Analysis
-
max time kernel
97s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
28/10/2022, 00:34
Static task
static1
Behavioral task
behavioral1
Sample
06cc6b757305a99fe80ae0e5589df4320878c3faa94693f4a2d187eb34120747.exe
Resource
win10v2004-20220812-en
General
-
Target
06cc6b757305a99fe80ae0e5589df4320878c3faa94693f4a2d187eb34120747.exe
-
Size
1.7MB
-
MD5
cd15717c0989bc77d228fc1781e2fe6f
-
SHA1
f2ba580842070b92b0dbfbbb434aa2445c97e641
-
SHA256
06cc6b757305a99fe80ae0e5589df4320878c3faa94693f4a2d187eb34120747
-
SHA512
3d063207b3fde14e321372a8c1d953220f2fbe25d0cf832d8644d57bad2bd036709bd14a852056f62cfec147f53fc1022f014fdaf1a385df751986d8255a4130
-
SSDEEP
49152:EuWxtk4ewkqydInKgbaRfEpXq+kELAkjy0n:EuWpmbKlqbwe0n
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 06cc6b757305a99fe80ae0e5589df4320878c3faa94693f4a2d187eb34120747.exe -
Loads dropped DLL 1 IoCs
pid Process 1072 msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4548 wrote to memory of 1072 4548 06cc6b757305a99fe80ae0e5589df4320878c3faa94693f4a2d187eb34120747.exe 83 PID 4548 wrote to memory of 1072 4548 06cc6b757305a99fe80ae0e5589df4320878c3faa94693f4a2d187eb34120747.exe 83 PID 4548 wrote to memory of 1072 4548 06cc6b757305a99fe80ae0e5589df4320878c3faa94693f4a2d187eb34120747.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\06cc6b757305a99fe80ae0e5589df4320878c3faa94693f4a2d187eb34120747.exe"C:\Users\Admin\AppData\Local\Temp\06cc6b757305a99fe80ae0e5589df4320878c3faa94693f4a2d187eb34120747.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" /Y .\P4CVF.vSK2⤵
- Loads dropped DLL
PID:1072
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD53c2cdbf02fa9b37ffe3b36d605379e38
SHA12f14b1385d350772a90c686d0aa381d5f9d51e7b
SHA256b92a270ba42d910cf777b6db07f418b21138b2dbfdfb030ddc4f68bc6afa4df2
SHA5129bec70a034434845eb1e8998b06d0318c9596061163a0e3e0fcc1bec3590a2cf3b028249322df5c53542b35ffcf2478b1744cf724743bc32ac3a349d542bb144
-
Filesize
2.7MB
MD53c2cdbf02fa9b37ffe3b36d605379e38
SHA12f14b1385d350772a90c686d0aa381d5f9d51e7b
SHA256b92a270ba42d910cf777b6db07f418b21138b2dbfdfb030ddc4f68bc6afa4df2
SHA5129bec70a034434845eb1e8998b06d0318c9596061163a0e3e0fcc1bec3590a2cf3b028249322df5c53542b35ffcf2478b1744cf724743bc32ac3a349d542bb144