Analysis
-
max time kernel
101s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 05:32
Static task
static1
Behavioral task
behavioral1
Sample
3898184831b3cda139a0bc876ea04592333577bed78fb0fea0eedc56b5c429c8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3898184831b3cda139a0bc876ea04592333577bed78fb0fea0eedc56b5c429c8.exe
Resource
win10v2004-20220812-en
General
-
Target
3898184831b3cda139a0bc876ea04592333577bed78fb0fea0eedc56b5c429c8.exe
-
Size
148KB
-
MD5
93de31f7b241689cbd57d7e9eda72640
-
SHA1
9b344f38e3114ec67de47854214b9f98f3bbe2cc
-
SHA256
3898184831b3cda139a0bc876ea04592333577bed78fb0fea0eedc56b5c429c8
-
SHA512
3383758d1fa8ed30fdcf2582361894ca31b557b0a94ad31c4182a9a3fa0b9258f22b8ca3b0dd2d5d29aa42a099129f73100b48b97c2c7e0cc85d130af501776e
-
SSDEEP
3072:o3k5lS8NQ7GsRwNqmAlITlU4Q+SparIKxO4W2hR:o1GsOFA+o+SpEIKxOZ
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 3898184831b3cda139a0bc876ea04592333577bed78fb0fea0eedc56b5c429c8.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 3898184831b3cda139a0bc876ea04592333577bed78fb0fea0eedc56b5c429c8.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 3898184831b3cda139a0bc876ea04592333577bed78fb0fea0eedc56b5c429c8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2380 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2380 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3112 3898184831b3cda139a0bc876ea04592333577bed78fb0fea0eedc56b5c429c8.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3112 wrote to memory of 1640 3112 3898184831b3cda139a0bc876ea04592333577bed78fb0fea0eedc56b5c429c8.exe 79 PID 3112 wrote to memory of 1640 3112 3898184831b3cda139a0bc876ea04592333577bed78fb0fea0eedc56b5c429c8.exe 79 PID 3112 wrote to memory of 1640 3112 3898184831b3cda139a0bc876ea04592333577bed78fb0fea0eedc56b5c429c8.exe 79 PID 1640 wrote to memory of 2380 1640 cmd.exe 81 PID 1640 wrote to memory of 2380 1640 cmd.exe 81 PID 1640 wrote to memory of 2380 1640 cmd.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\3898184831b3cda139a0bc876ea04592333577bed78fb0fea0eedc56b5c429c8.exe"C:\Users\Admin\AppData\Local\Temp\3898184831b3cda139a0bc876ea04592333577bed78fb0fea0eedc56b5c429c8.exe"1⤵
- Checks computer location settings
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 3898184831b3cda139a0bc876ea04592332⤵
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2380
-
-