Analysis
-
max time kernel
139s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 19:34
Static task
static1
Behavioral task
behavioral1
Sample
516684d518b8c0263e6e550c5442222d386cc5b55cc76d4e0a215b18319c79db.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
516684d518b8c0263e6e550c5442222d386cc5b55cc76d4e0a215b18319c79db.exe
Resource
win10v2004-20220812-en
General
-
Target
516684d518b8c0263e6e550c5442222d386cc5b55cc76d4e0a215b18319c79db.exe
-
Size
128KB
-
MD5
90d51e2883dd31aca7c8497ef088c080
-
SHA1
57f69e3ac718b545f9e5eed69d917de0c00d2946
-
SHA256
516684d518b8c0263e6e550c5442222d386cc5b55cc76d4e0a215b18319c79db
-
SHA512
cad6cc4d9de51dbb5359cdd1e32f03284903e0000eb45c49911691e726ef07bdccf3ec432077e246dd67a67576601754644db5792f1fb0a34879992b4783781d
-
SSDEEP
1536:w4R4HiP0hjt400so4pzEACaRBLAoVH1lOQYJ6iibQRVNNhK5a5aeSNg2w4DewJAK:HR30Z6Nso4pzwsHh1hbaEdEI
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 516684d518b8c0263e6e550c5442222d386cc5b55cc76d4e0a215b18319c79db.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 516684d518b8c0263e6e550c5442222d386cc5b55cc76d4e0a215b18319c79db.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 516684d518b8c0263e6e550c5442222d386cc5b55cc76d4e0a215b18319c79db.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 4980 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4980 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1304 516684d518b8c0263e6e550c5442222d386cc5b55cc76d4e0a215b18319c79db.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1304 wrote to memory of 4564 1304 516684d518b8c0263e6e550c5442222d386cc5b55cc76d4e0a215b18319c79db.exe 80 PID 1304 wrote to memory of 4564 1304 516684d518b8c0263e6e550c5442222d386cc5b55cc76d4e0a215b18319c79db.exe 80 PID 1304 wrote to memory of 4564 1304 516684d518b8c0263e6e550c5442222d386cc5b55cc76d4e0a215b18319c79db.exe 80 PID 4564 wrote to memory of 4980 4564 cmd.exe 82 PID 4564 wrote to memory of 4980 4564 cmd.exe 82 PID 4564 wrote to memory of 4980 4564 cmd.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\516684d518b8c0263e6e550c5442222d386cc5b55cc76d4e0a215b18319c79db.exe"C:\Users\Admin\AppData\Local\Temp\516684d518b8c0263e6e550c5442222d386cc5b55cc76d4e0a215b18319c79db.exe"1⤵
- Checks computer location settings
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 516684d518b8c0263e6e550c5442222d382⤵
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4980
-
-