate.cpl",1⤵
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Windows\system32\timedate.cpl",2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Windows\System32\control.exe"C:\Windows\System32\control.exe" "C:\Windows\system32\intl.cpl",,/p:"date"3⤵
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Windows\system32\intl.cpl",,/p:"date"4⤵
- Checks computer location settings
- Modifies Control Panel
PID:1764
-
-
-